Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Is Privacy The Price We Pay For Stronger Security?

Faiz Zaki
December 26, 2024

Is Privacy The Price We Pay For Stronger Security?

IEEE Computer Society (MY Chapter) x CDO UM Webinar Series
27.12.2024

Faiz Zaki

December 26, 2024
Tweet

More Decks by Faiz Zaki

Other Decks in Technology

Transcript

  1. IEEE Computer Society & CDO UM W E B I

    N A R S E R I E S 2 7 . 1 2 . 2 0 2 4
  2. When privacy meets security Privacy: rights to control access to

    personal information and spaces. Security: protection of individuals, systems, and data from harm, threats, and unauthorized access, physically and digitally. TRANSPARENCY LIBERTY THE TLP TRIAD PRIVACY
  3. Privacy as a currency to trade security China’s surveillance state.

    Over 700 million CCTVs nationwide. MySejahtera. Close to 40 million registered users at the peak of the pandemic. MyDigitalID. National digital identification system for Malaysians, SSO. How much privacy are we willing to trade for a safer world?
  4. Understanding privacy at different levels Personal privacy. Location, health, browsing

    data (e.g., fitness trackers, online searches). Interpersonal privacy. Messaging, email, and online communication. Organizational privacy. Corporate data, employee monitoring (e.g., work emails, VPN logs). Societal privacy. Public surveillance systems (e.g., CCTV in Kuala Lumpur). Can privacy exist without security?
  5. How security strengthens at different levels Personal security. Biometrics, two-factor

    authentication. Interpersonal security. Encryption in apps like WhatsApp and Telegram. Organizational security. Next-Gen Firewalls , zero-trust architecture. Societal security. Public surveillance systems (e.g., CCTV in Kuala Lumpur). Can security exists without privacy?
  6. The non-linear relationship between privacy, security and liberty Privacy, liberty,

    and security are interdependent. Weakening one too much compromises the others
  7. Balancing privacy and security Federated Learning. Stop moving your data.

    Differential Privacy. Anonymize your data. Encrypted Traffic Analysis. Stop looking into your data. Act 709 (PDPA): Ensures responsible data handling.
  8. Outlook and key challenges ahead for privacy and security Cultural

    Shift. Growing demand for privacy-focused solutions in Malaysia. Evolving Threat Landscape. Increasing sophistication of cyberattacks targeting both individuals and organizations. Hyperconnected World. Ubiquitous IoT devices and pervasive surveillance. Importance of Transparency. demonstrate accountability in how data is collected, used, and stored.
  9. Conclusion - A vision for the future Can privacy and

    security truly coexist, or will one always dominate the other? Embrace technologies and policies that support both privacy and security. Leverage existing frameworks like the PDPA, while fostering innovation in privacy-protecting technologies.