Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
100%
(1)
100% found this document useful (1 vote)
527 views
11 pages
CSCUv2 Module 01 Introduction To Data Security PDF
Uploaded by
konan franck
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CSCUv2 Module 01 Introduction to Data Security.pdf For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
100%
(1)
100% found this document useful (1 vote)
527 views
11 pages
CSCUv2 Module 01 Introduction To Data Security PDF
Uploaded by
konan franck
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CSCUv2 Module 01 Introduction to Data Security.pdf For Later
100%
100% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 11
Search
Fullscreen
‘certing Secure Computer User eam 2-42 ‘nwrogustion to Data Security Introduction to Data Security Module 01 ‘Simplifying Security. Certified Secure Computer User Module 1: Introduction to Data Security Exam 112-12 Mote 8 Page‘cerites secure Computer User fram sa242 ‘marogustion to Data Security Security News ‘Source: http://www.express.co.uk Fraudsters had access to 30,000 Barclays customers for SEVEN years In July 2015, in an unconnected raid, police found a memory stick with private information of 30,000 Barclays customers on it. Information like date of birth, salary information, debts, and personal addresses were found on this memory stick. The Police believe that there are more ‘copies of this data and this stickis just the tip of the iceberg. Barclays is convinced this stash of stolen information is part of the same data heist that the ‘company suffered back in 2008. What the company was telling its customers essentially was ‘that the fraudsters had their data for about seven years and the company did not know it. itis difficult for anyone to estimate at this point, how much damage was done due to this data Jeak and how many identities were compromised as a result. Module Objectives Atthe end of this module you will be able to: * Understand what data is and the difference between data and information ™ Understand how often data is generated ™ Understand the importance of personal and organizational data ™ Understand the different threats to data "Understand what data security is and the risks associated with data compromise "Understand the elements of security "Understand the potential losses due to a data breach "Understand how to implement data security Modise 0 Page? Certifed Score Computer User Copyright © by KE-beumell ‘Al Rimes Reserves Reprecuion © Si Promotes.‘coisas secure Computer User cm a2 ‘ewogustion to Data Security Data—Digital Building Blocks ‘What is Data? In lay terms, data is unorganized facts that can be processed into meaningful information. It can ibe in the form of text, numbers, symbols, pictures, or any other possible form. Anything that tells you something about an object or entity is data. For example, your personal data is ‘constituted by your name, your address, and your height, amang other things. How Often Do We Generate Data? People generate data constantly as long as they are awake, and sometimes even after that. A phone number that you save, a picture that you click on your phone, & map location that you send someone, a Text message, 2 voicemail, a credit card transaction, everything is data. Data gets generated even without us explicitly initiating it. Things like details of your last call, last login time on your laptop, and even the amount of battery life left on your device is data. Details about you after you are asleep, such as, how long your online accounts were inactive, or after how many hours was a device accessed again, are also data. Such data may seem useless to you but can be valuable to @ person planning an attack on your digital assets. Data Vs. Information Even though the terms data and information are often used interchangeably, there is @ distinction between them. Information is nothing but processed data which conveys a specific meaning and is of substantial value. The difference between data and information is subjective in nature. What is data to one person can be information to another and hence, the terms are interchangeable. The difference is exactly like the one between music and noise. For example, ‘the route your cab takes to reach the destination can just be data to you, but itis information to someone (maybe 3 parent) who is tracking the cab to see if you are being taken to the correct place. Similarly, the time at which you reply to an email is just data for you but can be information for the receiver of the mail if he/she wants to know how much time it took for the ‘email to reach its destination inbox. As a result, people use the terms data and information interchangeably according to their personal context. Importance of Data in the Information Age Importance of Personal Data Little details about people have never been this important in the history of mankind. Everything from your address ta your favorite pet's name has the potential to do financial damage if they fall into the wrong hands. ‘Apart from hurting people financially, personal information can also be used to do emotional and physical damage. Intimate pictures or videos of you on your phone or computer can be used against you to blackmail you or to simply embarrass you in public. There is no dearth of cases where private pictures of celebrities have been stolen and put out publicly. In the social networking era, where people post all sorts of personal details online, it has become Mote 8 Page? Ceriied Secure Computer User Copyright © >y EE-Ceunell Alligyes Reserves Raprecucieon eStreny Promotes.
You might also like
DPTL - Reading Material 2024-25
PDF
No ratings yet
DPTL - Reading Material 2024-25
261 pages
CHFI Computer Hacking Forensic Investigator Certification All in One Exam Guide 1st Edition by Charles Brooks ISBN 0071831568 9780071831567 - Get instant access to the full ebook content
PDF
100% (5)
CHFI Computer Hacking Forensic Investigator Certification All in One Exam Guide 1st Edition by Charles Brooks ISBN 0071831568 9780071831567 - Get instant access to the full ebook content
90 pages
Cambridge International As & A Level It: Coursebook
PDF
0% (3)
Cambridge International As & A Level It: Coursebook
10 pages
CSCUv2 Module 03 PDF
PDF
No ratings yet
CSCUv2 Module 03 PDF
22 pages
Examen Test
PDF
No ratings yet
Examen Test
12 pages
Data literacy notes
PDF
No ratings yet
Data literacy notes
5 pages
CSCU
PDF
100% (1)
CSCU
12 pages
Data Basics, Data Processing, Data Security and Document Management
PDF
No ratings yet
Data Basics, Data Processing, Data Security and Document Management
62 pages
Globalacad Cscu
PDF
50% (2)
Globalacad Cscu
84 pages
CSCUv2 FastTrack Outline en
PDF
100% (2)
CSCUv2 FastTrack Outline en
198 pages
Information Security Interview Questions
PDF
No ratings yet
Information Security Interview Questions
9 pages
CSCUv2 Module 01 Introduction To Data Security
PDF
No ratings yet
CSCUv2 Module 01 Introduction To Data Security
16 pages
CSCU Module 07 Securing Network Connections PDF
PDF
100% (2)
CSCU Module 07 Securing Network Connections PDF
60 pages
CSCUv2 Module 02 Securing Operating Systems
PDF
No ratings yet
CSCUv2 Module 02 Securing Operating Systems
58 pages
Intrusion Detection/Prevention Systems
PDF
100% (1)
Intrusion Detection/Prevention Systems
29 pages
CSCUv3 Version Change Document
PDF
No ratings yet
CSCUv3 Version Change Document
22 pages
Cyber Security and Ethical Hacking
PDF
No ratings yet
Cyber Security and Ethical Hacking
18 pages
Computer Security: Principles and Practice: Chapter 5: Malicious Software
PDF
No ratings yet
Computer Security: Principles and Practice: Chapter 5: Malicious Software
35 pages
Cit855 Cyber Security
PDF
100% (1)
Cit855 Cyber Security
17 pages
CSCUv2 Module 03 Malware and Antivirus
PDF
No ratings yet
CSCUv2 Module 03 Malware and Antivirus
13 pages
Mini Project Report-1
PDF
No ratings yet
Mini Project Report-1
39 pages
What Is A Malware Attack?
PDF
No ratings yet
What Is A Malware Attack?
4 pages
Lecture 1 CSCU (Autosaved)
PDF
No ratings yet
Lecture 1 CSCU (Autosaved)
25 pages
Chapter 10-Database Management
PDF
No ratings yet
Chapter 10-Database Management
31 pages
Fundamentals of Network Security
PDF
100% (1)
Fundamentals of Network Security
218 pages
Notes Unit 4 Computer Security
PDF
No ratings yet
Notes Unit 4 Computer Security
13 pages
CSCU Module 04 Data Encryption PDF
PDF
100% (1)
CSCU Module 04 Data Encryption PDF
23 pages
CSCUv2 Module 04 Internet Security
PDF
No ratings yet
CSCUv2 Module 04 Internet Security
18 pages
Virus Threats Including Network Viruses, Worms
PDF
No ratings yet
Virus Threats Including Network Viruses, Worms
67 pages
Fundamentals of Cyber Security II Lecture 1
PDF
No ratings yet
Fundamentals of Cyber Security II Lecture 1
20 pages
Cybersecurity Analyst Comptia
PDF
No ratings yet
Cybersecurity Analyst Comptia
15 pages
1 - Introduction - Week 1 - NS
PDF
No ratings yet
1 - Introduction - Week 1 - NS
46 pages
Lecture 2 Security Threats
PDF
No ratings yet
Lecture 2 Security Threats
56 pages
Comptia Pentest pt0 002 Exam Objectives (4 0)
PDF
No ratings yet
Comptia Pentest pt0 002 Exam Objectives (4 0)
17 pages
Security+ 601 Test 3
PDF
No ratings yet
Security+ 601 Test 3
26 pages
Chapter 3 - Cyber Security
PDF
No ratings yet
Chapter 3 - Cyber Security
20 pages
CSCU Exam Info and Test Objective
PDF
100% (2)
CSCU Exam Info and Test Objective
7 pages
Chapter 4 Computer Security
PDF
No ratings yet
Chapter 4 Computer Security
10 pages
Server Roles and Features
PDF
No ratings yet
Server Roles and Features
16 pages
Cyber Security-Terminology
PDF
No ratings yet
Cyber Security-Terminology
13 pages
Cryptography (CSC316) : Unit I: Introduction and Classical Ciphers
PDF
No ratings yet
Cryptography (CSC316) : Unit I: Introduction and Classical Ciphers
31 pages
Chapter 1 of Computer Security
PDF
No ratings yet
Chapter 1 of Computer Security
44 pages
TYCS SEM - 6 P - 5 ETHICAL HACKING UNIT - 1 Introduction To Information Security
PDF
100% (1)
TYCS SEM - 6 P - 5 ETHICAL HACKING UNIT - 1 Introduction To Information Security
11 pages
Cyber Security - Network Intrusion Case Study
PDF
No ratings yet
Cyber Security - Network Intrusion Case Study
9 pages
CSCU
PDF
No ratings yet
CSCU
1 page
Communication and Network Concepts
PDF
100% (1)
Communication and Network Concepts
16 pages
KSK7023 Network Security
PDF
No ratings yet
KSK7023 Network Security
26 pages
Set 19 (Q541 To Q570) - CEH v11
PDF
No ratings yet
Set 19 (Q541 To Q570) - CEH v11
8 pages
Internet Server Management L1
PDF
100% (1)
Internet Server Management L1
7 pages
Cyber Security Powerpoint
PDF
0% (1)
Cyber Security Powerpoint
10 pages
CSCU Module 05 Data Backup and Disaster Recovery PDF
PDF
100% (5)
CSCU Module 05 Data Backup and Disaster Recovery PDF
51 pages
Chapter 3 Quiz
PDF
No ratings yet
Chapter 3 Quiz
4 pages
Cheat Sheet - CHFI
PDF
No ratings yet
Cheat Sheet - CHFI
1 page
CSCU Exam Blueprint v1 PDF
PDF
No ratings yet
CSCU Exam Blueprint v1 PDF
3 pages
Aaa Security
PDF
No ratings yet
Aaa Security
9 pages
Cyber MCQ Links
PDF
No ratings yet
Cyber MCQ Links
1 page
Certified Secure Computer User: What Is CSCU? Course Content Who's It For?
PDF
No ratings yet
Certified Secure Computer User: What Is CSCU? Course Content Who's It For?
1 page
Ec Council Certified Security Analyst Ecsa v8
PDF
No ratings yet
Ec Council Certified Security Analyst Ecsa v8
5 pages
Cybrary - Computer and Hacking Forensics
PDF
No ratings yet
Cybrary - Computer and Hacking Forensics
3 pages
Principles of Information Security
PDF
No ratings yet
Principles of Information Security
23 pages