$50 Launches Free Worldwide Delivery
Privacy Is Hard and Seven Other Myths: Achieving Privacy through Careful Design | Essential Guide for Digital Security & Online Protection | Perfect for Cybersecurity Professionals & Privacy Advocates
Privacy Is Hard and Seven Other Myths: Achieving Privacy through Careful Design | Essential Guide for Digital Security & Online Protection | Perfect for Cybersecurity Professionals & Privacy Advocates

Privacy Is Hard and Seven Other Myths: Achieving Privacy through Careful Design | Essential Guide for Digital Security & Online Protection | Perfect for Cybersecurity Professionals & Privacy Advocates

$12.42 $16.57 -25% OFF

Free shipping on all orders over $50

7-15 days international

29 people viewing this product right now!

30-day free returns

Secure checkout

35030605

Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay

Description

An expert on computer privacy and security shows how we can build privacy into the design of systems from the start.We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.

Reviews

******
- Verified Buyer
Book review: Privacy Is Hard and Seven Other Myths: Achieving Privacy through Careful DesignReviewer: Ben RothkeIt's unclear who initially observed that "if you tell a lie and tell it frequently enough, it will be believed." For example, the FCC and telephone have told the public that scam robocalls are extremely hard to stop. When in fact, with some simple controls, about 60% of them could be stopped. Stopping those would collapse the economic incentive, and scam robocalls would be a thing of the past.Regarding computer security, countless lies and myths have been propagated to the general public. For the longest time, people were told that they should change their passwords every 90 days for effective computer security.But overly frequent password changes can, in fact, make security worse. That is why NIST updated their guidance in NIST Special Publication 800-63B, noting that password expiration is a concept that needs to be relooked at. Lance Spitzner writes that there has been a community effort to kill password expiration for years, but this is not something new. People like Per Thorsheim, Microsoft's Dr. Cormac Herley, Gene Spafford of Purdue, and the Chief Technologist at FTC have been working hard to kill password expiration.In Privacy Is Hard and Seven Other Myths: Achieving Privacy through Careful Design, author Jaap-Henk Hoepman (associate professor at the Institute for Computing and Information Sciences, Radboud University, Netherlands) attacks eight myths that have long been treated as gospel within information technology in general, and information security specifically.The myths the book masterfully shreds are:1. We Are Not Collecting Personal Data2. You Have Zero Privacy Anyway—Get Over It3. I've Got Nothing To Hide4. It's Merely Metadata5. We Always Need To Know Who You Are6. Your Data Is Safe With Us7. Privacy and Security are a Zero-Sum Game8. Privacy Is HardPerhaps the most pervasive and well-known of the myths is the observation by then CEO of Sun Microsystems Scott McNealy that "you have zero privacy anyway, get over it." Hoepman shows how this erroneous notion can be countered.And that is the central message of the book, that the architecture of a system, the way it is designed, has a fundamental impact on whether it respects and protects our privacy or not. Those that take privacy seriously (and that does not include Facebook, Google, Instagram, etc.) need to address this in the architecture of their systems.This notion of privacy by design is an important engineering approach. The essential idea is that privacy should be considered first as a design requirement from the beginning and through the lifecycle of a system.When it comes to scam robocalls, there is an economic incentive both for the scammers and the telecommunication companies for it to continue. When it comes to privacy, the incentives are often, as the book details, favored in place of the software vendors and not the consumer.Anyone who has ever downloaded a copy of their information on Facebook is astounded by the depth and breadth of the information there. Every search, like, post, message, location, ad clicked, and much more is there in detail. And Facebook is but one of the scores, if not hundreds, of information junctions where a person can be monitored.The book systematically and articulately takes apart the eight myths and details the privacy design strategies vendors and system architects need to implement for effective security and privacy. And it's no myth to say this is one of the most important books you can read on the topic.

We value your privacy

We use cookies and other technologies to personalize your experience, perform marketing, and collect analytics. Learn more in our Privacy Policy.

Top