Question

As you consider the reputation service and the needs of customers or individual consumers, as well...

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

ANSWER:
1. The request can be tied to the user. And if the user is a member of the customer organization, then the request can be tied to the organization, as well. Requests are likely to have some value. If I know the sorts of web properties in which a consumer is interested, I can direct sales efforts to those interests. And that is precisely how search engines and social media services generate revenue. These services appear to be free, but they are far from it. If the service knows that you’re passionate about skiing, it will attempt to sell you skiing equipment, skiing vacations, and so forth based upon your demonstrated interests. This is precisely how social media and search engine revenue is generated; the advertising is highly targeted.

2. Furthermore, each customer, probably each user, won’t necessarily want to disclose their web viewing and interaction habits to any other user. If the string of reputation requests from a user were to be accessed by another user, not only would that be a breach of privacy in many jurisdictions, it might also give the receiver a great deal of information about the habits, interests, and activities of the individual.

3. In the case of an organization, the interests of its employees might be used competitively to understand future directions, pricing models, customer interactions, sales prospects, and all manner of sensitive business activity. Perhaps any one individual’s activities might not be all that useful in isolation from the rest of the organization? But if an attacker could gather information about many of the organization’s employee activities, significant information will likely be disclosed. For instance, if several of the researchers or executives access the website of an interesting new startup, a competitor might infer that the company was considering an acquisition. Any particular reputation request in isolation may not be all that significant. But the aggregation of reputation requests that can be tied back to an entity are probably quite valuable.

Hence, a reputation service does indeed have a multitenancy challenge. How can the service make sure that no tenant (or other attacker) can have access to all the other tenants’ request history?

5.One solution would be to toss all reputation requests once the request has been satisfied. If no reputation request history is kept, if all reputation requests are ephemeral, then the best an attacker can get is a picture of the requests at any particular attack moment.[1] The deletion of all reputation request history is certainly one viable strategy.

6.However, the software vendor may lose valuable data about the efficacy of the reputation service. Certainly, the reputation service would need to keep metadata about reputation requests in order to compute performance statistics, log failures, spot anomalies from expected usage, and similar telemetry information. Metadata are going to be very useful in order to assess the workings of the service and to spot problems with the service as quickly as possible.

Will metadata be valuable to attackers? Perhaps. But the metadata certainly will not be as valuable as reputation request histories that can be tied to entities of interest. Consequently, another viable security strategy might be to throw away all actual request history and only keep metadata.

7. Consider the case where only metadata is kept, that is, the case where no data is kept about objects for which a reputation request has been made. Once again, in this strategy, valuable data needed by the software vendor about the running of the service would be lost. For one thing, if there’s an error in reputation calculations, it may be impossible to know how many customers were ill-informed. That might be another acceptable business risk? Or not. In order to understand who may be affected, the service would probably have to keep reputation request history for each entity.

8. If reputation history is kept for each user of the system, then the system has a significant multitenancy challenge. Each customer expects that her or his reputation request history is private to the customer. A number of international jurisdictions have enacted laws, so-called “privacy” laws, which legislate exactly this premise: Browsing or other evidence of personal activity is private and, thus, protected information.

Since our cloud service is global, it will be subject to at least some jurisdictions’ privacy laws wherever it serves protected customers. Compliance is, of course, one driver of security posture. I would argue that merely to comply is to miss the point of security. There are other business drivers of an appropriate security posture. Large organizations, enterprises, governments, and the like, tend to take a dim view of loss of employee data, whatever that data may be. Meeting a customer’s expectation for protection of the customer’s data should, in spirit at least, also meet many legal privacy requirements.

Having established the need to keep at least some reputation request history for each user, how can user data protection be implemented? As noted above, this is a significant design problem. We will explore this only in terms of general patterns. An actual design for a specific product is out of scope.

We will not propose what some companies have attempted. Occasionally, a service will build what I call “table stakes” security—firewalls, intrusion prevention, administrative privilege controls, the collection of typical and well-known security infrastruc- ture—and then declare, “Your data are protected.” I’m not dismissing these controls. But none of the typical controls deal with multitenancy. Standards such as NIST 80053 are based upon an implicit assumption that the controls are built for a single organization’s security posture.[2] And that is not the case when infrastructure and processing is to be shared, in this case, highly shared. In the case of multitenant, shared services, customers expect to be segregated from each other and to be protected from the service vendor’s access, as well.

There are three architecture patterns that seem to be emerging to provide sufficient tenant data protection.

  • 1. Encrypt data as it enters the service; decrypt data when it exits.
  • 2. Separate processing within the infrastructure. Each customer essentially receives distinct infrastructure and processing.
  • 3. Encapsulate data such that it remains segregated as it is processed.
Add a comment
Know the answer?
Add Answer to:
As you consider the reputation service and the needs of customers or individual consumers, as well...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Create FMC Diagram: Case Study 1: Task 2 (group work): model the structure of the system for the B2C module. The FMC a...

    Create FMC Diagram: Case Study 1: Task 2 (group work): model the structure of the system for the B2C module. The FMC agram should cover these requirements: Browse products by department; pay online; search purchase history; chatbot (for resolvin simple service issues in a personalised way); track orders via website; and edit profile. You do not need to draw the FMC diagram for all nine B2C requirements Recommendations Determine the active elements (agents). 1. Find the relevant storages and connect...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today...

    e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet. They are aware of the opportunities and threats that are associated with the Web. Not a single traditional bank is brave enough to face investment analysts without an Internet strategy. But even a very thoughtful approach to the Web may do no good to the company/ organization. The main purpose behind launching online...

  • QUESTION 1 Jennell the car sales rep asks, "What style, size and features are you looking...

    QUESTION 1 Jennell the car sales rep asks, "What style, size and features are you looking for?" This is an ____________ Information gathering technique called an open ended question Information gathering technique called a closed ended question an information gathering technique called an objection None of the above 2 points QUESTION 2 Older workers are staying in the workforce longer and some take lower paid service jobs for supplimental income True False 2 points QUESTION 3 Sometimes our service to...

  • Discussion questions 1. What is the link between internal marketing and service quality in the ai...

    Discussion questions 1. What is the link between internal marketing and service quality in the airline industry? 2. What internal marketing programmes could British Airways put into place to avoid further internal unrest? What potential is there to extend auch programmes to external partners? 3. What challenges may BA face in implementing an internal marketing programme to deliver value to its customers? (1981)ǐn the context ofbank marketing ths theme has bon pururd by other, nashri oriented towards the identification of...

  • Accounting for Business Decisions – Starbucks You are to submit an individual one to two-page report...

    Accounting for Business Decisions – Starbucks You are to submit an individual one to two-page report answering the following from an accounting perspective, not a marketing/management perspective: You are required to: 1. Of all the risks (risks are listed at the bottom) that Starbuck’s management discloses, which one do you think could most adversely affect the Balance Sheet and Income Statement at the store level and why? Demonstrate your understanding by showing an effect one on at least one of...

  • Introduction: A manufacturing company that possesses many complexities can be highly challenged when maintaining production goals...

    Introduction: A manufacturing company that possesses many complexities can be highly challenged when maintaining production goals and standards in conjunction with a major organizational change. Garment manufacturing is a complex industry for many reasons. The product line is a complex array of styles, seasons, varying life cycles and multidimensional sizing. Many sewn product firms are viewing TQM as the appropriate strategy to meet the double demand of competition and quality; however, many companies are finding sustaining their TQM adoption decision...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Zipcar: “It’s Not About Cars—It’s About Urban Life” Imagine a world in which no one owns...

    Zipcar: “It’s Not About Cars—It’s About Urban Life” Imagine a world in which no one owns a car. Cars would still exist, but rather than owning cars, people would just share them. Sounds crazy, right? But Scott Griffith, CEO of Zipcar, the world’s largest car-share company, paints a picture of just such an imaginary world. And he has nearly 800,000 passionate customers—or Zipsters, as they are called—who will back him up. Zipcar specializes in renting out cars by the hour...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT