01.03.2019 Views

Cyber Defense eMagazine - March Edition 2019

Cyber Defense Magazine - March Edition 2019. This is a 157 page emagazine. Cyber Defense Magazine is published monthly. Loaded with free OSINT (open source intelligence) and INFOSEC (Information security) best practices all about cyber security and defense.

Cyber Defense Magazine - March Edition 2019. This is a 157 page emagazine. Cyber Defense Magazine is published monthly. Loaded with free OSINT (open source intelligence) and INFOSEC (Information security) best practices all about cyber security and defense.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• DNA Kits: If you purchased or used one of these, your DNA is now on file. And, if you<br />

give permission, your data can be used by law enforcement to help solve outstanding<br />

criminal cases. You’re most private and sensitive data, your DNA, is now in the hands of<br />

a third party. You should be aware of everything they can do with it and what the<br />

ramifications are if those services are ever breached.<br />

• Mobile Devices and IoT: Cellular phones, tablets, and even door cameras capture some<br />

form of biometric data and stores it on the device or in the cloud—even if it is not used for<br />

authentication or authorization. The risk here is obvious. Some door cameras, based on<br />

location, capture photos or video based on movement and may capture your picture just<br />

by your walking or driving past it. Your likeness, unknown to you, is now potentially on<br />

another end user’s device, or in the cloud. And, your mobile phone or tablet now has<br />

fingerprints and facial metrics stored within it too. There are plenty of tools and documents<br />

on how to bypass these security models if you have the device in hand. You cannot trust<br />

these security models based on biometrics alone, and AI may actually make the matter<br />

worse by performing the PII linkage for a threat actors.<br />

Opening up a dialogue about biometric data<br />

Now is the time to begin sensitive discussions on biometric data. When you purchase a device,<br />

use a new technology, or consider how you are interacting with a new service, ask yourself, and<br />

potentially the vendor (especially, if the technology is used for work), the following:<br />

• How are you storing biometric data?<br />

• Where is it being stored? (Especially, what countries, since this may have other legal and<br />

compliance ramifications.)<br />

• How is it secured? Who has access?<br />

• Is my biometric data being purged over time?<br />

• Do you sell my biometric data?<br />

• Does law enforcement have access to my biometric data or logs? Even with a warrant?<br />

Biometric data is perhaps the most sensitive information you possess. It is a part of your identity<br />

and can never be changed. It is a worthy conversation we need to have in this sensitive world. It<br />

affects everyone, does not discriminate, and as new technology emerges, stands to cause<br />

potential trouble for everyone unless we understand how our likeness is being captured, stored,<br />

processed, and ultimately utilized.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!