Professional Documents
Culture Documents
Unit 2 Assignment
Unit 2 Assignment
virtual data
maiden name etc.
2) Private Details
about you For example, your criminal background, medical record, drug use, marital
details, association memberships, friends' names, pets' names, parents'
names, siblings' names, and contact list.
3) Assigned Unique Identifiers
For example, your driver's license, social media accounts, utilities account,
SIN, passport number, voter registration records, performance evaluations
and reference interviews, health card number, vehicle registration number,
etc.
4) Self-selected Unique Identifiers
For example, email address, account names, gamer nick name, social media
identity, current location, location history, passwords, user names etc.
1) Personal information 2) Private details
virtual data
and purchase history, donation history, current income, bank account, load
records, tax returns etc.
about you
2) Location Information
For example, home address, work address, school address, visited locations, GPS
data, city of birth, IP address, travel records, previous addresses, postal activity,
etc.
3) Biological Identifiers
For example, iris scan, fingerprint, face, video footage, DNA, analyzed
chromosome data, height, weight, gender, sex, eye colour, voice recordings etc..
4) Behavioural and Communication
For example, click history, visual response pattern, website history, IoT usage
data, smart device recordings, cookies, browser, operating system, web form
input, social media accounts, social media posts and history, etc.
5) Financial Details 6) Location information
😂
How can we
protect our data
against the bad
hackers?
3 main ways hackers use are:
a. Social Engineering
Social engineering is the art of manipulating, influencing, or deceiving
you in order to gain control over your computer system. The hacker
might use the phone, email, snail mail or direct contact to gain illegal
access. Phishing, spear phishing, and CEO Fraud are all examples.
First, we b. Ransomware
have to Ransomware is malicious software that you download onto your
computer by clicking on infected pop-up advertisements, websites or
know how email attachments. Once the malware is on your computer, hackers
can take control and encrypt your files. When files are encrypted, it is
the hacker very much like the files are locked, and scammers will demand a
ransom payment to unencrypt and unlock the files.
attack us c. Password Cracking
Password cracking is the process of attempting to gain Unauthorized
access to restricted systems using common passwords or algorithms
that guess passwords. In other words, it's an art of obtaining the
correct password that gives access to a system protected by an
authentication method.
1) Social engineering 2) Ransomware 3) Password cracking
Secondly,
we have to
know
ways to
prevent
and avoid
these
scams
Preventions
01 02 03 04 05
Get yourself decent anti-virus Back-up important data on an Be picky about who or where Be very suspicious of emails or Only log in to accounts from
and firewall software – and external hard drive or USB you share your personal info messages asking for login or your own gadgets. If you do
turn it on! stick. If there’s something that with – your data’s only as account info. This is known as have to use a public or shared
* This is the best prevention you’d be gutted to lose, keep secure as they are. phishing and is one of the device, make sure you log out
you should apply. copies! * Don’t give any of your easiest ways for passwords to afterwards.
* Like your homework, account information for be nicked. * Apply this when you use
assignments, and online someone you don’t trust. * Be more cautious when computer in the library of your
contents checking your email school
Preventions
06
07 08 09 10
If there’s something you really, Create a strong and hard to Use two-step verification if it’s Protect your phone and Only visit secure sites: check
really don’t want anyone else predict password. Use an available for logins: if gadgets for the padlock and 'https' in
to know or get hold of, don’t unusual but memorable someone signs in from a new * Think carefully before you the address bar.
put it online! phrase and replace letters or unauthorised device, they’ll entrust your phone to anyone * Don’t worry, this has been
* Like your account with numbers or punctuation have to provide a code that’s done by TDSB for you. Any
information, and think twice marks (0 instead of o, or 3 for only sent to your phone or harmful or unsuitable website
before you post anything E). email address was blocked by TDSb
*Do the same for your TDSB * Do this for your private
account. account and if possible, your
school’ accounts
04
02
01 03 05
How Canada recognizes Data
Privacy Day and Cybersecurity
Awareness Month?
On January 28, Canada and many countries around the world
celebrate Data Privacy Day. Data Privacy Day highlights the impact
technology is having on our privacy rights and underlines the
importance of valuing and protecting personal information.
For the Office of the Privacy Commissioner of Canada, Data
Privacy Day is an opportunity to highlight key issues, the role of
our Office, and the resources we have developed for
individuals, businesses and federal institutions to foster
awareness of privacy rights and obligations