Proceedings of the 12th International Conference on Availability, Reliability and Security 2017
DOI: 10.1145/3098954.3105822
|View full text |Cite
|
Sign up to set email alerts
|

Protection of personal data in security alert sharing platforms

Abstract: In order to ensure con dentiality, integrity and availability (so called CIA triad) of data within network infrastructure, it is necessary to be able to detect and handle cyber security incidents. For this purpose,

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…Another problem may arise if the method would be used to evaluate IP addresses that have not been detected as malicious (yet), which is theoretically possible and may lead to non-zero FMP scores thanks to the "prefix" features and other data not derived from previous alerts of the IP. In such a case, one can run into legal issues, since such activity can be seen as "profiling," and performing some actions, such as blocking traffic, based on it might be illegal in some jurisdictions, such as EU's GDPR [41].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Another problem may arise if the method would be used to evaluate IP addresses that have not been detected as malicious (yet), which is theoretically possible and may lead to non-zero FMP scores thanks to the "prefix" features and other data not derived from previous alerts of the IP. In such a case, one can run into legal issues, since such activity can be seen as "profiling," and performing some actions, such as blocking traffic, based on it might be illegal in some jurisdictions, such as EU's GDPR [41].…”
Section: Discussionmentioning
confidence: 99%
“…An interesting non-technical issue is a risk associated with processing private information. There is a risk in profiling [41]. The risk may be a concern for the first two methods; the third method is not processing network entities.…”
Section: Comparison and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…GDPR states that IP addresses and other identifiers, which are shared within the SABU platform, are personal data. Thus, we found a way to comply with the law by identifying risks to privacy [8] and conducting a balance test that showed that the benefits of information sharing in cyber security are higher than risks of harm to privacy [9].…”
Section: Perception Level: Intrusion Detectionmentioning
confidence: 99%
“…Replacing a "Directive" by a "Regulation" makes it applicable in all EU member states without the need of approval as national legislation and allows for harmonization of rules within the European Union (Stupka et al, 2017).…”
Section: Introductionmentioning
confidence: 99%