Cards (52)

  • What does privacy in the digital age refer to?
    Control over personal information
  • Privacy is crucial for protecting individual autonomy and preventing discrimination.
    True
  • Match the data collection practice with its description:
    Web tracking ↔️ Collecting browsing history
    Mobile app permissions ↔️ Accessing user location
    Social media data ↔️ Collecting user posts
    Internet of Things (IoT) ↔️ Collecting data from wearables
  • Data collection practices pose a significant threat to digital privacy
  • What does web tracking involve collecting data on?
    User behavior and browsing history
  • Maintaining control over personal data is crucial for preventing misuse and discrimination.

    True
  • Encryption protects data during storage and transmission by converting it into an unreadable format
  • What are the benefits of data security?
    Preserving confidentiality and integrity
  • The complexity of modern IT infrastructure poses a challenge to data security.

    True
  • One benefit of data security is preserving the confidentiality of sensitive information.
  • What does data security maintain to ensure critical systems function properly?
    Availability
  • What is the primary goal of data security?
    Protect digital information
  • What data security measure restricts access based on roles or permissions?
    Access controls
  • Intrusion detection systems may generate false positives.

    True
  • Match the data security measure with its benefit:
    Encryption ↔️ Maintains confidentiality
    Access Controls ↔️ Ensures data integrity
    Firewalls ↔️ Shields internal networks
    Intrusion Detection Systems ↔️ Proactive threat identification
  • What is one key provision of the General Data Protection Regulation (GDPR)?
    Explicit consent for data
  • The Health Insurance Portability and Accountability Act (HIPAA) protects the confidentiality and security of health information.
  • Match the type of privacy with its characteristic:
    Traditional Privacy ↔️ Physical access to information
    Digital Privacy ↔️ Digital data collection
    Localized impact ↔️ Global reach of breaches
  • Web tracking involves collecting data on user behavior, browsing history, and online activities.
  • Encryption protects data during storage and transmission.
  • What are the methods used in data security to protect digital information?
    Encryption, access controls, firewalls, intrusion detection systems
  • Access controls ensure data integrity by restricting who can view, use, or modify data.

    True
  • Intrusion detection systems detect suspicious activities and alert administrators.
  • Match the privacy legislation with its key provision:
    GDPR ↔️ Explicit consent for data collection
    CCPA ↔️ Right to opt-out of data sale
    HIPAA ↔️ Protection of health information
  • Consent requires explicit agreement from individuals for data collection and use.
  • What are two best practices for maintaining digital privacy?
    Strong passwords, multi-factor authentication
  • Data minimization and retention involve collecting only necessary data and retaining it only as long as required.

    True
  • Traditional privacy focuses on physical access, while digital privacy deals with digital data collection and tracking
  • Order the following data collection practices from simplest to most intrusive:
    1️⃣ Web tracking
    2️⃣ Mobile app permissions
    3️⃣ Social media data
    4️⃣ IoT data collection
  • Ensuring robust digital privacy safeguards is a key challenge in the modern world.

    True
  • Compared to traditional privacy, digital privacy faces new threats such as digital data collection and tracking
  • Match the data collection practice with its description:
    Web tracking ↔️ Collecting browsing history
    Mobile app permissions ↔️ Accessing user location
    Social media data ↔️ Collecting user posts
    Internet of Things (IoT) ↔️ Collecting data from wearables
  • What is the purpose of data security?
    Protect digital information
  • Order the following data security measures from most to least complex:
    1️⃣ Intrusion detection systems
    2️⃣ Firewalls
    3️⃣ Access controls
    4️⃣ Encryption
  • What data security measure can a small business use to protect customer credit card data?
    Encryption
  • Ensuring integrity means preventing data alteration.

    True
  • One challenge in maintaining data security is the complexity of modern IT infrastructure.
  • Encryption requires a key for decryption.
    True
  • Firewalls monitor and control network traffic to block unauthorized access.
  • One challenge in maintaining data security is the rapidly evolving threat landscape.