This document describes the background (privacy, data protection, protocols and crytography) behind securing a distributed infrastructure. No single solution fits all applications, devices or budgets, so it must be possible to select the right level an enforce it across the infrastructure. For each such application it is necessary to understand the threats, and the associated risks to the infrastructure. In many situations, the weaker link is the end user, so usability is important, as is the motivation to implement security, which it is not just seen as a hurdle, but an essential part of the service. User protection starts with privacy and enables users to control and monitor how their data is used; with better transparency, users should feel empowered rather than forced to share their data.
Attachment | Size |
---|---|
mF2C D2.4 Security-Privacy Requirements and Features (IT1).pdf | 1.5 MB |
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use