Skip to content
Home » Chapter 6: Security, Privacy & Data Integrity

Chapter 6: Security, Privacy & Data Integrity

  • by

1. Key Definitions

TermDefinitionExample
Data SecurityProtecting data from unauthorized access, corruption, or theft.Encryption, firewalls, passwords.
Data PrivacyControlling who can access personal/sensitive data.GDPR compliance, user consent for data collection.
Data IntegrityEnsuring data is accurate, consistent, and unaltered.Checksums, validation rules (e.g., range checks).

2. Threats to Data & Systems

ThreatDescriptionPrevention Method
HackingUnauthorized access to systems to steal/corrupt data.Strong passwords, firewalls, intrusion detection.
MalwareMalicious software (e.g., viruses, spyware) that damages systems or steals data.Anti-virus software, regular updates.
PhishingFake emails/websites tricking users into revealing sensitive data.User training, spam filters.
PharmingRedirecting users to fake websites to steal data.HTTPS verification, DNS security.
Data BreachesAccidental or intentional exposure of sensitive data.Encryption, access controls.

3. Security Measures

MeasurePurposeExample
FirewallsBlocks unauthorized network access.Hardware/software firewalls (e.g., Windows Defender).
EncryptionConverts data into unreadable format without a key.AES-256 for files, SSL/TLS for web traffic.
Access RightsRestricts user permissions (read/write/execute).Admin vs. guest accounts.
BackupsCreates copies of data for recovery.Automated cloud backups (e.g., Google Drive).
Anti-VirusScans for and removes malware.Norton, McAfee.

4. Data Validation vs. Verification

AspectData ValidationData Verification
PurposeChecks if data is sensible/valid (but not necessarily accurate).Confirms data matches the original source (accuracy).
Methods– Range check (IF age > 120 THEN invalid)
– Format check (email: *@*.*)
– Presence check.
– Double entry (retype data)
– Visual check (compare to source)
– Checksums.
ExampleRejecting “999” as an invalid age.Verifying a password by typing it twice.

5. AI in Security

Applications:

  • Anomaly Detection: AI monitors network traffic for unusual patterns (e.g., sudden large data transfers).
  • Fraud Prevention: Flags suspicious transactions (e.g., banking systems).
  • Automated Threat Response: Blocks attacks in real-time (e.g., AI-driven firewalls).

Risks:

  • AI itself can be hacked (e.g., adversarial attacks on machine learning models).

6. Encryption Techniques

TypeHow It WorksUse Case
SymmetricSame key encrypts/decrypts data (fast but less secure).Local file encryption (e.g., BitLocker).
AsymmetricPublic key encrypts; private key decrypts (secure but slower).SSL/TLS for websites.
HashingConverts data to fixed-size string (irreversible).Password storage (e.g., SHA-256).

7. Exam-Style Questions

  1. Define data integrity and describe one method to ensure it (3 marks).
    • Answer: Integrity = accuracy + consistency. Method: Checksums (e.g., CRC).
  2. Compare phishing and pharming (2 marks).
    • Answer: Both steal data; phishing uses fake emails, pharming hijacks DNS.
  3. Explain how encryption protects data privacy (4 marks).
    • Answer: Scrambles data → unreadable without key → prevents eavesdropping.

8. Case Study: Cake Factory (from QP)

  • Threat: Hacker accessing recipe servers → theft of intellectual property.
  • Solution:
    1. Network Security: Firewalls, VPNs for remote access.
    2. Data Encryption: AES-256 for recipe files.
    3. Access Logs: Monitor unauthorized login attempts.

Leave a Reply

Your email address will not be published. Required fields are marked *