Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

LEARNING ACTIVITY SHEET 3 COMPUTER SYSTEMS SERVICING

QUARTER 2 - WEEK 3 GRADE 9

Name of Learner:
Grade Level and Section:
Date:

I. INTRODUCTORY CONCEPT

The process of safeguarding sensitive data from unauthorized access is known as data
security. It encompasses all of the numerous cybersecurity methods you employ to protect your
data from unauthorized access, such as encryption, physical and digital access limitations, and
so on.
There are several different technologies you can use to secure your data. You’ll want to
use as many as you can to make sure all potential access points are secured.

✓ Authentication is the process of verifying a user’s login credentials (passwords, biometrics,


etc.) to make sure it’s really them. And it’s one of the most important parts of your data
security strategy because it’s a frontline defense against unauthorized access to sensitive
information.
✓ Data encryption scrambles sensitive information with an algorithm so that it can’t be read by
someone without the specific information (the encryption key) required to unscramble it. It’s
an incredibly important data security tool because it ensures that even if someone gains
unauthorized access to your information, they won’t be able to use it.
✓ Tokenization is similar to encryption. However, instead of scrambling your data with an
algorithm, tokenization replaces that data with random characters. The relationship to the
original data (the “token”) is then stored in a separate protected database table.
✓ Data masking does not transform your data into an intermediate form but rather is achieved
by “masking” your data’s characters with proxy characters. Software reverses it once it’s
delivered to its end destination.
✓ Data access control is an important part of your data security strategy, as well. And while
digital access control is often managed through authentication procedures (and limiting the
number of authorized users who have access to your data), physical access control manages
access to the physical locations where your data resides (a data center or your on-premises
server rooms).

II. LEARNING COMPETENCIES

PERFORMING COMPUTER OPERATIONS


LO1. Plan and prepare for the task to be undertaken
1.5. Apply required data security guidelines in accordance with existing procedures
TLE-IACSS9-12PCO-Ic-d-4

III. ACTIVITIES
Let’s Try This!

A. Activity 1.
Page | 1
Directions: Arrange the jumbled letters to form word related to the lesson.
1. T-I-Y-U-S-E-C–R = ____________________
2. R–O–S–P–O–S–D–A = ____________________
3. A–T–D–A = ____________________
4. U – A – H – T – E – N – T – I – C – T – A – I – N – O = ____________________
5. N – O – C – I – F – E – N – D – A – L – T- I = ____________________
Authentication
B. Activity 2.
Directions: Identify the required data security needs to apply on each sentence. Choose your
answer from the box below.

Authentication Data Masking Data Access Control


Tokenization Data Security

_____________________1. This form of data protection software works in a similar way to encryption
in that it replaces data with random characters.
_____________________2. It is the process of confirming a user's login credentials (passwords,
biometrics, etc.) to ensure that they are the intended user.
_____________________3. It is the process of protecting sensitive data against unwanted access.
_____________________4. It is a critical component of any data security plan.
_____________________5. Information is hidden by obscuring letters and numbers with proxy
characters. The data changes back to its original form only when an authorized user receives it.

Let’s Level Up!


A. Task 1:

Direction: Answer the following questions into brief explanation. 5 points for each question.

1. Why is Data Security important?


____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

2. What can be the risk if you have lack knowledge about Data security?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________

Rubrics:

Acceptable (2) Good (3) Excellent (5)


Topic Sentence Unclear or lacking topic Basic topic sentence, Clear topic sentence
sentences doesn’t fully introduce introducing key
response elements of the
paragraph

Page | 2
IV. ANSWER KEY

Activity 1 Let’s Level Up!


Task 1:
1. SECURITY
2. PASSWORD Acceptable Good Excellent
3. DATA (2) (3) (5)
4. AUTHENTICATION Topic Unclear or Basic Clear topic
5. CONFIDENTIAL Sentence lacking topic sentence
topic sentence, introducing
Activity 2 sentences doesn’t key
fully elements
1. Tokenization introduce of the
2. Authentication response paragraph
3. Data Security
4. Data Access Control
5. Data Masking

V. REFLECTION

I learned that __________________________________________________________________


I realized that __________________________________________________________________
I commit to ____________________________________________________________________

VI. REFERENCES
• https://research-compliance.umich.edu/data-security-guidelines
• https://www.varonis.com/blog/data-security/
• https://www.cmu.edu/iso/governance/guidelines/data-protection/index.html

LAS DEVELOPMENT TEAM

Janine A. Zaballa - Writer - PGCHS


Gemar L. Nocos - Content Editor - Anislag National High School
Jonalyn N. Miguel - Language Editor - MORMS
Mary Rose C. Cruzada - Layout Editor - Tiwi Agro-Industrial School
Jane ST. Revilla - Content Reviewer - Schools Division Office of Albay

Page | 3

You might also like