<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Data Breach - Terrorist watch list in Privacy</title>
    <link>https://community.isc2.org/t5/Privacy/Data-Breach-Terrorist-watch-list/m-p/47007#M1355</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;&amp;nbsp; Yes, that was an expensive human mistake once again.&amp;nbsp; Why are they not using Homomorphic encryption, so if such mistakes occur, only authorised people can access it?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ILfuVd"&gt;&lt;SPAN class="hgKElc"&gt;Homomorphic Encryption (HE) refers to &lt;STRONG&gt;a special type of encryption technique that allows for computations to be done on encrypted data&lt;/STRONG&gt;, without requiring access to a secret (decryption) key. The results of the computations are encrypted, and can be revealed only by the owner of the secret key.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ILfuVd"&gt;&lt;A href="https://www.forbes.com/sites/bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/?sh=43a2c7f17e93" target="_blank"&gt;https://www.forbes.com/sites/bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/?sh=43a2c7f17e93&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ILfuVd"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute-Cautim&lt;/P&gt;</description>
    <pubDate>Wed, 18 Aug 2021 21:03:22 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2021-08-18T21:03:22Z</dc:date>
    <item>
      <title>Data Breach - Terrorist watch list</title>
      <link>https://community.isc2.org/t5/Privacy/Data-Breach-Terrorist-watch-list/m-p/46968#M1354</link>
      <description>&lt;P&gt;Apparently, the United States' classified "no-fly list" was &lt;A href="https://www.bleepingcomputer.com/news/security/secret-terrorist-watchlist-with-2-million-records-exposed-online/" target="_blank" rel="noopener"&gt;inadvertently disclosed&lt;/A&gt;&amp;nbsp;via a publicly-accessible server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Per the article, DHS (Department of Homeland Security) took three weeks post-disclosure to remove Internet access to the server.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Aug 2021 16:33:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Data-Breach-Terrorist-watch-list/m-p/46968#M1354</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2021-08-17T16:33:02Z</dc:date>
    </item>
    <item>
      <title>Re: Data Breach - Terrorist watch list</title>
      <link>https://community.isc2.org/t5/Privacy/Data-Breach-Terrorist-watch-list/m-p/47007#M1355</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;&amp;nbsp; Yes, that was an expensive human mistake once again.&amp;nbsp; Why are they not using Homomorphic encryption, so if such mistakes occur, only authorised people can access it?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ILfuVd"&gt;&lt;SPAN class="hgKElc"&gt;Homomorphic Encryption (HE) refers to &lt;STRONG&gt;a special type of encryption technique that allows for computations to be done on encrypted data&lt;/STRONG&gt;, without requiring access to a secret (decryption) key. The results of the computations are encrypted, and can be revealed only by the owner of the secret key.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ILfuVd"&gt;&lt;A href="https://www.forbes.com/sites/bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/?sh=43a2c7f17e93" target="_blank"&gt;https://www.forbes.com/sites/bernardmarr/2019/11/15/what-is-homomorphic-encryption-and-why-is-it-so-transformative/?sh=43a2c7f17e93&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ILfuVd"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute-Cautim&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 21:03:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Data-Breach-Terrorist-watch-list/m-p/47007#M1355</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-08-18T21:03:22Z</dc:date>
    </item>
  </channel>
</rss>

