Virtualization Solutions Supporting Privacy and Data Protection in Online Activities

Open access

Abstract

Nowadays, smart devices like computers, tablets, and smartphones allow transmitting the information everywhere, with high speed, over the World Wide Web. However, risks regarding data integrity, privacy and security when using the Internet, increased dramatically, as methods designed to exploit the system’s vulnerabilities are more and more sophisticated. Therefore the need for people working in professional environments to protect their private data when using unsecure connections, by employing advanced tools. There are multiple solutions, but we will focus on the use of virtualization software like VMware or Oracle Virtual Box, together with traditional privacy measures (use of proxies and VPN’s). Today’s smart devices store an important amount of data about their owners and, in most of the cases, people don’t even realize this. Installing and using protection means is often not enough. They have to be properly setup in order to ensure the desired level of security, or anonymity, when using the Internet, and require for the military personnel a good knowledge not only about cyber vulnerabilities and risks, but also technical capabilities and features of the employed security solutions.

DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence (HCOE).

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] https://ccdcoe.org/library/publications/open-source-intelligence-open-social-intelligence-and-privacy-by-design-a-meta-level-rule-of-law/.

  • [2] https://www.hotnews.ro/stiri-esential-18726335-pagina-facebook-este-spatiu-public-nuprivat-arata-decizie-irevocabila-inaltei-curti-justitie-casatie.htm.

  • [3] https://uklabourlawblog.com/2018/06/22/i-lost-my-job-over-a-facebook-post-was-that-fair/.

  • [4] Gábor Pék Levente Buttyán Boldizsár Bencsáth A Survey of Security Issues in Hardware Virtualization ACM Computing Surveys Vol. 45 No. 3 Article 40 Publication date: June 2013 p. 40:1.

  • [5] https://www.vmware.com/support/ws4/doc/preserve_snapshot_ws.html.

  • [6] Kathleen Downer Maumita Bhattacharya BYOD Security: A New Business Challenge The 5th International Symposium on Cloud and Service Computing (SC2 2015) IEEE CS Press.

  • [7] Teemu Väisänen Alexandria Farar Nikolaos Pissanidis Christian Braccini Bemhards Blumbergs Enrique Diez Defending mobile devices for high level officials and decision-makers NATO Cooperative Cyber Defence Centre of Excellence Tallin 2015 p. 74.

  • [8] https://svmp.github.io/.

Search
Journal information
Target audience: researchers in the fields of political and financial law
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 26 26 9
PDF Downloads 14 14 3