Skip to main content

Currently Skimming:

Cybersecurity and Privacy-Introduction--David Brumley and Daniela Oliveira
Pages 3-4

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 3...
... Furthermore, the Internet era exposes the challenge of protecting people's privacy, such as personal information, life habits, social networks, health conditions, and personal beliefs. Who owns and can profit from people's data?
From page 4...
... For example, a web server handling credit card numbers may use a network firewall to restrict access to only authorized computers, an intrusion detection system for detecting suspicious behaviors, and a secure communication protocol with its clients to encrypt the credit card numbers. The best results come when security and privacy are engineered into the design from the beginning.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.