Describe a situation in which the source of information is more sensitive than the information itself. Explain why the sum of sensitive data might also be sensitive

What will be an ideal response?


One
possible
situation
is
when
the
source
of
information
is
a
secret,
such
as
a
police
informant
or
covert
surveillance
program.
Sometimes
patterns
of
insensitive
data
can
become
extremely
sensitive.
For
instance,
seeing
a
person
in
a
supermarket
reveals
insensitive
data
about
that
person's
whereabouts
at
a
given
time,
but
tracking
that
person's
movements
for
a
month
aggregates
that
same
kind
of
information
into
a
set
of
sensitive
data
about
that
person's
life.

Computer Science & Information Technology

You might also like to view...

Explain why a view is like a subroutine.

What will be an ideal response?

Computer Science & Information Technology

The slide footer is a good place to insert the company or author of the presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

Which symbol to the right of a column name in the SharePoint documents library indicates that a filter has been applied?

A) Funnel B) Check mark C) Large arrow D) Small arrow

Computer Science & Information Technology

You see your coworker take software out of the locked cabinet and put it in his laptop bag and take it home. You suspect that he is installing it on an unauthorized computer because there are no external service calls for that technician in the morning. What should you do?

A) Nothing. B) Mention it to your supervisor. C) Confront your coworker and ask him for the software. D) Wait until you calm down, talk to the coworker the next business day, and explain your concern.

Computer Science & Information Technology