home/dictionary/framework/Security Analysis of Subject Access Request Procedures: How to Authenticate Data Subjects Safely When They Request for Their Data

Dictionary · Security Analysis of Subject Access Request Procedures: How to Authenticate Data Subjects Safely When They Request for Their Data

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
1 sense under Security Analysis of Subject Access Request Procedures: How to Authenticate Data Subjects Safely When They Request for Their Data

Nouns

1 sense
Impersonation

A malicious individual is able to impersonate a legitimate data subject to the data controller. The adversary forges a valid access request and goes through the identity verification enforced by the data controller. The data controller sends to the adversary the data of a legitimate data subject. Defeating impersonation is the primary objective of any authentication protocol. The result of this attack is a data breach (e.g. blaggers [sic] pretend to be someone they are not in order to wheedle out the information they are seeking obtaining information illegaly which they then sell for a specified price).