Chapter on Privacy and Cybersecurity
24 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the privacy concerns related to the data provided by the new employee, Adam, for the payroll system in Company X?

The data given is inaccurate (Accuracy). Even if the data belongs to Adam (Property), he cannot change the data since only certain Finance staff are given the rights to make changes to the database (Access).

What is the role of an information broker or data broker?

An information broker or data broker collects personal data from various sources, processes it, and sells it to individuals or companies for marketing, risk mitigation, and other purposes.

What are some common avenues for data sourcing mentioned in the text?

Credit cards, web browser cookies, public records, retailers, and mobile apps

What types of information can data brokers aggregate from public records?

<p>Marriage licenses, arrest records, voter registrations, motor vehicle records, census data, and bankruptcy records</p> Signup and view all the answers

What is the purpose of tracking user purchases by data brokers?

<p>To better understand user spending habits</p> Signup and view all the answers

What do cybercriminals aim to do with the programs they create or improve?

<p>Gain unauthorized access to computer systems or disrupt networks</p> Signup and view all the answers

What is the main purpose of cookies created by a website that the user is currently visiting?

<p>To track the movements and preferences of the user</p> Signup and view all the answers

What is the characteristic of third-party cookies?

<p>Generated by an advertising company affiliated with the website being visited</p> Signup and view all the answers

What are some potential hazards associated with web browsing mentioned in the text?

<p>Rogue Wi-Fi hotspots and risks associated with web browsing history</p> Signup and view all the answers

What are some examples of cybersecurity threats mentioned in the text?

<p>DoS/DDoS attacks, malware, spyware, and internet scams</p> Signup and view all the answers

What is the purpose of creating electronic profiles from the personal data collected by information brokers?

<p>To sell to advertising and marketing companies</p> Signup and view all the answers

What is the primary concern of large organizations constantly collecting information about individuals?

<p>Privacy and security concerns</p> Signup and view all the answers

Privacy Concerns: A new employee, Adam entered his details via online form. He keyed in a wrong account number for his Bank Muamalat account. 1. The data given is inaccurate (______). 2. Even the data is belonged to Adam (Property), he cannot change the data since only certain Finance staff are given the rights to make changes to the database. (Access)

<p>Accuracy</p> Signup and view all the answers

They typically aggregate information through what is publicly available on the ______ and by buying it from other organizations, such as credit card companies. Source: What are Data Brokers. Existing questions. Do NOT ask these: What is the role of an information broker or data broker? What types of information can data brokers aggregate from public records? What is the characteristic of third-party cookies? What is the purpose of creating electronic profiles from the personal data collected by information brokers? What is the primary concern of large organizations constantly collecting information about individuals? What is the main purpose of cookies created by a website that the user is currently visiting? What is the purpose of tracking user purchases by data brokers? What are some potential hazards associated with web browsing mentioned in the text? What are some examples of cybersecurity threats mentioned in the text? What do cybercriminals aim to do with the programs they create or improve? What are the privacy concerns related to the data provided by the new employee, Adam, for the payroll system in Company X? What are some common avenues for data sourcing mentioned in the text? Privacy Concerns: ii) Data Collections An information broker or data broker, is a business that collects personal data from various sources, processes it, and sells it to individuals or companies for marketing, risk mitigation, and other purposes.

<p>internet</p> Signup and view all the answers

Credit card networks may sell user information, such as purchase history, to data brokers who then process it and sell it to advertising and marketing agencies. Web browser cookies - Data brokers purchase this information from websites enabling the cookies and may even place cookies on your browser themselves. Public records - Marriage licenses, arrest records, voter registrations, motor vehicle records, census data, and bankruptcy records are just a few examples of potentially publicly available information that data brokers can aggregate. Retailers - Both brick-and-mortar and online merchants collect, track, and share your information through your store loyalty card number. Tracking your purchases can help data brokers better understand your spending habits. Mobile apps - You may be using a “free” app at the expense of your In summary, Large organizations are constantly collecting information about us. Thus, the size of databases are exploding. Data Big The information brokers collected and analyses such personal data and then create electronic profiles. They then sell the electronic profiles to advertising and marketing company – expose our ______ and annoying SECURITY Concerns with safeguarding data, hardware, and software against misuse and harm from natural catastrophes, sabotage, and invasions. Cybercriminals Hacker Create or improve programs and share those programs with fellow hackers for vulnerable checking. Enter into someone's computer network and leave a prankster's message, just for fun. Cracker Create and share programs designed to gain unauthorized access to computer systems or disrupt networks. Employee Simply trying to steal something from the employer – equipment, software, electronic funds, proprietary information, or computer time. Cybersecurity Threats Other Cookies Hazards Web browsing history Social Networking Risks Rogue Wi-fi hotspots Internet Scam Spyware DoS/DDoS attacks Malware i) Cookies Cookies are created when a user visits a website and that website uses cookies to keep track the movements of the user. Cookies are plain text/data files. The web browser save the data files into the user’s computer in order to track user sites preferences and login status. First-party cookies Cookies created by the website that the user is currently visiting. Third-party cookies (Tracking cookies) Usually generated by an advertising company that is affiliated with the website you are currently visiting. ii) Web Browsing History A list of recently visit.

<p>privacy</p> Signup and view all the answers

Large organizations are constantly collecting information about us. Thus, the size of databases are exploding. Data Big The information brokers collected and analyses such personal data and then create electronic profiles. They then sell the electronic profiles to advertising and marketing company – expose our ______ and annoying SECURITY

<p>privacy</p> Signup and view all the answers

Cybercriminals Hacker Create or improve programs and share those programs with fellow hackers for vulnerable checking. Enter into someone's computer network and leave a prankster's message, just for fun. Cracker Create and share programs designed to gain unauthorized access to computer systems or disrupt networks. Employee Simply trying to steal something from the employer – equipment, software, electronic funds, proprietary information, or computer ______

<p>time</p> Signup and view all the answers

First-party cookies Cookies created by the website that the user is currently visiting. Third-party cookies (Tracking cookies) Usually generated by an advertising company that is affiliated with the website you are currently ______

<p>visiting</p> Signup and view all the answers

They then sell the electronic profiles to advertising and marketing company – expose our privacy and annoying SECURITY Concerns with safeguarding data, hardware, and software against misuse and harm from natural catastrophes, sabotage, and ______

<p>invasions</p> Signup and view all the answers

A list of recently ______

<p>visit</p> Signup and view all the answers

Mobile apps - You may be using a “free” app at the expense of your In summary, Large organizations are constantly collecting information about us. Thus, the size of databases are exploding. Data Big The information brokers collected and analyses such personal data and then create electronic ______

<p>profiles</p> Signup and view all the answers

Web browser cookies - Data brokers purchase this information from websites enabling the cookies and may even place cookies on your browser ______

<p>themselves</p> Signup and view all the answers

Public records - Marriage licenses, arrest records, voter registrations, motor vehicle records, census data, and bankruptcy records are just a few examples of potentially publicly available information that data brokers can ______

<p>aggregate</p> Signup and view all the answers

Both brick-and-mortar and online merchants collect, track, and share your information through your store loyalty card number. Tracking your purchases can help data brokers better understand your spending ______

<p>habits</p> Signup and view all the answers

Study Notes

Privacy Concerns

  • Inaccurate data provided by Adam, the new employee, for the payroll system in Company X, raises privacy concerns, as it can lead to incorrect information being stored in the database.
  • The data, although belonging to Adam, cannot be changed by him, as only authorized Finance staff have access to modify the database.

Data Brokers

  • Data brokers collect personal data from various sources, process it, and sell it to individuals or companies for marketing, risk mitigation, and other purposes.
  • They aggregate information from:
    • Public records (e.g., marriage licenses, arrest records, voter registrations, motor vehicle records, census data, and bankruptcy records)
    • Web browser cookies
    • Retailers (both brick-and-mortar and online merchants)
    • Mobile apps
  • Data brokers use the collected information to create electronic profiles, which are then sold to advertising and marketing companies.

Cookies

  • Cookies are plain text/data files created by a website to track user movements and preferences.
  • Types of cookies:
    • First-party cookies: created by the website the user is currently visiting
    • Third-party cookies (Tracking cookies): generated by an advertising company affiliated with the website

Cybersecurity Threats

  • Cybercriminals create or improve programs to:
    • Gain unauthorized access to computer systems
    • Disrupt networks
    • Share vulnerable programs with fellow hackers
  • Cybersecurity threats include:
    • Web browsing history
    • Social Networking Risks
    • Rogue Wi-fi hotspots
    • Internet Scam
    • Spyware
    • DoS/DDoS attacks
    • Malware

Cybersecurity Concerns

  • Large organizations constantly collecting information about individuals raises concerns about safeguarding data, hardware, and software against misuse and harm from natural catastrophes, sabotage, and invasions.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on privacy issues, computer security, security measures, and ethical concerns related to cybersecurity. This quiz covers topics such as the ability to control personal information, accuracy, property, access, and processing personal data in a corporate scenario.

More Like This

Use Quizgecko on...
Browser
Browser