Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats,Technology,and Regulations Based on Standards and Best Practices


Information Privacy Engineering And Privacy By Design: Understanding Privacy Threats,Technology,and Regulations Based on Standards and Best Practices
by 作者: William Stallings
Publisher Finelybook 出版社: Addison-Wesley Professional; (12 Dec. 2019)
Language 语言: English
pages 页数: 528 pages
ISBN-10 书号: 0135302153
ISBN-13 书号: 9780135302156


Book Description
The Comprehensive Guide to Engineering and Implementing Privacy Best Practices
As systems grow more complex and cybersecurity attacks more relentless,safeguarding privacy is ever more challenging. Organizations are increasingly responding in two ways,and both are mandated by 作者: key standards such as GDPR and ISO/IEC 27701: 2019. The first approach,privacy by 作者: design,aims to embed privacy throughout the design and architecture of IT systems and business practices. The second,privacy engineering,encompasses the technical capabilities and management processes needed to implement,deploy,and operate privacy features and controls in working systems.
In Information Privacy Engineering and Privacy by 作者: Design,internationally renowned IT consultant and author William Stallings brings together the comprehensive knowledge privacy executives and engineers need to apply both approaches. Using the techniques he presents,IT leaders and technical professionals can systematically anticipate and respond to a wide spectrum of privacy requirements,threats,and vulnerabilities–addressing regulations,contractual commitments,organizational policies,and the expectations of their key stakeholders.
Review privacy-related essentials of information security and cryptography
Understand the concepts of privacy by 作者: design and privacy engineering
Use modern system access controls and security countermeasures to partially satisfy privacy requirements
Enforce database privacy via anonymization and de-identification
Prevent data losses and breaches
Address privacy issues related to cloud computing and IoT
Establish effective information privacy management,from governance and culture to audits and impact assessment
Respond to key privacy rules including GDPR,U.S. federal law,and the California Consumer Privacy Act
This guide will be an indispensable resource for anyone with privacy responsibilities in any organization,and for all students studying the privacy aspects of cybersecurity

打赏
未经允许不得转载:finelybook » Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats,Technology,and Regulations Based on Standards and Best Practices

相关推荐

  • 暂无文章

觉得文章有用就打赏一下

您的打赏,我们将继续给力更多优质内容

支付宝扫一扫打赏

微信扫一扫打赏