About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Digital Forensics and Cyber Crime. 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings

Research Article

Cyber Crime Undermines Data Privacy Efforts – On the Balance Between Data Privacy and Security

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-36574-4_25,
        author={Michael Mundt and Harald Baier},
        title={Cyber Crime Undermines Data Privacy Efforts -- On the Balance Between Data Privacy and Security},
        proceedings={Digital Forensics and Cyber Crime. 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings},
        proceedings_a={ICDF2C},
        year={2023},
        month={7},
        keywords={Cyber Threat Intelligence Data Breach Regulatory Compliance Insider Threat Management Data Security and Privacy},
        doi={10.1007/978-3-031-36574-4_25}
    }
    
  • Michael Mundt
    Harald Baier
    Year: 2023
    Cyber Crime Undermines Data Privacy Efforts – On the Balance Between Data Privacy and Security
    ICDF2C
    Springer
    DOI: 10.1007/978-3-031-36574-4_25
Michael Mundt,*, Harald Baier
    *Contact email: m.mundt@esri.de

    Abstract

    The General Data Protection Regulation (GDPR) was put into effect in the European Union on 25th May 2018. GDPR aims to ensure the protection of personal data from individuals and the free movement of this personal data. Data privacy regulations are also currently being discussed nationwide in the United States of America and other countries. Regular guidelines of the European data protection board (edpb) support the technical GDPR implementation. However, cyber aggressors are increasingly succeeding in penetrating IT systems, e.g., by combining traditional ransomware techniques with data exfiltration. In this paper we address the trade-off between data protection as presumably regulated by the GDPR and the security implications of a hard and fast privacy enforcement. We argue that a too strict interpretation of the rules of data protection in the wrong place can even provoke the very reverse of data protection. The origin of our examination is to classify data in two GDPR relevant categoriespersonal data(e.g., personal files of customers and company personal) andIT operational data(e.g. log files, IP addresses, NetFlow data), respectively. We then give a plea to strictly protect data of the first category and to handle the GDPR pragmatically with respect to the second one. To support our position we consider sample popular network protocols and show that it is low-threshold to exploit these protocols for data exfiltration, while the defender is only able to detect the attack on base of IT operational data. We hence emphasize the need for a new paradigm of risk assessment.

    Keywords
    Cyber Threat Intelligence Data Breach Regulatory Compliance Insider Threat Management Data Security and Privacy
    Published
    2023-07-16
    Appears in
    SpringerLink
    http://dx.doi.org/10.1007/978-3-031-36574-4_25
    Copyright © 2022–2025 ICST
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL