Slide 1

Slide 1 text

IEEE Computer Society & CDO UM W E B I N A R S E R I E S 2 7 . 1 2 . 2 0 2 4

Slide 2

Slide 2 text

When privacy meets security Privacy: rights to control access to personal information and spaces. Security: protection of individuals, systems, and data from harm, threats, and unauthorized access, physically and digitally. TRANSPARENCY LIBERTY THE TLP TRIAD PRIVACY

Slide 3

Slide 3 text

Privacy as a currency to trade security China’s surveillance state. Over 700 million CCTVs nationwide. MySejahtera. Close to 40 million registered users at the peak of the pandemic. MyDigitalID. National digital identification system for Malaysians, SSO. How much privacy are we willing to trade for a safer world?

Slide 4

Slide 4 text

Understanding privacy at different levels Personal privacy. Location, health, browsing data (e.g., fitness trackers, online searches). Interpersonal privacy. Messaging, email, and online communication. Organizational privacy. Corporate data, employee monitoring (e.g., work emails, VPN logs). Societal privacy. Public surveillance systems (e.g., CCTV in Kuala Lumpur). Can privacy exist without security?

Slide 5

Slide 5 text

How security strengthens at different levels Personal security. Biometrics, two-factor authentication. Interpersonal security. Encryption in apps like WhatsApp and Telegram. Organizational security. Next-Gen Firewalls , zero-trust architecture. Societal security. Public surveillance systems (e.g., CCTV in Kuala Lumpur). Can security exists without privacy?

Slide 6

Slide 6 text

The non-linear relationship between privacy, security and liberty Privacy, liberty, and security are interdependent. Weakening one too much compromises the others

Slide 7

Slide 7 text

Balancing privacy and security Federated Learning. Stop moving your data. Differential Privacy. Anonymize your data. Encrypted Traffic Analysis. Stop looking into your data. Act 709 (PDPA): Ensures responsible data handling.

Slide 8

Slide 8 text

Outlook and key challenges ahead for privacy and security Cultural Shift. Growing demand for privacy-focused solutions in Malaysia. Evolving Threat Landscape. Increasing sophistication of cyberattacks targeting both individuals and organizations. Hyperconnected World. Ubiquitous IoT devices and pervasive surveillance. Importance of Transparency. demonstrate accountability in how data is collected, used, and stored.

Slide 9

Slide 9 text

Conclusion - A vision for the future Can privacy and security truly coexist, or will one always dominate the other? Embrace technologies and policies that support both privacy and security. Leverage existing frameworks like the PDPA, while fostering innovation in privacy-protecting technologies.