Chapter 4: TECHNICAL MEASURES AND PRIVACY-ENHANCING TECHNOLOGIES Flashcards
What are the different data strategies
Separated Data
Minimizing data
Abstracting data
Hiding data
What is separated data strategy
o To minimize the risk of a threat actor using multiple sources of data to correlate information about a particular individual, data may be separated through distribution or isolation
What is distribution in separated data strategy
One method of separation is to distribute the collected information by either logically or physically segregating it.
Logical separation may mean placing restricted access on sensitive data that only allows certain users to access it
Physical separation might be accomplished by placing different data sets on different, physically distinct servers
What is minimizing data strategy
Minimization involves limiting the amount of personal information that needs to be processed.
What are the different steps of minimizing data strategy
Exclude unnecessary data: Information that is not critical to the purpose of collection should be excluded from collection at the start. Process designers should examine the privacy implications of the information being collected to determine if collection is truly necessary, or if a design change could minimize the amount of information collected
Select what data will be processed: Selection is similar to exclusion; an organization or commercial entity can decide, case by case, to process only relevant personal information.
Strip unnecessary data: Stripping allows for removal of unnecessary information for further processing or distribution.
Destroy data when it is no longer needed: Once any personal information is no longer needed, organizations should plan to destroy it or remove it completely from a system.
What is abstraction data strategy
o Abstraction limits the amount of detail in which personal information is processed.
What are the common ways to abstract data
Group: Grouping aggregates data into correlated sets rather than processing it individually. Algorithms are sometimes used to “crowdsource” connections by grouping individuals based on previous purchases.
Summarize: Summarizing puts detailed information into categories based on more abstract attributes. While grouping information is about correlations, summarizing separates out a data element about individuals from correlated groups.
Perturb: Perturbing adds approximation or “noise” to data to reduce its specificity.
What is hiding data strategy
o Hiding protects personal information by making it unconnectable or unobservable to others.
What are the ways in which information can be protected by implementing a hiding strategy
Restrict: Restricting prevents unauthorized access
Mix: Mixing processes personal information randomly within a large group to reduce correlation. mixing the data would provide the needed information without revealing personal details that could be tracked back to a specific individual or household.
Obfuscate: Obfuscation obstructs the ability to read or understand personal information. i.e. done with encryption or hashing or coding
Dissociate: Dissociation removes the correlation between subjects and their personal information
What is the aggregation technique
o information is expressed in a summary form that reduces the value and quality of data as well as the connection between the data and the individual it belongs to.
What are the factors of aggregated data
Frequency versus magnitude data: When reviewing aggregate data, you must first determine if the data is frequency data or magnitude data.
Noise addition through differential privacy: When data is aggregated, personal identifiers are removed from the data set being shared.
What is deidentified techniques
o Deidentification is one of the primary techniques used to prevent an individual’s identity from being connected to their personal information.
How can deidentification be accomplished
o Tokens:
Tokenization is a system of deidentifying data, which uses random tokens as stand-ins for meaningful data. This process can be used to replace sensitive data with data that is not sensitive because it has no meaning.
o Anonymization:
In anonymized data, direct and indirect identifiers have been removed, and mechanisms have been put in place to prevent reidentification.
o Pseudonymization:
Data is pseudonymized by replacing individual identifiers (such as names) with numbers, letters, symbols, or a combination of these, such that data points are not directly associated with a specific individual
k-anonymity, l-diversity and t-closeness:
k-anonymity, l-diversity and t-closeness are three techniques that have been developed to reduce the risk of anonymity of data being compromised by someone who might combine it with known information to make assumptions about individuals in a data set
What is encryption technique
o encryption is used to protect privacy in an increasingly digital world. Encryption is the rapid scrambling of collected information that will require authorized access.
o Encrypted information is far less likely to be compromised and is better protected when sent over the internet or stored on a laptop.
What are the concepts of encryption
- Algorithms are mathematical applications applied to a block of data.
Symmetric encryption: There are two kinds of encryption—symmetric and asymmetric
-Asymmetric encryption uses one key for encryption and another key for decryption.
-Application encryption, also known as file-level or document-based encryption, provides built-in encryption that is applied throughout a program (for example, databases, word processors and email programs).
-record encryption, records are encrypted one record at a time.
-Field encryption provides the ability to encrypt specific fields of data; typically, fields that are considered sensitive, such as credit card numbers or health-related information
-Quantum encryption, also called quantum cryptography, uses the principles of quantum mechanics to encrypt messages in a way that prevents anyone other than the intended recipient from reading them
-Public-key infrastructure makes public-key cryptography workable by providing tools for obtaining and verifying public keys that belong to individuals, web servers, organizations and other entities that require digital identification.
-Homomorphic encryption allows encrypted information to be manipulated without first being decrypted.
-polymorphic encryption, the algorithm (the encryption/decryption pair) is mutated with each copy of the code, while the outcome of the encryption remains the same for any given key.
-Mix networks, also known as onion routing networks, are a way to hide one’s traffic within a crowd by combining traffic from multiple computers into a single channel that is sent between multiple computers, and then separating the traffic out again.
-Secure multiparty computation is a class of algorithms that allow programs running on different computers to participate in computations such that results can be computed without compromising each party’s private data
-Private information retrieval (PIR) is a range of protocols through which data can be retrieved from a database without revealing to the database or another observer the information that is retrieve