Describe a situation in which the source of information is more sensitive than the information itself. Explain why the sum of sensitive data might also be sensitive.
What will be an ideal response?
One possible situation is when the source of information is a secret, such as a police informant or covert surveillance program.
Sometimes patterns of insensitive data can become extremely sensitive. For instance, seeing a person in a supermarket reveals insensitive data about that person’s whereabouts at a given time, but tracking that person’s movements for a month aggregates that same kind of information into a set of sensitive data about that person’s life.
You might also like to view...
Determine the order of the recursive maze solution presented in this chapter.
What will be an ideal response?
The .swf file is the file you edit when you want to make changes to a Flash movie.
Answer the following statement true (T) or false (F)
A single program that manages an entire business or set of related tasks
What will be an ideal response?
One disadvantage of EAP-TLS is which of the following?
A) It's not as secure as other authentication methods. B) It can be complex to implement. C) It isn't compatible with many network types. D) It can only be used in small networks.