Cybersecurity: A Review of Privacy Definitions and Implications

Verified

Added on  2022/09/12

|32
|9881
|20
Report
AI Summary
This report delves into the critical topic of privacy definitions within the ever-evolving field of cybersecurity. It begins by highlighting the increasing significance of cybersecurity in the face of growing data breaches and cyber attacks, emphasizing the vulnerability of sensitive information in the digital age. The report then examines various definitions of privacy, particularly in relation to emerging technologies such as cloud computing, artificial intelligence, and the Internet of Things. It presents a systematic literature review, exploring different facets of privacy including personal information, private communications, and the privacy of one's body. The research addresses key questions, such as the implications of escalating cyber threats and the ways in which data privacy is being compromised. Furthermore, the report discusses the evolution of cybersecurity mechanisms and compares different viewpoints, providing a structured overview of privacy definitions to offer readers a clear understanding of the current landscape and suggests avenues for future research.
Document Page
Running head: PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
Name of the Student
Name of the university
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
Abstract
With the growing use of Internet and the volumes of data being handled associated with
different applications, privacy has been put on stake. Privacy is being compromised with at
every step and cyber criminals are taking and advantage of this. It is evident from the
growing number of data breaches that the security measures are insufficient to avoid these
disruptions and that other solutions are required. There has been use of cloud computing in
organizations and many other technologies that come under the purview of cyber space.
Thus, cyber security has emerged as an important topic. In the paper, the privacy definitions
related to cyber security has been researched on. There are various definitions of the same
and this research has been conducted to consider some of the different aspects so that a clear
idea can be got. The research is base on literature review and no quantitative method has been
considered in the study. Lastly the research discusses on the results of this literature study
providing some suggestions to carry out future research.
Document Page
2PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
Table of Contents
1. Introduction............................................................................................................................3
1.1 Problem Statement...........................................................................................................4
1.2. Research Questions.........................................................................................................4
2. Method of research.................................................................................................................5
3. Related Work.........................................................................................................................6
4. Discussion..............................................................................................................................7
5. Comparison of these viewpoints with that of ideas before 2015...........................................9
6. Limitations...........................................................................................................................10
7. Conclusions and Future Work..............................................................................................11
8. References............................................................................................................................14
Document Page
3PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
1. Introduction
Cybersecurity has become a widely used term with variable definitions that are most
of the times subjective and at other times uninformative. It is important to understand the
concept of cybersecurity has privacy has a strong link with the same. Privacy of data has
become a growing concern as it is being said in near future weapons will not be required to
destroy enemies, data will be more than enough. In the world of advancing technology it can
be said that irrespective of any platform, what matters is privacy. There has been growing
number of data breaches thus compromising with the privacy of huge volumes of data. This
can be said to be as the reason why cyber-security systems have gained so much of popularity
[1]. These systems are required by every organization so that they can protect their networks
and computer systems against various cyber attacks which are very common these days.
Thus, companies are coming forward and investing a lot on cyber security systems. When it
comes to privacy in the digital world, there come a lot of options that can be chosen from to
ensure that confidentiality and integrity of data is maintained. There are a lot of terms
associated with cyber security that include cloud computing, Internet of Things, Artificial
Intelligence and many more. All of these have different issues related to privacy or it can be
said that almost similar issues. For instance, with reference to supply chain management it
can be said that firms require exchanging various information with contractors,
subcontractors and other important stakeholders thus scheduling meetings play a vital role in
this. The decisions related to scheduling of meetings are important and in this context
artificial intelligence serves as a vital tool helping people to take proper decisions. It has
become easy to send informations from one place to other and gradually in every sphere
modern technologies specifically digitalization is cropping up. The use of robots at
workplace, automation in industries and transportation systems all come under the purview of
cyber security [2]. It can be said that wherever or whichever technology is handling volumes
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
of data, comes under the purview of cyber security. Informations, personal or non-personal
are required to be safeguarded from cyber criminals as these are misused and result in loss of
sensitive data.
In this paper, the different views that are related to privacy definition in the realms of
cyber security will be discussed.
1.1 Problem Statement
As cyber security involves many different parts such as cloud computing, automation
and many more, studies have discussed all of these differently. There are a lot of researches
done on issues with cloud computing and all but there are fewer papers which have
considered the privacy definition considering the vast concept of cyber security as a whole. It
is difficult to find a single paper which has considered different privacy aspects and thus this
paper will try to do the same. The privacy definition in the realms of cyber security will be
discussed so that readers get an idea of different aspects [3]. The main objective of the paper
is to provide a comprehensive as well as structured overview of the different privacy
definition related to cyber security. The literature review will consist of different of distinct
privacy definitions including protection of privacy through distributed computation in case of
multi-agent decision making, usage of privacy loss for the purpose of guiding various
decisions in the distributed CSP search and many more.
1.2. Research Questions
This research seeks to address the research questions that are provided below:
1. What is the escalating sophistication of threat in the cyber space and what are the privacy
implications of the same?
2. How different are various privacy definitions in the realms of cyber security?
Document Page
5PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
3. How privacy of data is being compromised with in today’s world?
2. Method of research
In order to get an answer to the above given research questions a systematic literature
review has been taken help of. The sources used for reviewing the literature have been taken
from sites such as Google Scholar. It can be said that this research is dependent on the
secondary data sources. The literature review helped in preparing a strong base that is backed
by the available resources or the data on the topic that has been considered for the research.
The search string that was used was “privacy and cybersecurity” which yielded many results
and some were referred to for initiating the literature review. There were many filters applied
while searching for the articles that included customizing the time range from 2015 to 2020
and the search excluded patents and citations. The time range has been chosen from 2015 to
2020 as these are the most recent ones and not researched on by many researchers till date.
The search returned 17,500 results and the articles referred to have been chosen from these.
After the search result was displayed in order to choose relevant articles, the topics were
checked manually and then proceeded with. In case multiple publications were reporting
same studies the most recent one was chosen so that the information collected is updated. In
this research there was some exclusion that is as follows:
a. The publications that were not in English were not considered in this research.
b. Keywords were searched for in all the articles and an article was selected only if proper
keywords were found in it.
c. The publication having specialized content were not considered in the research.
d. The articles available online are the ones included in the research.
Document Page
6PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
These exclusions define the various limitations of the scope of the research paper. The filters
and the exclusion criteria are necessary as these set general scope as well as limit of the
research that is to be conducted.
Initial literature review suggested that there are many theories and privacy preserving
ideas that have been published by different authors linking the privacy definition to cyber
security. The search provided a lot of results as stated in the first paragraph but to get
accurate and appropriate content articles were not chosen randomly but these were manually
checked and then included in the research.
3. Related Work
With the technological development in its peak, one of the major concerns of the
contemporary world is the cyber security. New technologies like the cloud computing, big
data and the others have shown a new side in the world of technology. All though the
technological advancement has helped in the process of the development of various parts of
the industry, like the education sector, health sector the biggest concern is data privacy. All
the technologies have brought innumerable benefits for these organizations; the threats of the
cyber security cannot be avoided here as well.
Different categories of private information:
The private information can be classified as an important aspect for any individual
and has a relevance to the personal information of an individual. According to [4], privacy is
closely related to the information of an individual and applicable to someone in isolation.
One can distinguish this private information into different parts like, personal information,
private communications, information about one’s possession, and privacy of the body.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
Personal information: This is relevant to all the categories of professionals and
includes that information which refers to a single specific person. These may include
name, address, phone number, financial details, and various other details which are
sensitive. Any individual has full authority over this information and has the sole right
to share them with others according to their will.
Private communication: It refers to all forms of communication, or any information
which a person wises to keep secluded. One such example can be the information
exchange between an information professional and user during a reference interview.
Information about One’s Possession: This refers to all those information which are
directly or indirectly related to one’s right to the property. Like personal information
and individual has full authority over this information, and may or may not disclose it
to anyone. Few such examples will be, a persons’ will, documents related to land
property or business or financial information.
Privacy of the body: According to [5], the privacy of the body usually refers to the
information related to one’s medical condition, and has a separate protection from the
law. According to the law, a person has the sole right whether or not he or she should
share the health related information or the nature of their illness or any other
implications with anybody else. A person cannot be forced by the law to make it
public for the others, but there is an exception to this. If the disease or illness of the
person has a probability of dispersing the disease to others by any means then the
person may have to share their medical information. These medical data have a high
demand in the black market and are often used for the purpose of the identity theft of
an individual.
Document Page
8PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
Hence we can understand the importance of the above mention four categories of
information in an individual’s life. Keeping them private and secured is thus a responsibility
of not only the individual but also the law. As we all know that the cyber security attack is
prevalent due to the emergence of the technology, understanding the mechanism of the cyber
security is essential as well. The next section of the review discusses about some of the most
important aspect of the cyber security and how various technologies are playing their role in
defending the security.
Cyber security mechanism
Different types of the cyber-attacks
Application Attack: One of the most prevalent attacks in the Application level of the
system is the phishing attack and the client side web attack. The primary targets of
these attacks are the browsers or the e-mails that are used by the clients for accessing
the websites. These are the most exposed part of the internet and phishing is form of
email fraud attack which can lead to the entry of the malicious files in to the system
just by clicking a link. Once the files are in the system they start gathering sensitive
information of the clients from the system or the device. Often these application level
attacks are conducted with the help of the social engineering such that the victim can
be attack by deceit.
This was supported by [6], who said that the Malwares are also a kind of Application level
attack which is intended to gather the information from clients end. The details like the
transaction ids, CVV pins and other details which can benefit the attackers in some way or
the other.
Document Page
9PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
Network Attack: The primary target if the attack is to gain access of the network
protocols such that the network can be hijacked. This can result in the issues like the
denial of the services attacks or the distributed denial of service attack, along with
spool, spoofing, and the Man-in-the-middle attacks in the system.
Hardware Attack: The hardware level attacks include tampering of the hardware,
manufacturing backdoors, gaining unauthorized access to the system and few other
hardware level attacks. The main ambition of the attack is to compromise the system
and access the sensitive information content of the system. These attacks are mainly
prevalent in the systems of the industrial controls, or the closed circuit cameras and
the network appliances and few more.
Different Cyber Security Technique:
In order to combat with the cyber security issues globally, there are certain technologies that
have been introduced.
Architecture of the system: There are three main types of architecture based upon
which the software packages for the protection of the system designed for and they
are standalone architecture, Collaborative architecture, and lastly the centralized
client-server architecture. The standalone architecture is the architecture in which the
system which has to be protected is provided with a cyber-security mechanism. This
kind of the configuration can be seen in the first generation of the anti-viruses, where
the problems are detected by the system without passing any data or information to
the network of the computers in use. In the collaborative architecture, which is
implemented upon the distributed system of information such that entire network can
be protected. Final system architecture is implemented upon the centralized client
server consisting of a client.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
Categories of Detection: There are two major ways in which the security errors in
the system can be detected and they are detection based upon anomaly or the behavior
of the system. This process determines the faults by detecting the abnormalities in the
system based upon their behavior. Any deviation from the usual routine behavior to
the system helps in determination of the fact that whether or not the system is attacked
or any functionality of the system has been distorted or not. The other form of the
detection technique id the signature based detection technique. This technique
determines the generic signature of the attack and tries to monitor the system such that
any signature similar to the attack’s signature can be identified and resolved. The
signature approach can further be classified into the automatic approach and the
manual approach of the attack.
Types of data: The nature of the security can be determined based upon the types of
data that is processed by the detection algorithms. With the help of the security
techniques, the data can be classified into three major categories and they are File
data, Application data and network data.
Ecosystem: This dimension by which the system of the security can be classified is
the ecosystem. In the mobile, enterprise and Internet of things, this security dimension
can be applied. The enterprise ecosystem consists of the typical organizational
infrastructure like the PCs, servers, Wi-Fi and other networking devices. The
ecosystem of the enterprises can be extended to the public clouds, private clouds and
a few others as well. The internet of things technology is an emerging technology, but
it is still posing enough threats to the system of information in various sectors.
Thereby, considering different point of view while designing privacy and security of
the system is very important.
Document Page
11PRIVACY DEFINITION IN THE REALMS OF CYBER SECURITY
Privacy in the robotic technology:
Rapid development of intelligent and advanced technologies have become very
popular, especially, robots, which seemed like a fictional technology brought to reality and
since then, has taken a significant part in this world as a cutting-edge technology. With
increase in times, the use of robots and their intelligence, interactivity and mobility has
increased so that we can use them in a variety of ways and these numbers are going to rise
further.
But their down sides to it. A robot is getting access to a lot of information which may
be private. They can get in and out of places, and receive and send information easily. Thus,
people are concerned about their increasing number in the society and fear the lack of privacy
that can happen due to them. Thus it is important to find a solution that would increase their
effectiveness and also the people are comfortable while using them.
According to [7], there has been a lot of research regarding the privacy issues which
humans have with robots. There were experiments, use of previous scenarios, discussions,
debates over various topics of security and concerns. According to the research result, several
concerns were pointed.
Size: There was a need to study the appearance of the robots. It was observed that
there is a relationship of trust between the humans and robots based on their size,
shape and appearance.
Cameras: Studies suggest that researchers conducted several research and tried
improvements so that the surveillance systems of a robot can identify the private parts
of human body or their face in complex environment and protect them ensuring the
privacy and security of the user.
chevron_up_icon
1 out of 32
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]