Advertisement

Datenschutz und Datensicherheit - DuD

, Volume 41, Issue 7, pp 434–439 | Cite as

Shifting the Core

How emergent technology transforms information security challenges
  • Kim HartmannEmail author
  • Keir Giles
Aufsätze

Abstract

Ubiquitous and unconscious use of connected devices demand a fundamental shift in core assumptions about data security. Users cannot be expected to take responsibility for securing their devices and data when processes and data transfer are designed to take place without their active involvement or even awareness. Technological developments already in widespread use mean that privacy, encryption and national cyber security must all urgently be rethought.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    E. H. Spafford, “The Internet Worm Program: An Analysis,” Purdue Technical Report CSD-TR-823, West Lafayette, 1988.Google Scholar
  2. [2]
    C. Czosseck, “State Actors and their Proxies in Cyberspace,” in Peacetime Regime for State Activities in Cyberspace, K. Ziolkowski, Ed., NATO CCD COE Publications, 2013, pp. 1–24.Google Scholar
  3. [3]
    A. Hilts, C. Parsons and J. Knockel, “Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security,” 2016. [Online]. Available: https://openeffect.ca/reports/Every_Step_You_Fake.pdf. [Accessed 24 February 2017].Google Scholar
  4. [4]
    J. Radcliffe, “Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System,” in Black Hat 2011, Las Vegas, USA, 2011.Google Scholar
  5. [5]
    D. C. Klonoff, “Cybersecurity for Connected Diabetes Devices,” Journal of Diabetes Science & Technology, September 2015.Google Scholar
  6. [6]
    D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno and W. H. Maisel, “Security and privacy for implantable medical devices,” IEEE Pervasive Computing, vol. 7, no. 1, 2008.CrossRefGoogle Scholar
  7. [7]
    P. Hustinx, “Opinion of the European Data Protection Supervisor on Promoting Trust in the Information Society by Fostering Data Protection and Privacy,” March 2010. [Online]. Available: https://secure.edps.europa. eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2010/10-03-19_Trust_Information_Society_EN.pdf. [Accessed 15 February 2017].Google Scholar
  8. [8]
    K. Auel, „Internet Security Days 2016: Cyber-Angriffe der Geheimdienste vor allem gegen den Mittelstand,“ September 2016. [Online]. Available: https://www.heise.de/security/meldung/Internet-Security-Days-2016-Cyber-Angriffe-der-Geheimdienste-vor-allem-gegen-den-Mittelstand-3329442.html. [Accessed 17 February 2017].Google Scholar
  9. [9]
    C. Perrin, “The CIA Triad,” June 2008. [Online]. Available: http://www.techrepublic.com/blog/it-security/the-cia-triad/. [Accessed 25 February 2017].Google Scholar
  10. [10]
    K. Hartmann and C. Steup, “On the security of international data exchange services for e-governance systems,” Datenschutz und Datensicherheit, no. 7, pp. 572–476, June 2015.CrossRefGoogle Scholar
  11. [11]
    OWASP Foundation, “Open Web Application Security Project (OWASP),” 8 December 2016. [Online]. Available: https://www.owasp.org/index.php/Main_Page. [Accessed 20 February 2017].Google Scholar
  12. [12]
    P. Schaar, “Privacy by Design,” Identity in the Information Society, vol. 3, no. 2, pp. 267–274, 2010.CrossRefGoogle Scholar
  13. [13]
    M. Langheinrich, “Privacy by design–principles of privacy-aware ubiquitous systems,” in International conference on Ubiquitous Computing, 2001.zbMATHGoogle Scholar
  14. [14]
    H.-P. Schüler, „Bequem und sicher in die Cloud–End-to-End-verschlüsselnde Speicherdienste im Test,“ c‘t, p. 106, 21 August 2015.Google Scholar
  15. [15]
    D. Schirrmacher, “Heise Security,” 17 February 2017. [Online]. Available: https://www.heise.de/security/meldung/MQTT-Protokoll-IoT-Kommunikation- von-Reaktoren-und-Gefaengnissen-oeffentlich-einsehbar- 3629650.html. [Accessed 20 February 2017].Google Scholar
  16. [16]
    K. Hartmann and K. Giles, Cyber Defense: An International View, U.S. Army War College (USAWC) Strategic Studies Institute, 2015.Google Scholar
  17. [17]
    A. Nguyen, M. Kamp and M. Smoltczyk, “Biometrische Gesichtserkennung–eine Technik ohne Zukunft,” Berliner Beauftragte für Datenschutz und Informationsfreiheit, Berlin, 2017.Google Scholar

Copyright information

© Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature 2017

Authors and Affiliations

  1. 1.MünchenGermany
  2. 2.LongstantonUK

Personalised recommendations