11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2. Introductionfuture, where each and every action people take on-line will probably berecorded in some database beyond their control.• Freedom - Freedom of speech. Recognized as a Fundamental HumanRight, freedom is greatly challenged by the high-end technology ingeneral, and surveillance mechanisms in particular.• Democracy, Sovereignty. People who live in democratic societies usuallytake it for granted and may underestimate the threats that it may besubject to. However, high technology, including digital storage andcommunications can be used to undermine democracy and freedomsenjoyed in a democratic society.• Identity. Although our identity in the physical world is well defined, andhardly needs to be proven during the course of a normal day, especiallyin small-scale environments, such as villages and towns, our identity inthe cyberspace is almost entirely based on digital c<strong>red</strong>entials (such aspasswords), which can be lost, stolen, sold, and abused much like anypiece of information. This opens the door to a wide variety of attacksthat can lead to identity theft.• The Right to be Forgotten. The European Commission recently proposedthe implementation of the “Right to be Forgotten” in the Cyberspace,that is, the “right to ask service providers to delete the personalinformation that has been collected by data brokers under a users’ consent”[330]. Similar in principle to the “right of oblivion” (in the Frenchlaw), the Right to be Forgotten will empower people to take control oftheir digital image and reputation in the cyberspace.• Anonymity. The widespread use of digital technologies has probablyimpacted anonymity more than any other aspect of our lives. For example,what used to be an anonymous stroll in the shopping mall, a leisurebrowsing of today’s paper, or a casual watch of the television, has beentransformed into a fully identified interaction with a network of contentproviders, a three-level-deep complex hierarchy of advertisers, and avariety of social networks all trying to record each and every aspect ofevery user’s action.• Money. Attackers have been traditionally motivated by the financialrewards of cybercrime, and will probably continue to be so.2.4 Understanding the Domains of the GameEvolutions in Science, Technology and Society create new domains that didnot exist before. Domains may be defined by common technology platforms12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!