Skip to content
  • Sign In
  • Try Now
View all events
Data Security & Privacy

Infrastructure Privacy: An Introduction for Network Engineers

Published by Pearson

Intermediate content levelIntermediate

Is your infrastructure leaking private information?

  • Are impacted as individual users of services and the networks they manage
  • Need to know legal and ethical aspects of protecting the privacy of their users
  • Need to know some practical techniques used to protect the privacy of individuals

Privacy is important to every IT professional, including network engineers—but there is very little training oriented towards anyone other than privacy professionals. This training aims to provide a high-level overview of privacy and how privacy impacts network engineers.

Information technology professionals are often perceived as “experts” on “all things IT,” and hence are bound to face questions about the importance of privacy, and how individual users can protect their privacy in more public settings.

What you’ll learn and how you can apply it

By the end of the live online course, you’ll understand:

  • The importance of privacy and how to answer some common myths about privacy
  • The lifecycle of information and its relationship to privacy
  • The conflicting goals of making information useful and preserving privacy
  • The legal landscape of privacy
  • Tools used to preserve privacy in collection, retention, and transmission of data
  • Privacy considerations in network operations

And you’ll be able to:

  • Explain and defend the importance of privacy to individuals and organizations
  • Ask the right questions about the legal implications of privacy in your jurisdiction
  • Know where and how to look for private information gathered in infrastructure operation
  • Know how to protect private information
  • Know how the infrastructure can support privacy of internal and external user data
  • Provide general recommendations for users interested in understanding privacy issues and protecting their personal privacy

This live event is for you because...

  • You want to understand the importance of privacy
  • You want to have a good overview of the legal landscape of privacy
  • You want to know how to protect users’ privacy
  • You want to know how to answer questions about privacy and the larger IT ecosystem

Prerequisites

  • A solid understanding of Internet systems, such as DNS
  • A good understanding of network design and network operations
  • A general understanding of application design, operation, and deployment

Recommended Follow-up

Schedule

The time frames are only estimates and may vary according to how the class is progressing.

The Privacy Problem (40 minutes)

  • Breaches and failures are becoming more common (examples here)
  • The cost of a privacy breach
  • The legal landscape

The Obvious Answer: Legal Compliance (10 minutes)

  • So long as I can’t be sued...
  • Legal compliance is not enough

(10-minute break)

Privacy is a Human Right (25 minutes)

  • What is privacy?
  • The importance of privacy to the individual

Privacy Principles (25 minutes)

  • Data lifecycle from a privacy perspective
  • Properties of data from a privacy perspective
  • Contrasting views of information collection
  • Contrasting views of information disclosure
  • Contrasting views of information retention
  • Contrasting views of information destruction
  • The relationship between privacy and security

(10-minute break)

Privacy in Infrastructure (30 minutes)

  • Are you collecting PII? (Yes)
  • Are you asking for consent in some way? (Probably not)
  • Are you collecting EEFI kinds of information? (Almost certainly)

(10-minute break)

Preserving Privacy for Users (20 minutes)

  • Responsibilities when handling private information
  • Deciding what you really need to collect and preserve
  • Best practices for protecting privacy when handling infrastructure data
  • Considerations on transporting and storing data

Advice to Users for Preserving Privacy (30 minutes)

  • General advice for preserving privacy on the ‘net
  • General surveillance techniques
  • Use privacy-focused services
  • Consider how much you carry on your phone
  • The usefulness of VPNs for the individual user

Your Instructor

  • Russ White

    Russ White has experience in designing, deploying, breaking, and troubleshooting large scale networks, and is a strong communicator from the white board to the board room. He has co-authored more than forty software patents, participated in the development of several Internet standards, helped develop the CCDE and the CCAr, and worked in Internet governance with the Internet Society. Russ has a background covering a broad spectrum of topics, including radio frequency engineering and graphic design, and is an active student of philosophy and culture. Russ is a co-host of the Hedge podcast, serves on the Routing Area Directorate and the Internet Architecture Board at the IETF, co-chairs the BABEL working group, and serves on the Technical Services Council/as a maintainer on the open source FR Routing project. His most recent works are Computer Networking Problems and Solutions and Unintended Dystopia. Russ regularly teaches live webinars on Internet technology through Safari Books Online, as well. MSIT Capella University MACM Shepherds Theological Seminary PhD, Southeastern Baptist Theological Seminary CCIE #2635, CCDE 2007::1, CCAr

    linkedinXlinksearch