Describe a situation in which the source of information is more sensitive than the information itself. Explain why the sum of sensitive data might also be sensitive.

What will be an ideal response?


One possible situation is when the source of information is a secret, such as a police informant or covert surveillance program.

Sometimes patterns of insensitive data can become extremely sensitive. For instance, seeing a person in a supermarket reveals insensitive data about that person’s whereabouts at a given time, but tracking that person’s movements for a month aggregates that same kind of information into a set of sensitive data about that person’s life.

Computer Science & Information Technology

You might also like to view...

Determine the order of the recursive maze solution presented in this chapter.

What will be an ideal response?

Computer Science & Information Technology

The .swf file is the file you edit when you want to make changes to a Flash movie.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A single program that manages an entire business or set of related tasks

What will be an ideal response?

Computer Science & Information Technology

One disadvantage of EAP-TLS is which of the following?

A) It's not as secure as other authentication methods. B) It can be complex to implement. C) It isn't compatible with many network types. D) It can only be used in small networks.

Computer Science & Information Technology