0% found this document useful (0 votes)
53 views

Unit 4 Privacy vs. Security

Privacy vs. Security discusses the relationship between privacy and security. While privacy focuses on protecting personal information and data, security encompasses broader measures to safeguard assets from threats. There is a strong connection between privacy and security, as security technologies are needed to achieve privacy protections. However, some security measures can potentially undermine privacy if not implemented carefully. The debate around balancing privacy and security remains an ongoing issue with implications for legislation and technology.

Uploaded by

vladsado-ipt25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Unit 4 Privacy vs. Security

Privacy vs. Security discusses the relationship between privacy and security. While privacy focuses on protecting personal information and data, security encompasses broader measures to safeguard assets from threats. There is a strong connection between privacy and security, as security technologies are needed to achieve privacy protections. However, some security measures can potentially undermine privacy if not implemented carefully. The debate around balancing privacy and security remains an ongoing issue with implications for legislation and technology.

Uploaded by

vladsado-ipt25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 12

UNIT 4: Privacy vs. Security.

WARM-UP
1. Answer the questions:
1. What is privacy? Privacy refers to the right of individuals to keep certain
aspects of their lives and personal information free from intrusion,
observation, or disclosure. It encompasses the right to control one's
personal data, activities, and communications, and it is often associated
with the concept of autonomy and the ability to make choices without
external interference.
2. Why is privacy important? Privacy is important for several reasons:
 Autonomy: It allows individuals to exercise control over their
personal information and make choices without external coercion.
 Freedom of expression: Protecting privacy fosters an environment
where individuals feel safe expressing their thoughts and opinions
without fear of reprisal.
 Trust: Privacy is crucial for building trust in personal and
professional relationships, as individuals need to feel secure in
their interactions.
 Personal security: Safeguarding sensitive information helps
prevent identity theft, fraud, and other malicious activities.
3. Is privacy a human right? Yes, privacy is considered a fundamental
human right. It is recognized and protected by various international and
national legal frameworks, including the Universal Declaration of Human
Rights and many national constitutions. The right to privacy
acknowledges the importance of personal autonomy and protection from
unwarranted interference.
4. What's the difference between privacy and security?
 Privacy: Focuses on the protection of personal information and the
right to control one's data. It involves preventing unauthorized
access to or disclosure of sensitive information.
 Security: Encompasses a broader set of measures designed to
protect assets (including information) from various threats, which
may include unauthorized access, attacks, or damage. Security
measures go beyond personal information and can include physical
security, network security, and more.
5. Is there a connection between privacy and security? Yes, there is a
strong connection between privacy and security. While privacy focuses on
the protection of personal information, security measures are essential to
achieving this protection. For example, encryption, access controls, and
secure communication protocols are security measures that help ensure
the privacy of sensitive information.
6. What privacy rights may be involved with cybersecurity? In the context
of cybersecurity, several privacy rights come into play, including:
 Right to confidentiality: Ensures that personal information is kept
confidential and not disclosed to unauthorized parties.
 Right to data protection: Involves safeguarding personal data from
unauthorized access, use, or disclosure.
 Right to anonymity: Allows individuals to engage in online
activities without revealing their identity unless explicitly desired.
 Right to be forgotten: Permits individuals to have their personal
data erased under certain circumstances, especially when it is no
longer necessary for the purpose for which it was collected.
2. Look at some types of privacy below and say which type is the most
important. Give reasons.

2
Data Privacy
Importance: in the digital age, personal data is constantly collected, stored, and
processed. Data privacy is crucial to protect individuals from identity theft,
unauthorized surveillance, and the misuse of sensitive information.
Reasons: unauthorized access to personal data can lead to various forms of
harm, including financial fraud, identity theft, and reputational damage.

3
3. Discuss the following quotations.
1. "When it comes to privacy and accountability, people always demand
the former for themselves and the latter for everyone else." - David
Brin
 This quote highlights a common and perhaps hypocritical aspect of
human nature when it comes to privacy and accountability. People
often want to maintain their own privacy, protecting their personal
information and actions from scrutiny. However, they may
simultaneously call for accountability and transparency from
others, particularly public figures or institutions. It points to the
tension between the desire for personal privacy and the societal
need for accountability.
2. "Privacy is not something that I'm merely entitled to, it's an absolute
prerequisite." - Marlon Brando
 Marlon Brando's statement emphasizes the critical nature of
privacy. He sees it not as a mere entitlement or luxury but as an
absolute necessity. This perspective aligns with the idea that
privacy is foundational to individual freedom, autonomy, and the
ability to express oneself without fear of unwarranted intrusion.
3. "Civilization is the progress toward a society of privacy. The savage's
whole existence is public, ruled by laws of his tribe. Civilization is the
process of setting man free from men." - Ayn Rand
 Ayn Rand's quote presents a view on the evolution of civilization
and privacy. It suggests that as societies progress, there is a
movement towards greater individual privacy and freedom. In more
primitive or tightly knit communities, individual lives are more
public and governed by communal rules. The development of
civilization, in Rand's view, involves freeing individuals from
excessive societal constraints.

4
4. "We must protect our citizens' privacy – the bulwark of personal
liberty, the safeguard of individual creativity." - Bill Clinton
 Bill Clinton's quote underscores the importance of privacy in the
context of personal liberty and creativity. Here, privacy is portrayed
as a foundational element that not only protects individuals but also
nurtures their ability to think, create, and express themselves
without fear of undue interference. It aligns with the idea that a
society that values privacy is likely to foster individual growth and
innovation.
5. "The privacy of public office, the publicity of private life." - Latin
Proverb
 This Latin proverb encapsulates a perspective often associated with
public figures. It suggests that individuals in public office or
positions of authority may have to sacrifice some aspects of their
private lives for the greater good or for the sake of transparency.
The phrase highlights the delicate balance that public figures must
strike between maintaining personal privacy and fulfilling their
responsibilities to the public.

READING
1. Read a text about privacy vs. security and mark the following statements as
true or false.
1. Legislative activity of any country is connected with privacy. T
2. The measures during the event "Super Bowl XXXV" led to the notion
substitution "detection" on "deterrence". T
3. According to the author of this article, the term "security" is equal to
"methodology/technology". F
4. The gap between privacy and security can be overcome today.F

2. Answer the following questions.


5
1. What does "privacy" mean?
 Privacy refers to the right of individuals to keep certain aspects of
their lives and personal information free from intrusion,
observation, or disclosure. It involves the control of personal data
and the ability to make choices without external interference.
2. How is privacy connected with security?
 Privacy and security are interconnected, particularly in the context
of data privacy. Security measures are essential for protecting
personal information and ensuring it is not accessed or disclosed
without authorization. However, the text also highlights that
security measures can either serve privacy or potentially hinder it,
depending on how they are implemented.
3. Why is the issue about privacy hot now?
 The issue of privacy is currently a hot topic due to legislative
activities in various countries, high rates of Internet usage, and
extensive media coverage. The text suggests that the debate over
privacy is likely to continue, with serious implications for
businesses relying on information systems and internet technology.
4. Do you appreciate the idea of filtering outgoing e-mail to prevent
leakage of information at your company? Explain your position.
 This is a subjective question, and the answer would depend on
individual perspectives. Some may appreciate the idea as a security
measure to protect sensitive information, while others may see it as
an invasion of privacy, as mentioned in the text.
5. What are the pros and cons of measures taken during the event
"Super Bowl XXXV"?
 Pros: Improved apprehension rate for known criminals, potentially
enhancing public safety.

6
 Cons: Some people objected to the activity because it was done
without the knowledge or consent of the individuals being scanned,
raising concerns about privacy invasion.
PRIVACY VS. SECURITY
Although privacy and security goals may at times seem at odds, successful
e-businesses ensure that privacy and security initiatives are clearly explained,
well understood, and complementary.
Privacy, with a capital "P", is moving to the top of the public agenda. You
only need to look at legislative activity in the United States, United Kingdom, or
any other country with high rates of Internet usage, or count the number of
newspaper headlines and magazine cover stories, to see that privacy is a hot
issue. It's a public debate that's likely to last for some time, with serious
implications for businesses, especially for those that rely heavily on information
systems and Internet technology.
Progress in any debate proceeds from consensus on basic definitions, so
let's be clear about how we use the word "privacy." Much of the current debate
over privacy concerns a subset of privacy in general, namely electronic or data
privacy. In turn, many discussions about data privacy raise the issue of security,
which often means information security, and a subset thereof, computer security.
Unfortunately, confusion between data privacy and computer security can
hinder a company's attempts to achieve excellence in either area.
In the context of data privacy, privacy refers to a value. To differing
degrees, in different cultures, privacy is a right as well as a value. However, in
the context of computer security, the term security doesn't refer to a value, but
rather a methodology and a technology. As such, security is neutral; it can serve
privacy or hinder it.
For example, a company may feel the need to filter outgoing e-mail to
prevent company bank account details from being sent to a competitor, but that

7
implies reading employees' e-mail, which some people consider to be an
invasion of privacy.
Or consider a security technology such as biometrics, which can prevent
unauthorized people from accessing your data. It can also be used to track
people's activity without their consent, which might be considered an invasion
of privacy on the one hand, or a boost to security on the other.
One example is Super Bowl XXXV where the faces of people entering the
stadium were scanned with software that looked for matches with the faces of
known criminals. Possible matches were sent to a police control room. While an
improvement in the apprehension rate for known criminals would seem to be a
goal shared by all members of society, some people objected to this activity
because it was done without the knowledge or consent of the people being
scanned. Of course, the existence of such knowledge or consent would have
changed the security function of the system from detection to deterrence.
Bottom Line: Clearly, security and privacy are different. Of course, when
considered in a broad sense, security can be a value. When we process valuable
data with computers, we talk about keeping it secure. Computer security is
typically defined as protecting the confidentiality, integrity, and availability of
data and the systems that process it. But this definition contains a number of
assumptions that transform security from a human value into a technical
objective.
For example, ownership of data and the right of the owner to restrict access
to that data is implied. But data ownership is a central issue in the electronic
privacy debate. Do you own any data about yourself? Do you have the right to
restrict the use of that data? Do others have the right to demand data from you
in certain circumstances, such as purchase and delivery of services?
While computer security can enable restrictions on the use of data, and
control access to data based on assigned rights to access that data, it can't decide
the issue of legal ownership. The right of an entity to impose restrictions on the

8
use of data isn't a question to which either the theory or practice of computer
security can supply an answer.

ACTIVE VOCABULARY
agenda порядок денний
to rely on information systems покладатися на інформаційні
системи
consensus on basic definitions згода по основних визначеннях
an invasion of privacy вторгнення в приватність
without the consent без згоди
a competitor конкурент
bottom line результат, визначний фактор
data ownership право власності на дані
to restrict access обмежити доступ
legislative activity законодавча діяльність
to hinder privacy перешкоджати конфіденційності
to filter outgoing e-mail фільтрувати вихідну електронну
пошту
to prevent unauthorized people запобігати несанкціонованого
from accessing the data доступу до даних
the apprehension затримання, арешт
to object to activity виступати проти діяльності
from detection to deterrence від виявлення до залякування
to protect the confidentiality, захищати конфіденційність,
integrity, availability of data цілісність, доступ даних
to impose restrictions on smth. накладати обмеження

EXERCISES
1. Explain the words and word-combinations.
Unauthorized people, detection, security, privacy, integrity, to object to
activity.
Unauthorized people:Refers to individuals or entities who do not have
official permission or approval to access a particular place, information, or
perform a specific action. Unauthorized access is often considered a security
concern.

9
Detection:The process of discovering or identifying something, often
concerning the identification of unauthorized access, activities, or entities. In the
context of security, detection involves recognizing potential threats or breaches.
Security:The state of being free from danger or threat. In the context of
computer and information systems, security refers to measures and practices
implemented to protect data, systems, and networks from unauthorized access,
attacks, or damage.
Privacy:The state or condition of being free from public attention or
observation, especially concerning personal matters. Privacy involves the right
to control one's personal information and activities.
Integrity:The quality of being honest and having strong moral principles.
In the context of computer security, integrity refers to the protection of data
from unauthorized alteration or tampering.
To object to activity: When someone "objects to activity," it means they
are raising concerns or expressing disapproval about a particular action or set of
actions.

2. Cross the odd word out.


1) intrusion, exception, violation, invasion;
2) refer, relate to, concern, look;
3) hinder, interfere with, thwart, hitch;
4) posterity, ownership, possession, proprietorship;
5) exposure, intransigence, detection, revelation.

3. Work in small groups. Put the words in the following sentences in order.
The first word in each sentence has been underlined.

10
1. Various types of personal information often come under concerns of
privacy.
2. New technologies can also create new ways to gather private information.
3. Organizations may seek legal protection for their secrets.
4. Fill in the correct word(s) from the list below: tracked, threat, legislative,
discussion protect, privacy.
A flurry of 1) legislative and regulatory activity regarding privacy appeared
to herald the end of self-regulation. For years, many companies in different
economic sectors had argued that self-regulation was an effective and balanced
way to 2) protect privacy. Then dissatisfaction with this model appeared to have
grown and to represent a significant 3) threat to it. Yet, the recent 4) discussion
about the “Do Not Track” approach has revived interest in self-regulation. Can
“Do Not Track” work? What does it mean to be 5) tracked while online? Is “Do
Not Track” a viable way to protect 6) privacy online?

5. Fill in the correct word derived from the word in bold.

There are many means to protect one's privacy on the Internet.

We collect your personal information for various purposes, such as processing


your order, corresponding with you, providing you with a subscription or in
connection with a job application.

We may combine the information we collect from you with information


obtained from other sources to help us improve its overall accuracy and
completeness, and to help us better tailor our interactions with you.

There are also a number of well-known SIDs whose values are the same on all
Windows platforms and which identify generic users or groups to operating
system processes.

6. Find a mistake.
1. I have been working in networking and security for over 15 years.

11
2. Network security is the identification and mitigation of undesirable
information flow.
3. Understanding the impacts, ramifications, and options requires a basic
background in general computer security processes, network theory, and
for some protocols, a basic understanding of cryptography.
4. This knowledge can be used both offensively and defensively.

7. Find 11 words (9 nouns, 1 adjective, 1 past participle), connected with the


topic, in the grid.
O W N E R S H I P C E D S A Z B
D F Q Y H N M J U I K M O P S Y
X V S L E G I S L A T I O N E A
D S G D C A S X Z E R T B Y I O
F I L T E R F D I N V A S I O N
R E A D T E R D W S A C R D R F
C D T R P R I V A C Y E E E F
O A C E V S. D N S H
N R T E S E C U R I T Y S T T A
F F U N G E R E W S A W E I R Z
I U N A U T H O R I Z E D F I E
D N E F X A G H T E W Q E I C D
E I R E D E T E C T I O N E T F
N T R A R W F A C G D A E R I R
T S A V A I L A B I L I T Y O E
I S A D L Y E C S A N E R T N R
A A C R E D E N T I A L T I L T
L R E A C T I O D O A S I O E D

12

You might also like