Cyber Security Unit 4
Cyber Security Unit 4
In computing, data is information that has been translated into a form that is
efficient for movement or processing. Relative to today's computers and
transmission media, data is information converted into binary digital form. It is
acceptable for data to be used as a singular subject or a plural subject.
Example
Data can come in the form of text, observations, figures, images, numbers,
graphs, or symbols. For example, data might include individual prices, weights,
addresses, ages, names, temperatures, dates, or distances. Data is a raw form of
knowledge and, on its own, doesn't carry any significance or purpose
Meta-Data
Metadata means "data about data". Metadata is defined as the data providing
information about one or more aspects of the data; it is used to summarize basic
information about data that can make tracking and working with specific data
easier.[15] Some examples include:
Big data is exactly what the name suggests, a “big” amount of data. Big Data
means a data set that is large in terms of volume and is more complex. Because
of the large volume and higher complexity of Big Data, traditional data
processing software cannot handle it. Big Data simply means datasets containing
a large amount of diverse data, both structured as well as unstructured.
Big Data allows companies to address issues they are facing in their business, and
solve these problems effectively using Big Data Analytics. Companies try to
identify patterns and draw insights from this sea of data so that it can be acted
upon to solve the problem(s) at hand.
Although companies have been collecting a huge amount of data for decades, the
concept of Big Data only gained popularity in the early-mid 2000s. Corporations
realized the amount of data that was being collected on a daily basis, and the
importance of using this data effectively.
1. Volume refers to the amount of data that is being collected. The data could
be structured or unstructured.
2. Velocity refers to the rate at which data is coming in.
3. Variety refers to the different kinds of data (data types, formats, etc.) that
is coming in for analysis. Over the last few years, 2 additional Vs of data
have also emerged – value and veracity.
4. Value refers to the usefulness of the collected data.
5. Veracity refers to the quality of data that is coming in from different
sources.
Big data involves collecting, processing, and analyzing vast amounts of data from
multiple sources to uncover patterns, relationships, and insights that can inform
decision-making. The process involves several steps:
1. Data Collection
Big data is collected from various sources such as social media, sensors,
transactional systems, customer reviews, and other sources.
2. Data Storage
The collected data then needs to be stored in a way that it can be easily
accessed and analyzed later. This often requires specialized storage
technologies capable of handling large volumes of data.
3. Data Processing
4. Data Analysis
After the data has been processed, it is time to analyze it using tools like
statistical models and machine learning algorithms to identify patterns,
relationships, and trends.
5. Data Visualization
The insights derived from data analysis are then presented in visual formats
such as graphs, charts, and dashboards, making it easier for decision-
makers to understand and act upon them.
Use Cases
Big Data helps corporations in making better and faster decisions, because they
have more information available to solve problems, and have more data to test
their hypothesis on.
What is non-personal data?
In its most basic form, non-personal data is any set of data which does not
contain personally identifiable information. This in essence means that no
individual or living person can be identified by looking at such data.
For example, while order details collected by a food delivery service will have
the name, age, gender, and other contact information of an individual, it will
become non-personal data if the identifiers such as name and contact
information are taken out.
Once you have ensured appropriate data privacy and security, the next step is
providing proper data protection.
There are two definitions for “Data protection,” narrow and broad:
The more data you collect and store, the more important it becomes to create
backups for your critical data. For many companies, the timeliness of
implementing a backup is also essential.
Ideally, if you have lost critical data, you would want to replace it as soon as
possible to avoid losing out on business during your downtime.
There are several ways to implement a data protection strategy, from using
different storage devices to creating cloud backups and archiving.
Most online businesses and websites collect personal data, from email addresses
to phone numbers, credit cards, and log-in details. Ideally, these entities
shouldn’t keep more information than is necessary, nor should they keep it
longer than necessary.
However, you cannot operationalize data privacy without ensuring the security
of data.
For example, if you fail to protect people’s credit card details against hackers
and they get access to this data, they can sell it on the dark web. Therefore, data
security is a prerequisite to data privacy.
Like data privacy, the phrase “data security” is somewhat vague and not
necessarily intuitive. This confusion is particularly true when comparing data
privacy, data security, and data protection concepts.
• Creation
• Storage
• Use
• Sharing
• Archiving
• Destruction
Data security involves everything from the physical security of the storage
devices and hardware to administrative access controls and the security of
software applications.
These tools can help keep your data secure while supporting you in other areas,
like streamlining your audits and complying with regulatory requirements.
Key Features
• Applicability: The Bill will apply to the processing of digital personal data
within India where such data is: (i) collected online, or (ii) collected offline and
is digitised. ...
• Consent: Personal data may be processed only for a lawful purpose for which an
individual has given consent.
Why was the data protection bill introduced?
A key objective of the DPDP Bill 2023 is to reinforce the 'Right to Privacy'
of Indian citizens, placing a premium on individual consent for data
collection, storage, and processing. The bill seeks to make entities, including
internet companies, mobile apps, and businesses, more accountable for their
data practices.
Article 5 of the General Data Protection Regulation (GDPR) sets out key
principles which lie at the heart of the general data protection regime. These key
principles are set out right at the beginning of the GDPR and they both directly
and indirectly influence the other rules and obligations found throughout the
legislation. Therefore, compliance with these fundamental principles of data
protection is the first step for controllers in ensuring that they fulfil their
obligations under the GDPR. The following is a brief overview of the Principles
of Data Protection found in article 5 GDPR:
Lawfulness, fairness, and transparency: Any processing of personal data
should be lawful and fair. It should be transparent to individuals that personal
data concerning them are collected, used, consulted, or otherwise processed and
to what extent the personal data are or will be processed. The principle of
transparency requires that any information and communication relating to the
processing of those personal data be easily accessible and easy to understand,
and that clear and plain language be used.
Accuracy: Controllers must ensure that personal data are accurate and, where
necessary, kept up to date; taking every reasonable step to ensure that personal
data that are inaccurate, having regard to the purposes for which they are
processed, are erased or rectified without delay. In particular, controllers should
accurately record information they collect or receive and the source of that
information.
Storage Limitation: Personal data should only be kept in a form which permits
identification of data subjects for as long as is necessary for the purposes for
which the personal data are processed. In order to ensure that the personal data
are not kept longer than necessary, time limits should be established by the
controller for erasure or for a periodic review.
Integrity and Confidentiality: Personal data should be processed in a manner
that ensures appropriate security and confidentiality of the personal data,
including protection against unauthorised or unlawful access to or use of
personal data and the equipment used for the processing and against accidental
loss, destruction or damage, using appropriate technical or organisational
measures.
Big data security is a constant concern because Big Data deployments are
valuable targets to would-be intruders. A single ransomware attack might leave
a company’s big data deployment subject to ransom demands. Even worse, an
unauthorized user may gain access to a company’s big data to siphon off and
sell valuable information. The losses can be severe. A company’s IP may be
spread everywhere to unauthorized buyers, and it may suffer fines and
judgments from regulators.
Securing big data platforms takes a mix of traditional security tools, newly
developed toolsets, and intelligent processes for monitoring security throughout
the life of the platform.
Big data security’s mission is clear enough: keep out on unauthorized users and
intrusions with firewalls, strong user authentication, end-user training, and
intrusion protection systems (IPS) and intrusion detection systems (IDS). In
case someone does gain access, encrypt your data in transit and at rest.
This sounds like any network security strategy. However, big data environments
add another level of security because security tools must operate during three
data stages that are not all present in the network. These are: data ingress, which
is what’s coming in; stored data; and data output going out to applications and
reports.
Stage 1: Data Sources. Big data sources come from a variety of sources and
data types. User-generated data alone can include CRM or ERM data,
transactional and database data, and vast amounts of unstructured data such as
email messages or social media posts. In addition to this, you have the whole
world of machine-generated data including logs and sensors. You need to secure
this data in transit, from sources to the platform.
Stage 2: Stored Data. Protecting stored data takes mature security toolsets
including encryption at rest, strong user authentication, and intrusion protection
and planning. A company needs to run its security toolsets across a distributed
cluster platform with many servers and nodes. In addition, its security tools
must protect log files and analytics tools as they operate inside the platform.
Stage 3: Output Data. The entire reason for the complexity and expense of the
big data platform is so it can run meaningful analytics across massive data
volumes and different types of data. These analytics output results to
applications, reports, and dashboards. This extremely valuable intelligence
makes for a rich target for intrusion, and it is critical to encrypt output as well as
ingress. Also, secure compliance at this stage: make certain that results going
out to end-users do not contain regulated data.
Big Data security is routed through a circuitous path, and in theory could be
vulnerable at more than one point.
Two of the biggest trends in the world of big data stand somewhat in opposition
to each other: the proliferation of big data that informs smart technology, and
also the growing movement for consumers to own and decide how their
personal data is being used.
As big data and its enterprise use cases continue to grow, most organizations
work hard to comply with consumer data laws and regulations, but their security
holes leave data vulnerable to breach. Take a look at some of the top trends
happening in the big data world, the important security points that many
companies are missing, and some tips for getting big data security right:
Big data growth has caused many companies to move toward cloud and data
fabric infrastructures that allow for more data storage scalability. The problem?
Cloud security is often established based on legacy security principles, and as a
result, cloud security features are misconfigured and open to attack.
For a company to navigate this requires speaking with cloud and storage
vendors about their products, whether a security solution is embedded, and if
they or a third-party partner recommend any additional security resources.
IoT and other mobile devices are some of the greatest sources and receivers of
big data, but they also offer several security vulnerabilities since so many of
these technologies are owned and used for personal life. Set strict policies for
how employees can engage with corporate data on personal devices, and be sure
to set additional layers of security in order to manage which devices can access
sensitive data.
Most often, big data is compromised as the result of a successful phishing attack
or other personalized attack targeted at an unknowing employee. Train your
employees on typical socially engineered attacks and what they look like, and
again, set up several layers of authentication security to limit who can access
sensitive data storage.
There are several challenges to securing big data that can compromise its
security. Keep in mind that these challenges are by no means limited to on-
premise big data platforms. They also pertain to the cloud. When you host your
big data platform in the cloud, take nothing for granted. Work closely with your
provider to overcome these same challenges with strong security service level
agreements.
None of these big data security tools are new, from encryption to user access
control. What is new is their scalability and the ability to secure multiple types
of data in different stages.
Whether you’re just getting started with big data management and are looking
for initial big data security solutions, or you are a longtime big data user and
need updated security, here are a few tips for big data security implementation:
The answer is everyone. IT and InfoSec are responsible for policies, procedures,
and security software that effectively protect the big data deployment against
malware and unauthorized user access. Compliance officers must work closely
with this team to protect compliance, such as automatically stripping credit card
numbers from results sent to a quality control team. DBAs should work closely
with IT and InfoSec to safeguard their databases.
There are now two General Data Protection Regulations: in the European
Economic Area (the EEA GDPR) and in the United Kingdom (as tailored by the
Data Protection Act, the UK GDPR). Both the EEA GDPR and the UK GDPR
regulate the collection, use, transfer, storing, and other processing of personal
data of persons in their respective jurisdictions.
To which persons do the EEA GDPR and UK GDPR apply?
The EEA GDPR and the UK GDPR apply to all persons. There is no
requirement that a person be a citizen or resident of a country that is a member
of the EEA or of the UK.
To what countries does the EEA GDPR apply? What are the EU and the
EEA?
The EEA GDPR applies to all 27 member countries of the European Union
(EU). It also applies to all countries in the European Economic Area (the EEA).
The EEA is an area larger than the EU and includes Iceland, Norway, and
Liechtenstein. As of January 1, 2021, the UK is no longer a member of the EU
and is no longer subject to the EEA GDPR. Switzerland has also adopted a
privacy law analogous to the GDPR.
There are three types of situations that are subject to the EEA GDPR and UK
GDPR:
1. If a person is present in the EEA or the UK, any personal data collected from
them in connection with the offering of a good or service is protected by that
area’s GDPR, even if the organization offering the good or service is not
established in that area. Protection for the personal data continues after the
person leaves the EEA or the UK.
2. Establishments in the EEA or UK. If personal data is collected or otherwise
processed in the context of the activities of any establishment in the EEA or
UK, then the personal data is protected by that area’s GDPR, even if the
processing occurs outside the EEA or the UK.
3. If a person is present in the EEA or UK, any personal data collected from them
in connection with the monitoring of their behavior where the behavior takes
place within the EEA or the UK.
To what data do the EEA GDPR and the UK GDPR apply?
The EEA GDPR and the UK GDPR apply to all "personal data,” which includes
any information relating to a living, identified or identifiable person. Examples
include name, SSN, other identification numbers, location data, IP addresses,
online cookies, images, email addresses, and content generated by the data
subject.
The EEA GDPR and the UK GDPR include more stringent protections for
special categories of personal data. These are:
• Racial or ethnic origin
• Physical or mental health data
• Political opinions
• Sex life and sexual orientation
• Religious or philosophical beliefs
• Genetic and biometric data
• Trade union membership
The EEA GDPR and the UK GDPR also impose limitations on the processing
of personal data relating to criminal convictions and offenses.
Data privacy laws specify how data should be collected, stored, and shared with
third parties. The most widely discussed data privacy laws include:
Data sovereignty is the concept that data is subject to the laws of the location in
which it's collected. For example, in July 2020, the Schrems II ruling decided
that, according to GDPR, consumer data for customers in the EU must be
hosted on servers within the borders of the EU.
Think of data sovereignty as a way to make sure that user data stays close to
home for its own protection. By dictating where data can be stored and
processed, governments aim to keep their citizens' data from falling into the
wrong hands.
Data sovereignty becomes critical when looking at cloud service providers.
GDPR compliance, or future regulations, may require you to store certain data
on servers in certain jurisdictions.
• obtain consent when they collect, use, or disclose their personal information;
• supply an individual with a product or a service even if they refuse consent
for the collection, use, or disclosure of your personal information unless that
information is essential to the transaction;
• collect information by fair and lawful means; and
• have personal information policies that are clear, understandable, and readily
available.
Implementation
The implementation of PIPEDA occurred in three stages. Starting in 2001, the
law applied to federally regulated industries (such
as airlines, banking and broadcasting). In 2002, the law was expanded to
include the health sector. Finally in 2004, any organization that collects
personal information in the course of commercial activity was covered by
PIPEDA, except in provinces that have "substantially similar" privacy laws. As
of October 2018, seven provinces have privacy laws that have been declared by
the federal Governor in Council to be substantially similar to PIPEDA:
Even with an email address or phone number, a scammer can find more
information, such as leaked passwords, Social Security numbers and credit card
numbers.
Even closed groups may not be completely private because postings can be
searchable, including any comments.
3. Location settings
Location app settings may still track user whereabouts. Even if someone turns
off their location settings, there are other ways to target a device's location. The
use of public Wi-Fi, cellphone towers and websites can also track user
locations. Always check that the GPS location services are turned off, and
browse through a VPN to avoid being tracked.
5. False information
People can spread disinformation on social media quickly. Trolls also look to
provoke other users into heated debates by manipulating emotions.
Most social media platforms have content moderation guidelines, but it may
take time for posts to be flagged. Double-check information before sending or
believing something on social media.