100% found this document useful (2 votes)
219 views27 pages

Digital Security and Privacy: Presented By: Tanu Gupta Priyanka Gupta Nisha Yadav Shweta Nishad Riya Uttam

Data security and privacy presentation

Uploaded by

muskanbano4101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
219 views27 pages

Digital Security and Privacy: Presented By: Tanu Gupta Priyanka Gupta Nisha Yadav Shweta Nishad Riya Uttam

Data security and privacy presentation

Uploaded by

muskanbano4101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

DIGITAL SECURITY AND PRIVACY

PRESENTED BY:

• TANU GUPTA

• PRIYANKA GUPTA

• NISHA YADAV

• SHWETA NISHAD

• RIYA UTTAM
CONTENT
• What is digital security?
• What is digital privacy?
• Types of digital security and privacy.
• Importance of digital security and privacy
• What is big data security and privacy?
• Advantages of digital security and privacy
• Disadvantages of digital security and privacy
• What is data security risk?
• Difference between security and privacy.
• Digital security and privacy in cloud computing?
• Conclusion
DIGITAL SECURITY:

Digital security encompasses measures and practices taken to protect digital


information, systems, and assets from unauthorized access, cyber threats, and attacks.
This includes securing computer systems, networks, and electronic devices to prevent
data breaches, identity theft, malware, and other malicious activities.
Digital security involves the use of encryption –
• Firewalls
• antivirus software
• secure authentication methods
• smartphone SIMcards
TYPES OF DIGITAL SECURITY
Digital security encompasses various types to safeguard information and systems:
• Network Security: Protects computer networks from unauthorized access and attacks.

• Endpoint Security: Focuses on securing individual devices like computers and mobile
devices.

• Cloud Security: Ensures the security of data stored in cloud platforms and services.
• Application Security: Secures software and applications from vulnerabilities and
unauthorized access.
• Data Security: Protects data integrity, confidentiality, and availability.
• Identity and Access Management (IAM): Controls user access and authentication to systems
and data.

• Cryptography: Uses algorithms to secure data by encoding and decoding information.


• Security Awareness Training: Educates users to recognize and mitigate security threats.
Incident Response and Management: Plans and strategies to respond to and recover from security incidents.

Physical Security: Guards against physical threats to hardware and infrastructure.

Mobile Security: Focuses on securing mobile devices and the associated data.

IoT Security: Protects Internet of Things devices and networks from cyber threats.

Social Engineering Prevention: Strategies to counter manipulative tactics used to exploit human psychology.

Firewalls and Intrusion Detection Systems (IDS): Monitor and control network traffic to prevent unauthorized
access.

Backup and Recovery: Ensures data can be restored in case of loss or damage.

Implementing a combination of these measures helps create a robust defence against digital threats.
IMPORTANCE OF DIGITAL SECURITY

• Safeguarding Sensitive information


• Mitigating risks and vulnerabilities
• Maintaining customer trust and loyalty
• Compliance with regulation
DIGITAL SECURITY CORE PRINCIPLES
ADVANTAGES AND DISADVANTAGE OF DIGITAL SECURITY
EXAMPLES:
Phishing
These attacks are getting more sophisticated and can cause severe losses to
the victims.
Ransomware
These attacks work by infecting your network and locking down your data and
computer systems until a ransom is paid to the hacker.
Social engineering
These attacks are the most potent cybersecurity threats plaguing
enterprises. 98% of cyber attacks rely on social engineering.
Businesses need to have strong
DIGITAL PRIVACY

Internet privacy is important because it gives you control over your identity and personal
information. Without that control, anyone with the intention and means can manipulate your
identity to serve their goals, whether it is selling you a more expensive vacation or stealing
your savings.
Digital privacy—also called online privacy or Internet privacy—refers to the protection of
private citizens’ online information.
TYPES OF DIGITAL PRIVACY

Let’s explore the different types of data privacy followed in India:

1. Online Privacy

Websites often have a privacy policy where they have to explicitly state why they intend to collect and use your
data. Therefore, users must understand these policies to ensure their data is handled responsibly.

2. Residential Information Privacy

It pertains to the information about a citizen’s residence and cost of living. When a citizen’s private information
is collected, it should be kept private and secure.

3. Medical Privacy

This involves the protection of a user’s medical information. Such information should not be disclosed to
anyone other than the organization and the user. Additionally, doctor-patient confidentiality must be
maintained, or it amounts to a breach of medical privacy.

4. Financial Privacy

Financial privacy is concerned with the collection of financial information by a website or an organization. If this
information is not stored and protected properly, it can lead to fraudulent use of credentials by hackers.
•Individuality: Digital privacy helps people maintain their individuality and freedom of
expression.

•Safety: Digital privacy is rooted in a fundamental need for safety.

•Fraud and identity theft: Digital privacy protects people from fraud and identity thefts.

•Personal information: Digital privacy protects sensitive personal information like date of
birth, home address, bank account information, and personal hobbies.

According to a survey by FTI Consulting, 75% of organizations have made significant changes to
their data privacy programs.
BENEFITS AND DRAWBACKS OF DIGITAL PRIVACY
DIGITAL PRIVACY IS THE ABILITY TO CONTROL WHO HAS
ACCESS TO YOUR DIGITAL INFORMATION AND HOW IT IS USED
SOME EXAMPLES OF DIGITAL PRIVACY INCLUDE

• VPNs
• Biometric authentication
• Encryption
• Password managers
• Limiting data sharing
FACTS AND FIGURES ABOUT DIGITAL SECURITY AND
PRIVACY
• Cyberattacks
India is the most targeted country for cyberattacks, facing 13.7% of all attacks
globally. In 2022, India faced 700,000 malware attacks, up from 650,000 in
2021. State-sponsored cyberattacks against India increased 278% between 2021
and September 2023.
• Data breaches
In Q3 2023, India was the 10th most breached country globally, with 369,000
leaked accounts.
• Cybercrime
In 2018, India reported 208,456 cyber-related crimes. In the first two months of
2022 alone, there were 212,485 reported cyber crimes.
• Digital Protection Bill

The goal of this bill is to establish a framework for handling digital personal
data. The government has announced that it will implement the Act within 10
months, but has not yet set an effective date.

• Right to privacy

Article 21 of the Indian Constitution guarantees the right to life and personal
liberty. In 2017, the Supreme Court of India established that the right to privacy is a
fundamental right under Part III of the Constitution.

- m.economictimes.com
. -The centre for Internet and society
. - legelmantra.net
DIGITAL SECURITY AND PRIVACY IN CLOUD COMPUTING

Cloud computing is the on-demand access ,via the internet ,to computer resources –
application, servers( physical servers and virtual server), data storage, development tool,
over the internet with pay-as-you-go pricing .
Cloud Security: Cloud security is a collection of procedures and technology designed to
address external and internal threats to business security.
Cloud Privacy: Cloud privacy is the concept of sharing data while protecting certain
personal information.
TYPES OF CLOUD COMPUTING:
Cloud computing can be classified into three main types based on deployment models: public, private, and hybrid.

There are also four main types of cloud computing services:

• Infrastructure-as-a-Service (IaaS)

• Platforms-as-a-Service (PaaS)

• Software-as-a-Service (SaaS)

• Serverless computing

Here are some characteristics of the three main types of cloud computing:
• Public cloud: Offers flexibility and scalability. In a public cloud, two or more companies share the same
infrastructure, but they are logically separated by firewalls.

• Private cloud: Offers security and exclusivity.

• Hybrid cloud: Offers the best of both public and private clouds.

Here are some other types of cloud computing:

• Multi-cloud: Offers diversification and optimization.

• Community cloud: For organizations to leverage.


CONCLUSION:
Data privacy and protection

These are essential aspects of digital lives. They help protect confidential information, maintain compliance with laws
and regulations, build trust and reputation, and mitigate security risks.

Data security

This is critical to protecting digital information from unauthorized access, modification, or destruction. As more sensitive
data is stored and transmitted online, the importance of data security has become more critical than ever.

Privacy protection

As individuals grow more dependent on and connected to the cyberspace, they will become more reliant on
organizations’ effective implementation of cyber security and sensitivity to privacy.

Privacy is a fundamental right

Privacy is fundamental to our digital lives and that a society without meaningful protections for privacy is inadequate.

Selecting digital security tools

Choose a tool carefully and test it out before asking a lot of people to adopt it.

You might also like