Dig Lit Data Security Notes
Dig Lit Data Security Notes
environment.
Learning Activities
Special Instructions
2.1. Classify data security and privacy (confidentiality of data, cloud
computing) in accordance with the prevailing technology.
2.2. Apply security threats (cyber terrorism, hacking) and control
measures (counter measures against cyber terrorism, risk
reduction, risk management, pass wording) in accordance with
laws governing protection of ICT.
2.3. Detect computer threats and crimes.
2.4. Undertake protection against computer crimes in accordance
with laws governing protection of ICT.
6) PURSING/ PHISING
Pursing scams are fraudulent attempts by cybercriminals to obtain private
information. Pursing scams often appear in the guise of email messages designed to
appear as though they are from legitimate sources.