GOLAN SALMAN RAZI MUKATREN PRIVACY IN A DEMOGRAPHIC DATABASE PROJECT PLAN.

Slides:



Advertisements
Similar presentations
Developing a Global Vision Through Marketing Research
Advertisements

National Statistical System and Data Dissemination Sok Kosal, Deputy Director General,National Institute of Statistics Ministry of Planning, Cambodia International.
1 Visualizer for Firewall Display & Analysis Tool.
B121 Chapter 7 Investigative Methods. Quantitative data & Qualitative data Quantitative data It describes measurable or countable features of whatever.
Ethical Hacking by Shivam.
Copyright © 2007 Pearson Education Canada 5-1 Chapter Five Managing Marketing Information With Duane Weaver.
St. Lucia Country Report By Edwin St Catherine Director, Central Statistical Office Presented to IPUMS Workshop August 24 th, 2007.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Copyright © 2007 Pearson Education Canada5-1 Marketing: An Introduction Second Canadian Edition Armstrong, Kotler, Cunningham, Mitchell and Buchwitz Chapter.
MR2300: MARKETING RESEARCH PAUL TILLEY Unit 10: Basic Data Analysis.
CENSUS PRODUCTS AND DATA UTILIZATION Svetlana Nikitina Director of the Department for population and healthcare statistics, Federal State Statistics Service,
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Automated Tracking of Online Service Policies J. Trent Adams 1 Kevin Bauer 2 Asa Hardcastle 3 Dirk Grunwald 2 Douglas Sicker 2 1 The Internet Society 2.
Operational Data Tools Chapter Eight. Copyright © Houghton Mifflin Company. All rights reserved.8–28–2 Chapter Eight Learning Objectives To learn database.
Hackers. What Is A Hacker? - A hacker is someone who uses a computer to gain unauthorized access to data - Hackers are most commonly associated with malicious.
Setting up a National Warehouse of Official Statistics in India P C Mohanan Deputy Director general National Statistical Organisation Ministry of Statistics.
BHUTAN’S EXPERIENCE USE OF TECHNOLOGICAL TOOLS IN THE DISSEMINATION OF CENSUS DATA TASHI DORJEE NATIONAL STATISTICS BUREAU.
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
PRIVACY IN A DEMOGRAPHIC DATABASE Milestone #1 Razi Mukatren, Golan Salman.
Cyber-Infrastructure for Agro-Threats Steve Goddard Computer Science & Engineering University of Nebraska-Lincoln.
Changing the culture: Ethiopia’s commitment to dissemination and the multi-media approach By Yakob Mudesir Seid
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Copyright © 2014 by The University of Kansas Using the Evaluation System to Answer Key Questions About Your Initiative.
JavaScript, Fourth Edition
Project Proposal Interface Design Website Coding Website Testing & Launching Website Maintenance.
Security Architecture
Ministry of State for Administrative Development Towards Meaningful ICT Indicators for Developing Countries Dr. Ahmed M. Darwish EGYPT Government and Education.
Auditing Information Systems (AIS)
Reference Sources on Business and Economics Sarah Aerni Special Projects Librarian University of Pittsburgh 6 April 2005.
Secondary Data and Databases Chapter Three. Chapter Three Objectives To understand how firms create an internal database. To learn about the advantages.
Razi Mokatren Golan Salman Privacy in a Demographic Database.
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Razi Mukatren Golan Salman 1 Workshop in information security Privacy in a Demographic Database Lecturer: Dr. Eran Tromer Teaching assistant: Mr. Nir Atias.
Toward Generic Systems Shifra Haar - Central Bureau of Statistics-Israel.
Presenter: Silas Mulwah Organization:Kenya National Bureau of Statistics  th September 2013, United Nations Regional workshop on Data Dissemination.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
1 HEPIX Umeå May SECURITY AUDITING OF MAIL SERVICES AT INFN DIY AUDITING Ombretta Pinazza, on behalf of INFN Mailing and Security WG Fulvia.
BY MRS. THOMAS Methods and Tools of Research. Survey a sampling, or partial collection, of facts, figures, or opinions taken and used to approximate or.
Editing of linked micro files for statistics and research.
Hints for finding topics: l Check out your N336 textbook l Consider issues discussed in other classes l Check the government websites, especially the thomas.loc.gov.
Copyright © 2014 by The University of Kansas Using the Evaluation System to Answer Key Questions About Your Initiative.
Differential Privacy Some contents are borrowed from Adam Smith’s slides.
Misplaced Confidences: Privacy and the Control Paradox L. Brandimarte, A. Acquisti, and G. Loewenstein,"Misplaced Confidences: Privacy and the control.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Computer Security By Duncan Hall.
Trustworthy Semantic Web Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem March 4, 2011.
Houston E-Retailers Presented BY: Bala AnuDeep Guduri (LEAD)
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
INFO 344 Web Tools And Development CK Wang University of Washington Spring 2014.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
WHAT IS RESEARCH? According to Redman and Morry,
Our Client Dr. Mawjood Institute of Indigenous Medicine University Of Colombo.
Sports Market Research. Know Your Customer How do businesses know their customers needs and wants?  Ask them/talking to customers  Surveys  Questionnaires.
Conducting Marketing Research Chapter 29. Sec – The Marketing Research Process The steps in conducting marketing research The difference between.
Computing Honours Project (COMP10034) Lecture 6 Quantitative Research.
Sarah Manuel Final Presentation MCO435-Social Media.
Component D: Activity D.3: Surveys Department EU Twinning Project.
Compensation Survey. SURVEYING MARKET PAY AND COMPENSATION PRACTICES By Arvind Shrouti.
Some Great Open Source Intrusion Detection Systems (IDSs)
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Lesson 2- Protecting Yourself Online
Website Security Testing: Why Business Need It Very Badly.
Andris Fisenko and Jānis Lapiņš
Lesson 2- Protecting Yourself Online
Trustworthy Semantic Web
Topic : The use of Technological tools in Data Dissemination
Presentation transcript:

GOLAN SALMAN RAZI MUKATREN PRIVACY IN A DEMOGRAPHIC DATABASE PROJECT PLAN

PROJECT: PRIVACY IN A DEMOGRAPHIC DATABASE PROJECT PLAN Online access to statistical demographic information has many benefits as it allows the study of various social issues. As an example, the US census Bureau ( provides a very impressive example for such information that can be used by researchers and laymen alike. As the underlying individual information is often sensitive, care needs to be taken in order to prevent attackers from using this information to infer individual information. As we saw in the past, attack have been tried in order to achieve this personal information.

US CENSUS BUREAU HACKED BY R00TW0RM AND INJ3CT0R "The official website of the US Census Bureau (census. gov), the government organization that gathers demographic and economic data, was hacked by members of r00tw0rm and inj3ct0r, the hackers obtaining what they call a secret zip file. A Pastebin file reveals a sample of the data they obtained from the agencys servers, including table names and columns...."

MAIN POINT The main point of this project is to analyze how the information they *intentionally* publish creates privacy violations, using statistical and logical inference. A successful attack would give a strong indication that measures taken for preserving the underlying private date were insufficient, and will hopefully contribute towards an improvement in the way such data is handled.

MILESTONE #1: Understanding the specific technique that the CBS uses for their website and collecting as much as we can information about the system and the software they use. We will also start the privacy analysis of the system, in order to find some failure that will help us understanding whether secret information can be deduce. In addition, we will start thinking about what tools/how to build our script.

MILESTONE #2: By the 2nd milestone we should already have impressive examples and some quantitative analysis, and by those examples we will continue writing the script and improve it.

MILESTONE #3: Continue analyzing the data and if needed collecting more information which will help us analyzing it. In this milestone we will try to answer our biggest question: how the information the CBS *intentionally* publish creates privacy violations. we want to know whether it's possible to find the actual people who answered the survey (and hence this is the lack that we are trying to find and ask the CBS to improve the security).

REQUISITE TOOLS, RESOURCES AND KNOWLEDGE We need more knowledge in scripting, learn and understand how to get data from the web, and build a suitable script for our goal. Understanding quantitative notions of privacy, statistical analysis, parsing HTTP queries, and manipulating databases. Our main resource will be the site of CBS The web-accessible database: Israel Central Bureau of Statistics Social Survey Table Generator

DISCUSSION OF RISK FACTORS AND CONTINGENCY PLANS Since the CBS related to our government, we assume that the server/ site have a highly security environment, and may they have a firewall or policy that limit our work. For this reason we assume it will not be easy to success in our mission.

THANK YOU