100% found this document useful (1 vote)
522 views

CSCUv2 Module 01 Introduction To Data Security PDF

Uploaded by

konan franck
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
100% found this document useful (1 vote)
522 views

CSCUv2 Module 01 Introduction To Data Security PDF

Uploaded by

konan franck
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
‘certing Secure Computer User eam 2-42 ‘nwrogustion to Data Security Introduction to Data Security Module 01 ‘Simplifying Security. Certified Secure Computer User Module 1: Introduction to Data Security Exam 112-12 Mote 8 Page ‘cerites secure Computer User fram sa242 ‘marogustion to Data Security Security News ‘Source: http://www.express.co.uk Fraudsters had access to 30,000 Barclays customers for SEVEN years In July 2015, in an unconnected raid, police found a memory stick with private information of 30,000 Barclays customers on it. Information like date of birth, salary information, debts, and personal addresses were found on this memory stick. The Police believe that there are more ‘copies of this data and this stickis just the tip of the iceberg. Barclays is convinced this stash of stolen information is part of the same data heist that the ‘company suffered back in 2008. What the company was telling its customers essentially was ‘that the fraudsters had their data for about seven years and the company did not know it. itis difficult for anyone to estimate at this point, how much damage was done due to this data Jeak and how many identities were compromised as a result. Module Objectives Atthe end of this module you will be able to: * Understand what data is and the difference between data and information ™ Understand how often data is generated ™ Understand the importance of personal and organizational data ™ Understand the different threats to data "Understand what data security is and the risks associated with data compromise "Understand the elements of security "Understand the potential losses due to a data breach "Understand how to implement data security Modise 0 Page? Certifed Score Computer User Copyright © by KE-beumell ‘Al Rimes Reserves Reprecuion © Si Promotes. ‘coisas secure Computer User cm a2 ‘ewogustion to Data Security Data—Digital Building Blocks ‘What is Data? In lay terms, data is unorganized facts that can be processed into meaningful information. It can ibe in the form of text, numbers, symbols, pictures, or any other possible form. Anything that tells you something about an object or entity is data. For example, your personal data is ‘constituted by your name, your address, and your height, amang other things. How Often Do We Generate Data? People generate data constantly as long as they are awake, and sometimes even after that. A phone number that you save, a picture that you click on your phone, & map location that you send someone, a Text message, 2 voicemail, a credit card transaction, everything is data. Data gets generated even without us explicitly initiating it. Things like details of your last call, last login time on your laptop, and even the amount of battery life left on your device is data. Details about you after you are asleep, such as, how long your online accounts were inactive, or after how many hours was a device accessed again, are also data. Such data may seem useless to you but can be valuable to @ person planning an attack on your digital assets. Data Vs. Information Even though the terms data and information are often used interchangeably, there is @ distinction between them. Information is nothing but processed data which conveys a specific meaning and is of substantial value. The difference between data and information is subjective in nature. What is data to one person can be information to another and hence, the terms are interchangeable. The difference is exactly like the one between music and noise. For example, ‘the route your cab takes to reach the destination can just be data to you, but itis information to someone (maybe 3 parent) who is tracking the cab to see if you are being taken to the correct place. Similarly, the time at which you reply to an email is just data for you but can be information for the receiver of the mail if he/she wants to know how much time it took for the ‘email to reach its destination inbox. As a result, people use the terms data and information interchangeably according to their personal context. Importance of Data in the Information Age Importance of Personal Data Little details about people have never been this important in the history of mankind. Everything from your address ta your favorite pet's name has the potential to do financial damage if they fall into the wrong hands. ‘Apart from hurting people financially, personal information can also be used to do emotional and physical damage. Intimate pictures or videos of you on your phone or computer can be used against you to blackmail you or to simply embarrass you in public. There is no dearth of cases where private pictures of celebrities have been stolen and put out publicly. In the social networking era, where people post all sorts of personal details online, it has become Mote 8 Page? Ceriied Secure Computer User Copyright © >y EE-Ceunell Alligyes Reserves Raprecucieon eStreny Promotes.

You might also like