Please enable JavaScript.
Coggle requires JavaScript to display documents.
:lock: cibercicurity :lock: - Coggle Diagram
:lock: cibercicurity :lock:
Information is created when that data has been processed and becomes meaningful
a cosumer's data is also valuabe because industries can adviese them thigs that they may buy.
may also collect data about
personal info :silhouette:
Name, date of birth :tada:
content you provide them with :iphone:
Images, status updates, emojis created :sunrise_over_mountains:
data you haveon others :silhouettes:
Names of your friends and their numbers
behaviour :computer:
What pages you visited, groups you are a member of, what you have ‘liked’
data must be
Used fairly, openly, and in accordance with the law
Used for a specific and stated reason
Used only in a way that is necessary and sufficient for the purpose for which it was collected
Accurate and up-to-date
Only kept for as long as it is needed
Protected against loss, damage, and unauthorised access
You also have rights when an organisation is using your personal data for:
Automated decision-making processes without human involvement (for example, when a computer decides if you should be approved for a loan)
Profiling, for example to predict your behaviour or interests
data
Data is a raw and unorganized fact that is required to be processed to make it meaningful
Data does not have any specific purpose
Data alone has no significance
Data never depends on Information
Data measured in bits and bytes
Data can be structured, tabular data, graph, data tree
info
Data is a raw and unorganized fact that is required to be processed to make it meaningful
Data does not have any specific purpose
Data alone has no significance
Data never depends on Information
Data measured in bits and bytes
Data can be structured, tabular data, graph, data tree
pivicy :silhouette:
• Data privacy is typically associated with the proper handling of personal data or personally identifiable information, such as names, addresses, Social Security numbers and credit card numbers.
• Data privacy is not a single concept or approach. Instead, it's a discipline involving rules, practices, guidelines and tools to help organizations establish and maintain required levels of privacy compliance.
Elements of Data Privacy
1.Legal framework. Prevailing legislation enacted and applied to data issues, such as data privacy laws.
2.Policies. Established business rules and policies to protect employees and user data privacy.
3.Practices. Best-practices put in place to guide IT infrastructure, data privacy and protection.
4.Third-party associations. Any third-party organizations, such as cloud service providers, that interact with data.
5.Data governance. Standards and practices used to store, secure, retain and access data.
6.Global requirements. Any differences or variations of data privacy and compliance requirements among legal jurisdictions around the world such as the U.S. and European Union (EU).
data potection is important because
1.Data protection is important, since it prevents the information of an organization from fraudulent activities, hacking, phishing, and identity theft.
As the amount of data stored and created increases, so does the importance of data protection. Data breaches and cyber attacks can cause devastating damages.
Ultimately, the key principle and importance of data protection is safeguarding and protecting data from different threats and under different circumstances.
Data Protection
1.Data loss prevention (DLP): A set of tools and processes used to secure data from theft, loss, misuse, deletion, or other illegal or inappropriate forms of contact
2.Firewalls: Tools used for monitoring and filtering the network traffic to ensure data is transferred or accessed only by authorized users
3.Encryption: Altering the content of data based on an algorithm that can be reversed only with the right encryption password or key. mEncryption protects data even if it gets stolen, since the data would be unreadable.
4.Data erasure: Deleting data that is no longer needed or relevant. This is also a requirement of the GDPR.
5.Data resiliency: Building resiliency systems within the software and hardware of an organization’s system to ensure the security in case of natural disasters or power outages
6.Data backups: A plan to securely back up data in case of failure or breach.Such backup plans may include a separate physical disk or cloud.
hacks
are
Black hat hackers are the "bad guys" of the hacking scene. They go out of their way to discover vulnerabilities in computer systems and software to exploit them for financial gain or for more malicious purposes, such as to gain reputation, carry out corporate espionage, or as part of a nation-state hacking campaign.
White hat hackers can be seen as the “good guys” who attempt to prevent the success of black hat hackers through proactive hacking. They use their technical skills to break into systems to assess and test the level of network security, also known as ethical hacking. This helps expose vulnerabilities in systems before black hat hackers can detect and exploit them.
dodo's attacks
are
1.A DDoS attack consists of a website being flooded by requests during a short period of time, with the aim of overwhelming the site and causing it to crash.
2.The ‘distributed’ element means that these attacks are coming from multiple locations at the same time, as compared to a DoS which comes from just one location.