Professional Documents
Culture Documents
CSS9 Q2 Las3 W3
CSS9 Q2 Las3 W3
Name of Learner:
Grade Level and Section:
Date:
I. INTRODUCTORY CONCEPT
The process of safeguarding sensitive data from unauthorized access is known as data
security. It encompasses all of the numerous cybersecurity methods you employ to protect your
data from unauthorized access, such as encryption, physical and digital access limitations, and
so on.
There are several different technologies you can use to secure your data. You’ll want to
use as many as you can to make sure all potential access points are secured.
III. ACTIVITIES
Let’s Try This!
A. Activity 1.
Page | 1
Directions: Arrange the jumbled letters to form word related to the lesson.
1. T-I-Y-U-S-E-C–R = ____________________
2. R–O–S–P–O–S–D–A = ____________________
3. A–T–D–A = ____________________
4. U – A – H – T – E – N – T – I – C – T – A – I – N – O = ____________________
5. N – O – C – I – F – E – N – D – A – L – T- I = ____________________
Authentication
B. Activity 2.
Directions: Identify the required data security needs to apply on each sentence. Choose your
answer from the box below.
_____________________1. This form of data protection software works in a similar way to encryption
in that it replaces data with random characters.
_____________________2. It is the process of confirming a user's login credentials (passwords,
biometrics, etc.) to ensure that they are the intended user.
_____________________3. It is the process of protecting sensitive data against unwanted access.
_____________________4. It is a critical component of any data security plan.
_____________________5. Information is hidden by obscuring letters and numbers with proxy
characters. The data changes back to its original form only when an authorized user receives it.
Direction: Answer the following questions into brief explanation. 5 points for each question.
2. What can be the risk if you have lack knowledge about Data security?
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
Rubrics:
Page | 2
IV. ANSWER KEY
V. REFLECTION
VI. REFERENCES
• https://research-compliance.umich.edu/data-security-guidelines
• https://www.varonis.com/blog/data-security/
• https://www.cmu.edu/iso/governance/guidelines/data-protection/index.html
Page | 3