100%(1)100% found this document useful (1 vote) 557 views11 pagesCSCUv2 Module 01 Introduction To Data Security PDF
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
‘certing Secure Computer User eam 2-42
‘nwrogustion to Data Security
Introduction to Data Security
Module 01
‘Simplifying Security.
Certified Secure Computer User
Module 1: Introduction to Data Security
Exam 112-12
Mote 8 Page‘cerites secure Computer User fram sa242
‘marogustion to Data Security
Security News
‘Source: http://www.express.co.uk
Fraudsters had access to 30,000 Barclays customers for SEVEN years
In July 2015, in an unconnected raid, police found a memory stick with private information of
30,000 Barclays customers on it. Information like date of birth, salary information, debts, and
personal addresses were found on this memory stick. The Police believe that there are more
‘copies of this data and this stickis just the tip of the iceberg.
Barclays is convinced this stash of stolen information is part of the same data heist that the
‘company suffered back in 2008. What the company was telling its customers essentially was
‘that the fraudsters had their data for about seven years and the company did not know it.
itis difficult for anyone to estimate at this point, how much damage was done due to this data
Jeak and how many identities were compromised as a result.
Module Objectives
Atthe end of this module you will be able to:
* Understand what data is and the difference between data and information
™ Understand how often data is generated
™ Understand the importance of personal and organizational data
™ Understand the different threats to data
"Understand what data security is and the risks associated with data compromise
"Understand the elements of security
"Understand the potential losses due to a data breach
"Understand how to implement data security
Modise 0 Page? Certifed Score Computer User Copyright © by KE-beumell
‘Al Rimes Reserves Reprecuion © Si Promotes.‘coisas secure Computer User cm a2
‘ewogustion to Data Security
Data—Digital Building Blocks
‘What is Data?
In lay terms, data is unorganized facts that can be processed into meaningful information. It can
ibe in the form of text, numbers, symbols, pictures, or any other possible form. Anything that
tells you something about an object or entity is data. For example, your personal data is
‘constituted by your name, your address, and your height, amang other things.
How Often Do We Generate Data?
People generate data constantly as long as they are awake, and sometimes even after that. A
phone number that you save, a picture that you click on your phone, & map location that you
send someone, a Text message, 2 voicemail, a credit card transaction, everything is data. Data
gets generated even without us explicitly initiating it. Things like details of your last call, last
login time on your laptop, and even the amount of battery life left on your device is data.
Details about you after you are asleep, such as, how long your online accounts were inactive, or
after how many hours was a device accessed again, are also data. Such data may seem useless
to you but can be valuable to @ person planning an attack on your digital assets.
Data Vs. Information
Even though the terms data and information are often used interchangeably, there is @
distinction between them. Information is nothing but processed data which conveys a specific
meaning and is of substantial value. The difference between data and information is subjective
in nature. What is data to one person can be information to another and hence, the terms are
interchangeable. The difference is exactly like the one between music and noise. For example,
‘the route your cab takes to reach the destination can just be data to you, but itis information
to someone (maybe 3 parent) who is tracking the cab to see if you are being taken to the
correct place. Similarly, the time at which you reply to an email is just data for you but can be
information for the receiver of the mail if he/she wants to know how much time it took for the
‘email to reach its destination inbox. As a result, people use the terms data and information
interchangeably according to their personal context.
Importance of Data in the Information Age
Importance of Personal Data
Little details about people have never been this important in the history of mankind. Everything
from your address ta your favorite pet's name has the potential to do financial damage if they
fall into the wrong hands.
‘Apart from hurting people financially, personal information can also be used to do emotional
and physical damage. Intimate pictures or videos of you on your phone or computer can be
used against you to blackmail you or to simply embarrass you in public. There is no dearth of
cases where private pictures of celebrities have been stolen and put out publicly. In the social
networking era, where people post all sorts of personal details online, it has become
Mote 8 Page? Ceriied Secure Computer User Copyright © >y EE-Ceunell
Alligyes Reserves Raprecucieon eStreny Promotes.