Privacy Threat Models Report

User Generated

Fbha

Computer Science

Description

Provide a summary report (no less than 200 words per section) on the different ways to threat model.

Solove's taxonomy of privacy harms

The IETF's "Privacy Considerations for Internet Protocols"

  • Privacy Impact Assessments (PIAs)
  • The Nymity Slider
  • Contextual Integrity
  • The LINDDUN approach
  • For each threat model, provide the model name (note: use the threat model name as a sub-header in bold font), provide the definition along with a brief explanation of the threat model (i.e. what scenario is it used for, the advantage and disadvantage of using it)

Explanation & Answer:
1200 Words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

RUNNING HEAD: DATA BREACH

1

Data Breach
Name
Professor
Institution
Due date

RUNNING HEAD: DATA BREACH

2

Taxonomy of privacy
Taxonomy of privacy was done by Daniel solove in an attempt to site the different types
of harms that can arise form violation of privacy. The author based his taxonomy on William
presser’s tort, who identified four different kinds of harmful actions which can be categorized in
the privacy blanket. This include:
Intruding upon a person private affair
Disclosure of embarrassing private facts concerning the plaintiff.
Publicity in a way that paints the plaintiff in a false manner to the public eye
Appropriation that take advantage of the defendant
Soloves taxonomy can be divided into four
Information collection
Collection of information can be done through surveillance or interrogation. State
government do surveillance on its citizens to get some information which may greatly change the
behavior of many individuals as it interferes with their privacy. In many ruling the use of the policy
thermal monitors need to be used in circumstances where there is a warrant. However this violate
privacy completely as privacy is synonymous to secrecy. Violation to privacy happens when
hidden information is exposed to others who were not intended for .when information is not hidden
in the first place then there is no implication of privacy interest if one collects it ad reveals it to
others.
Information processing

RUNNING HEAD: DATA BREACH

3

In information processing the data revealed about one person defines their privacy and how they
are going to be treated. Therefore for any person who data reveals everything about their race,
nationality, political affiliation may be mistreated in certain instances where seclusion may happen
to them or discrimination. Therefore privacy y of the vital information should be prioritized to
minimize such cases
Information dissemination
In dissemination of information one may distort the information, misrepresent the person they
represent or th...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags