IT security or cybersecurity is an overarching principle in IT and computer science. Cybersecurity manages cyber risks to data, processes, users and assets. It includes not only control of data and access to data, but also processes as well as physical and virtual assets. IT security practices include, for example, endpoint security that controls the display of data on a smartphone, or “data in use” measures to protect network data and infrastructure from hacking or cyberattacks.
Privacy is related to security but is a different issue. Privacy is about the individual’s rights to own the data generated by his/her activities, to restrict the flow of that data, to determine who may have access to that data, and to determine how the data may be used. Privacy in IT systems is there to protect a human being’s personal information.
IT mechanisms that ensure security also benefit privacy, but security alone is insufficient. For example, government agencies may ensure that the data they collect is secured via encryption, but that data may not protect an individual’s privacy or could even violate personal privacy. In many discussions about cybersecurity, the focus is on digital security, while the digital privacy of users is ignored or even violated.
As such, software and system architects must take privacy into account throughout their entire engineering process. Approaches such as Privacy by Design and Digital Rights Management support this goal.
Which brings us to trust. What is trust in a wireless network?
In a data network, trust is about the expected outcome when communicating remotely with a 3rd party in a session, when clicking on a link, or when opening an email. The possible outcomes could be the expected, positive ones (e.g. reading the message in an email) or could be negative (e.g. being hacked, cheated or tricked in some way). Trust at the networking level includes addressing questions such as:
- Can this host communicate with another host without being hacked in the process?
- Could this interaction lead to a loss of data or loss of privacy?
- Is it possible that the addresses in the data packets are spoofed?
Trust includes both tangible and intangible elements, all of which must be present to establish trust. Trust is built upon both security and privacy as tangible elements, but also upon an intangible “feeling” of trust that can come, e.g., from word-of-mouth recommendations or a professional user interface.
In a mobile or wireless network, trust includes the additional element of health: is the radiation from antennas or handsets harmful or innocuous? Should I be concerned about the long-term effects of living near an antenna tower or leaving my phone on the night table?