Please enable JavaScript.
Coggle requires JavaScript to display documents.
:lock: compiuting :lock: - Coggle Diagram
:lock: compiuting :lock:
-
data
-
-
-
-
-
Data can be structured, tabular data, graph, data tree
info
-
-
-
-
-
Data can be structured, tabular data, graph, data tree
pivicy :silhouette:
• Data privacy is typically associated with the proper handling of personal data or personally identifiable information, such as names, addresses, Social Security numbers and credit card numbers.
• Data privacy is not a single concept or approach. Instead, it's a discipline involving rules, practices, guidelines and tools to help organizations establish and maintain required levels of privacy compliance.
Elements of Data Privacy
1.Legal framework. Prevailing legislation enacted and applied to data issues, such as data privacy laws.
-
3.Practices. Best-practices put in place to guide IT infrastructure, data privacy and protection.
4.Third-party associations. Any third-party organizations, such as cloud service providers, that interact with data.
5.Data governance. Standards and practices used to store, secure, retain and access data.
6.Global requirements. Any differences or variations of data privacy and compliance requirements among legal jurisdictions around the world such as the U.S. and European Union (EU).
-
Data Protection
1.Data loss prevention (DLP): A set of tools and processes used to secure data from theft, loss, misuse, deletion, or other illegal or inappropriate forms of contact
2.Firewalls: Tools used for monitoring and filtering the network traffic to ensure data is transferred or accessed only by authorized users
3.Encryption: Altering the content of data based on an algorithm that can be reversed only with the right encryption password or key. mEncryption protects data even if it gets stolen, since the data would be unreadable.
4.Data erasure: Deleting data that is no longer needed or relevant. This is also a requirement of the GDPR.
5.Data resiliency: Building resiliency systems within the software and hardware of an organization’s system to ensure the security in case of natural disasters or power outages
6.Data backups: A plan to securely back up data in case of failure or breach.Such backup plans may include a separate physical disk or cloud.
hacks
are
Black hat hackers are the "bad guys" of the hacking scene. They go out of their way to discover vulnerabilities in computer systems and software to exploit them for financial gain or for more malicious purposes, such as to gain reputation, carry out corporate espionage, or as part of a nation-state hacking campaign.
White hat hackers can be seen as the “good guys” who attempt to prevent the success of black hat hackers through proactive hacking. They use their technical skills to break into systems to assess and test the level of network security, also known as ethical hacking. This helps expose vulnerabilities in systems before black hat hackers can detect and exploit them.
dodo's attacks
are
1.A DDoS attack consists of a website being flooded by requests during a short period of time, with the aim of overwhelming the site and causing it to crash.
2.The ‘distributed’ element means that these attacks are coming from multiple locations at the same time, as compared to a DoS which comes from just one location.