scispace - formally typeset
Journal ArticleDOI

Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance

Reads0
Chats0
TLDR
The GDPR regulation is described in detail, the specific challenges that may arise when applying malware/stegomalware solutions are indicated, and several recommendations for ensuring compliance with the regulation are provided.
Abstract
Never before has cybersecurity been as significant for societies as today; its importance is still on the rise as people rely on computer systems every day. Recently, the ever-growing issues of personal data being stolen or misused have been addressed by several legal regulations, the most significant of them being the General Data Protection Regulation (GDPR). The paper deals with a specific cybersecurity measure, malware/stegomalware detection. This solution, which is meant to protect personal data from being used in a way that breaks the GDPR, has to be GDPR-compliant itself. This work describes the GDPR regulation in detail, indicates the specific challenges that may arise when applying malware/stegomalware solutions, and provides several recommendations for ensuring compliance with the regulation.

read more

Citations
More filters
Journal ArticleDOI

A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment

TL;DR: This paper proposes time window embedding solutions that efficiently process a massive amount of data and have a low-memory-footprint at the same time and formally evaluates various machine-learning schemes and discusses their effectiveness in the IoT-related context.
Journal ArticleDOI

A $10 million question and other cybersecurity-related ethical dilemmas amid the COVID-19 pandemic

TL;DR: In this article, the authors conducted a broad and comprehensive horizon-scanning study to identify the ethical issues that cybersecurity/cybercrime might bring about in the future, and presented the results of their horizon scanning study concerning the ethical dilemmas that emerged amid the COVID-19 pandemic.
Journal ArticleDOI

First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions

TL;DR: In this paper, the authors present the results of a horizon scanning study aimed at identifying the ethical and human rights dilemmas that may arise in relation to cybersecurity and cybercrime; in the paper, the identified "weak signals" have been presented, that is, the ideas or concerns which are less obvious, not widely researched or present in the media.
Journal ArticleDOI

How to Effectively Collect and Process Network Data for Intrusion Detection

TL;DR: In this article, several feature selection techniques have been applied on five flow-based network intrusion detection datasets, establishing an informative flowbased feature set, and the results show that a set of 10 features and a small amount of data is enough for the final model to perform very well.
References
More filters
Book ChapterDOI

Consolidated Version of the Treaty on the Functioning of the European Union

Rhona Smith
TL;DR: The Treaty on the Functioning of the European Union (TFEU) as mentioned in this paper is a Treaty of Lisbon that was originally signed in Rome in 1957 as the Treaty establishing the European Economic Community (The Treaty of Rome) then becoming Treaty establishing European Community (TEC).

ARTICLE 29 Data Protection Working Party

TL;DR: In 2010, the European Data Protection Authorities (the Article 29 Working Party [WP29]) discussed the data protection and privacy implications of the Anti-Counterfeiting Trade Agreement (ACTA).
Journal ArticleDOI

Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

TL;DR: This work reviews all controversies around the new stringent definitions of consent revocation and the right to be forgotten and argues that such enforcement is indeed feasible provided that implementation guidelines and low-level business specifications are put in place in a clear and cross-platform manner in order to cater for all possible exceptions and complexities.
Journal ArticleDOI

The rise of malware

TL;DR: The number of papers published by Asian countries such as China, Korea, India, Singapore and Malaysia in relation to the Middle East and North America is discussed and there are several significant impacts of research activities in Asia, in comparison to other continents.
Trending Questions (2)
Whats the relationship between GDPR and cybersecurity regulations?

GDPR is a crucial cybersecurity regulation addressing personal data protection. Compliance with GDPR is essential for stego/malware detection tools to safeguard data and adhere to legal requirements.

How security best practices such as Cyber Essentials Pluswould help in GDPR compliance?

The provided paper does not mention "Cyber Essentials Plus" or how it would help in GDPR compliance. The paper discusses the importance of cybersecurity and the challenges of achieving GDPR compliance in the context of malware/stegomalware detection tools.