It’s essential to understand how these actors will use the system to achieve their objectives or perform their tasks. Use case modeling is primarily concerned with defining and capturing these requirements in a structured manner.Įnd User’s Perspective: Use case modeling starts by looking at the system from the viewpoint of the people or entities (referred to as “actors”) who will interact with the system. In essence, it helps answer the question: “What should the system do to meet the needs and goals of its users?”įunctional Requirements: Functional requirements are the features, actions, and behaviors a system must have to fulfill its intended purpose. It focuses on understanding and documenting how a system is supposed to work from the perspective of the end users. This is a technique used in software development and systems engineering to describe the functional requirements of a system. Several articles survey cyber-security threats and solutions in diverse areas such as distributed systems (Uzunov et al.1.1.8 References: What is Use Case Modeling? Making sense of the state of privacy in the world of cyber-security systems requires bridging the gap between the cyber-security literature and the privacy literature. Therefore, understanding and solving privacy threats is crucial, as those threats can reduce the acceptance and usage of cyber-security systems by organizations and individuals, leading to increased number of threats for everybody. 2014) and home-users turn away from some anti-virus applications (Warkentin and Willison 2009). Privacy concerns are among the reasons why employees switch to their personal devices (e.g., smartphones and portable computers) to perform work-related activities (Pfleeger et al. The fact that many national cyber-security policies require the sharing of the detailed information of attack logs and other types of information necessitates an urgent understanding of the privacy risks related to cyber-security (Sales 2013 Nolan 2015). 2 The increasing threat of computer attacks and the intrusiveness of cyber-security mechanisms present policymakers and technology developers with the difficult challenge of balancing security risks against privacy and civil liberties concerns (Tene 2014 Landau 2014). These vulnerabilities can be realized if the security systems themselves are compromised, 1 if insiders make use of this information, or if the personal data are used contrary to the expectations of end users. Therefore, while cyber-security mechanisms protect individuals from attacks from hackers and other third-party adversaries, they also create new vulnerabilities for privacy violation from the entity that runs the cyber-security system. Moreover, the user's device identification on mobile devices is often accessed by cyber-security applications. For instance, many enterprise cyber-security systems monitor IP addresses that can be easily traced back to a particular individual. In many cases, the monitoring system can trace the identities of users and access sensitive information. Systems in domains such as intrusion detection, malware detection, data leakage prevention, and phishing identification regularly monitor network traffic, device use, and personal communications. At the same time, by monitoring networks and computing devices, cyber-security systems ultimately affect individuals' privacy. These systems prevent adversaries from breaking into networks and devices, from sabotaging digital activity, and from accessing private information. 1 INTRODUCTION In recent years, governments and corporations have increasingly relied on cyber-security systems to protect against increasing threats on networks, devices, and organizational and personal information. We discuss our results in light of the recent technological trends and suggest several new directions for making these mechanisms more privacy-aware. We suggest a taxonomy for privacy risks assessment of information security technologies, based on the level of data exposure, the level of identification of individual users, the data sensitivity and the user control over the monitoring, and collection and analysis of the data. To ground this threat, we survey common and novel cyber-security technologies and analyze them according to the potential for privacy invasion. At the same time, the enormous amount of data gathered by cyber-security systems poses a serious threat to the privacy of the people protected by those systems. Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats and government regulation.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |