0% found this document useful (0 votes)
136 views4 pages

Information Priv and Sec

Privacy relates to an individual's control over their personal information and how it is used, while security refers to how personal information is protected. Privacy can be compromised if data is shared or sold without consent. Security can be compromised through data breaches where cybercriminals access databases. Both privacy and security are at risk if personal information stored in various places is not properly protected. Maintaining both privacy and security is challenging in today's digitally connected world where information is collected and shared through many sources.

Uploaded by

Pradip Bastola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views4 pages

Information Priv and Sec

Privacy relates to an individual's control over their personal information and how it is used, while security refers to how personal information is protected. Privacy can be compromised if data is shared or sold without consent. Security can be compromised through data breaches where cybercriminals access databases. Both privacy and security are at risk if personal information stored in various places is not properly protected. Maintaining both privacy and security is challenging in today's digitally connected world where information is collected and shared through many sources.

Uploaded by

Pradip Bastola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Information Privacy and Security:

Introduction:
When it comes to privacy and security, it’s a good idea to have both.
Each can impact your cyber safety. But what’s the difference?
Privacy and security are related. Privacy relates to any rights you have
to control your personal information and how it’s used. Think about
those privacy policies you’re asked to read and agree to when you
download new smartphone apps.
Security, on the other hand, refers to how your personal information
is protected. Your data — different details about you — may live in a
lot of places. That can challenge both your privacy and your security.
Some people regard privacy and security as pretty much the same
thing. That’s because the two sometimes overlap in a connected world.
But they aren’t the same, and knowing how they differ may help you to
protect yourself in an increasingly connected world.

What’s the difference between privacy and security?


Here’s an example. You might share personal information with your
bank when you open a checking account. What happens after that?
Here are three possible outcomes, all related to your personal
information (not to the money you may have deposited in the checking
account).

1. Your privacy and security are maintained. The bank uses your
information to open your account and provide you with products
and services. They go on to protect that data.
2. Your privacy is compromised, and your security is maintained. The
bank sells some of your information to a marketer. Note: You may
have agreed to this in the bank’s privacy disclosure. The result?
Your personal information is in more hands than you may have
wanted.
3. Both your privacy and security are compromised. The bank gets
hit by a data breach. Cybercriminals penetrate a bank database,
a security breach. Your information is exposed and could be sold
on the dark web. Your privacy is gone. You could become the
victim of cyber fraud and identity theft.

It would be great if your risks began and ended with that theoretical
bank. But your personal information is likely all over the connected
world — in government offices, at healthcare providers, at stores and
restaurants, and in many of your online accounts. You might say it’s
everywhere — not literally, but it’s certainly in enough places that it’s
out of your control.
If a cybercriminal accesses that information, it could be off to the races.
Your privacy and security could both get trampled.

Ans:
Information privacy and security are related. Privacy relates to any
rights you have to control your personal information and how it’s used.
Security, on the other hand, refers to how your personal information is
protected.
Information Privacy:
Information privacy is the relationship between the collection and
dissemination of data, technology, the public expectation of privacy,
and the legal and political issues surrounding them. It is also known
as data privacy or data protection. (dissemination=spreading data)
In this digital world, our personal information is present in many places
like in medical records, in government offices, in our social media
accounts, bank accounts and soon. If these data leak, then our privacy
and security come under direct risks.
Data privacy is challenging since it attempts to use data while
protecting an individual's privacy preferences and personally
identifiable information. The fields of information privacy and security
design and utilize software, hardware and human resources to address
this issue.
Information Security:
Information security, sometimes shortened to ‘infosec’, is the practice
of protecting information by mitigating information risks. It is a set of
practices intended to keep data secure from unauthorized access or
alterations, both when it's being stored and when it's being
transmitted from one machine or physical location to another. It is
also referred to as data security.
The basic components of information security are:
1.Confidentiality: Data is confidential when only those people who
are authorized to access it can do so. To ensure confidentiality, you
need to be able to identify who is trying to access data and block
attempts by those without authorization. Passwords, authentication
code, pin codes, etc. are all techniques designed to ensure
confidentiality.
2.Integrity: It means maintaining data in its original form and
preventing it from being improperly modified, either by accident or
maliciously.
3.Availability: The information should be confidential to unauthorized
access but it should be available to the authorized body who have the
proper permissions.

You might also like