Digital Literacy Topic 2-1
Digital Literacy Topic 2-1
Digital Literacy Topic 2-1
Data: This is the information that has been translated into a form that is efficient for movement
or processing.
Privacy refers to the fundamental right and concept that individuals have the authority to control
their personal information, limiting who has access to it and how it is used
Privacy is a critical aspect of personal freedom, autonomy, and human dignity, and it is essential
for maintaining trust in both physical and digital interactions.
Data privacy /Information privacy: It is the aspect of information technology that deals with
the ability of an organization or individual to determine what data in a computer system can be
shared with third parties.
Security threats: This is the process of an illegal entity gaining access to a company’s data or
information.
Control measures: This is any measure taken to eliminate or reduce the risk of security threats.
Cyber criminals: These are illegal users who use many different methods to lure you into
parting with your confidential personal or business information.
Data security in an automated environment refers to the measures and practices implemented
to protect data, both in digital form (software) and physical storage (hardware), from
unauthorized access, disclosure, alteration, or destruction.
Challenges to big data security and privacy
Securing and protecting data in real time: Due to large amounts of data generation, most
organizations are unable to maintain regular checks. However, it is most beneficial to
perform security checks and observation in real time or almost in real time.
Data provenance: To classify data, it is necessary to be aware of its origin in order to
determine the data origin accurately, so that authentication, validation and access control
can be gained.
Protecting access control method communication and encryption: A secured data storage
device is an intelligent step in protecting the data. Yet, because most often data storage
devices are vulnerable, it is important to encrypt the access control methods as well.
Security Threats Are Identified and Control Measures Used
A threat is a possible danger that might exploit a vulnerability to breach security and therefore
cause possible harm. A threat can either be intentional (e.g. hacking by an individual or criminal
organization) or accidental (the possibility of a computer malfunctioning OR the possibility of
natural disasters such as fires or otherwise a circumstance, capability, action or event).