Data Privacy and Security
Data Privacy and Security
SECURITY
Pawan Singh Bhadouriya
Eno. :231B216
Batch : B-6
Introduction to Data Privacy and Security
Data privacy : refers to the practice of handling
personal information in a way that ensures it is kept
secure and used appropriately. This involves
protecting data from unauthorized access and
ensuring that individuals have control over how their
personal information
Importance is collected,
of Data Privacy: used, and shared.
• Protection of Personal
information
• Trust and Confidence I
• Prevention of Identity
Theft D Salomon, Data privacy and security. New Yor
• Ethical Responsibility
Springer, 2018.
Common Threats to Data Privacy
• Phishing Attacks
Phishing involves tricking individuals into revealing personal information,
such as passwords or credit card numbers, by pretending to be a
trustworthy entity
• Malware
Malware, or malicious software, includes viruses, worms, and trojans
designed to damage or disrupt systems, steal data, or gain unauthorized
access to networks.
• Insider Threats
Insider threats come from within the organization, such as employees or
contractors who misuse their access to sensitive data for personal gain or to
harm the organization.
• Ransomware
Ransomware is a type of malware that encrypts a victim’s files and demands
a ransom to restore access. This can lead to significant data loss and
financial damages .
• Social Engineering
Social engineering attacks manipulate individuals into divulging confidential
information. This can be done through various means, including phone calls,
emails, or in-person interactions Martina Ziefle. Data privacy and security.
• Data Breaches Springer Science & Business Media,
2012.
Practices for Data Security
• Data Minimization
Collect only necessary data gather only the data you need for a specific purpose,
limit data retention keep data only as long as necessary and securely dispose of
it when no longer needed.
• Encryption
data encryption encrypt data both in transit and at rest to protect it from
unauthorized access.
secure communication channels use secure communication protocols like HTTPS.
Miryala, N.K. and Gupta, D., 2022. Data Security Challenges and Industry Trends.
IJARCCE, pp.300-309
REFERENCES
• D Salomon, Data privacy and security. New York: Springer, 2018
• Sukhpal Singh Gill "Quantum and blockchain based Serverless edge computing:
A vision, model, new trends and future directions.