information theft arises so often that it is convenient
to call it CPRD-risk, from the first letters of
collector, purpose, retention time, and disclose-to.
The risks in Table 6 were obtained as follows. For
the first and second rows, it was noticed that the
personal information flows through transmission
paths connecting physically distinct units. The risk
questions of Table 2 were then considered, leading
to possible man-in-the-middle attacks that give rise
to CPRD-risk. Notice that “(1, 2, 3 / path between A
and D)” is excluded because A and D both run on
the same platform (so the path is not very accessible
to attack). For the third row, violations of PII are
always possible unless strict controls are in place
against it. For the fourth row, it was observed that
private data are input to information use processes
A, I, L, C, K, O. The risk questions of Table 2 were
again considered, leading to possible Trojan horse or
hacker attacks that again give rise to CPRD-risk. For
the fifth row, it was noticed that private data are
stored in databases. Once again the risk questions
were considered, leading to possible SQL attacks
against the databases, giving rise to CPRD-risk. For
the second to last row, it was noticed that private
information stored in databases could be subject to
insider attacks. Finally, for the last row, it was
observed that the private data stored in the databases
could be kept past their retention times. In each of
these rows, knowledge of the system (private data
locations) and knowledge of information security
(possible attacks) were needed to identify the risks.
It should be noted that the links between G and B, G
and M, and G and H are also vulnerable to man-in-
the-middle attacks, but these attacks would not be
privacy attacks, since these links are not used for
private information. Non-privacy attacks are outside
the scope of this paper.
Table 6: Privacy risks table corresponding to Fig. 2.
(PIIs / locations) Privacy Risks
(1, 2, 3 / path into A);
(1, 2, 3 / path into I);
(1, 2, 3 / path into L)
Man-in-the-middle attacks lead to
CPRD-risk.
(1, 2, 3 / path between I
and J); (1, 2, 3 / path
between L and N); (1, 3 /
path between N and O)
Man-in-the-middle attacks lead to
CPRD-risk.
(1, 2, 3 / path into A); (1,
2, 3 / path into I);
(1, 2, 3 / path into L)
The user could be asked for personal
information that violates PII (i.e. asked
for PII other than 1, 2, 3).
(1, 2, 3 / A, I, L); (1, 3 /
C, K, O)
Trojan horse, or hacker attacks on the
personal information use circles lead to
CPRD-risk.
(1, 2, 3 / D, J, N)
Potential SQL attacks on D, J, and N
lead to CPRD-risk.
(1, 2, 3 / D, J, N)
Potential insider attack steals private
information from D, J, and N resulting
in CPRD-risk.
(1, 2, 3 / D, J, N)
Private information in D, J, and N
could be kept past the retention time.
5.2 Mitigation of Privacy Risks
Applying the method for privacy risk mitigation
described in Section 4.2 produces Table 7,
containing the weights (Step 1) and mitigations
(Step 2) corresponding to the risks identified in
Table 6.
The weights in Table 7 were assigned as follows.
A weight of [L, H, L, H] was assigned to the first
row after the same considerations as that described
in Section 4.2 for man-in-the-middle attacks. A
weight of [M, M, L, H] was assigned to the second
row since the paths in this row are relatively short
(connecting components in the same module),
leading to greater risk for the attacker (greater risk of
being seen) and lower accessibility (fewer places to
access the link). A weight of [L, H, L, M] was
assigned to the third and last rows out of the same
considerations as in Section 4.2, for the risk of the
user being asked for information that violates PII
and the risk of private information kept past the
retention time. A weight of [L, H, L, H] was
assigned to the Trojan horse or hacker attack in the
fourth row and the SQL attacks in the fifth row since
the attacker could operate from a distance with easy
access through the Internet and with relatively low
costs. A weight of [L, H, L, H] was assigned to the
risk of an insider attack in the sixth row since an
insider can hide in plain sight, has high access by
virtue of being an insider, and carry out the attack at
zero cost to herself.
The privacy risks in Table 7 were prioritized
using the Mitigation Policy “only mitigate risks with
weights [L, *, *, H]”.
6 RELATED WORK
This section primarily concerns related works
involving privacy risk prioritization and mitigation.
Please consult (Yee, 2016) for related works on
privacy risk identification.
In terms of risk prioritization, no references were
found that deals directly with the prioritization of
privacy risks. However, abundant work exists on the
assessment of security risks, which is closely related
to prioritizing privacy risks. (Alizadeh and Zannone,
2016) present a risk-based framework that facilitates
the analysis of business process executions. The
framework detects non-conforming process
behaviors and ranks them according to criticality,
which is determined by the execution’s impact on
organizational goals. The criticality ranking enables
a security analyst to prioritize the most severe