Chapter on Privacy and Cybersecurity

UpscaleBambooFlute avatar
By UpscaleBambooFlute

Quiz

Flashcards

24 Questions

What are the privacy concerns related to the data provided by the new employee, Adam, for the payroll system in Company X?

What is the role of an information broker or data broker?

What are some common avenues for data sourcing mentioned in the text?

What types of information can data brokers aggregate from public records?

What is the purpose of tracking user purchases by data brokers?

What do cybercriminals aim to do with the programs they create or improve?

What is the main purpose of cookies created by a website that the user is currently visiting?

What is the characteristic of third-party cookies?

What are some potential hazards associated with web browsing mentioned in the text?

What are some examples of cybersecurity threats mentioned in the text?

What is the purpose of creating electronic profiles from the personal data collected by information brokers?

What is the primary concern of large organizations constantly collecting information about individuals?

Privacy Concerns: A new employee, Adam entered his details via online form. He keyed in a wrong account number for his Bank Muamalat account. 1. The data given is inaccurate (______). 2. Even the data is belonged to Adam (Property), he cannot change the data since only certain Finance staff are given the rights to make changes to the database. (Access)

They typically aggregate information through what is publicly available on the ______ and by buying it from other organizations, such as credit card companies. Source: What are Data Brokers. Existing questions. Do NOT ask these: What is the role of an information broker or data broker? What types of information can data brokers aggregate from public records? What is the characteristic of third-party cookies? What is the purpose of creating electronic profiles from the personal data collected by information brokers? What is the primary concern of large organizations constantly collecting information about individuals? What is the main purpose of cookies created by a website that the user is currently visiting? What is the purpose of tracking user purchases by data brokers? What are some potential hazards associated with web browsing mentioned in the text? What are some examples of cybersecurity threats mentioned in the text? What do cybercriminals aim to do with the programs they create or improve? What are the privacy concerns related to the data provided by the new employee, Adam, for the payroll system in Company X? What are some common avenues for data sourcing mentioned in the text? Privacy Concerns: ii) Data Collections An information broker or data broker, is a business that collects personal data from various sources, processes it, and sells it to individuals or companies for marketing, risk mitigation, and other purposes.

Credit card networks may sell user information, such as purchase history, to data brokers who then process it and sell it to advertising and marketing agencies. Web browser cookies - Data brokers purchase this information from websites enabling the cookies and may even place cookies on your browser themselves. Public records - Marriage licenses, arrest records, voter registrations, motor vehicle records, census data, and bankruptcy records are just a few examples of potentially publicly available information that data brokers can aggregate. Retailers - Both brick-and-mortar and online merchants collect, track, and share your information through your store loyalty card number. Tracking your purchases can help data brokers better understand your spending habits. Mobile apps - You may be using a “free” app at the expense of your In summary, Large organizations are constantly collecting information about us. Thus, the size of databases are exploding. Data Big The information brokers collected and analyses such personal data and then create electronic profiles. They then sell the electronic profiles to advertising and marketing company – expose our ______ and annoying SECURITY Concerns with safeguarding data, hardware, and software against misuse and harm from natural catastrophes, sabotage, and invasions. Cybercriminals Hacker Create or improve programs and share those programs with fellow hackers for vulnerable checking. Enter into someone's computer network and leave a prankster's message, just for fun. Cracker Create and share programs designed to gain unauthorized access to computer systems or disrupt networks. Employee Simply trying to steal something from the employer – equipment, software, electronic funds, proprietary information, or computer time. Cybersecurity Threats Other Cookies Hazards Web browsing history Social Networking Risks Rogue Wi-fi hotspots Internet Scam Spyware DoS/DDoS attacks Malware i) Cookies Cookies are created when a user visits a website and that website uses cookies to keep track the movements of the user. Cookies are plain text/data files. The web browser save the data files into the user’s computer in order to track user sites preferences and login status. First-party cookies Cookies created by the website that the user is currently visiting. Third-party cookies (Tracking cookies) Usually generated by an advertising company that is affiliated with the website you are currently visiting. ii) Web Browsing History A list of recently visit.

Large organizations are constantly collecting information about us. Thus, the size of databases are exploding. Data Big The information brokers collected and analyses such personal data and then create electronic profiles. They then sell the electronic profiles to advertising and marketing company – expose our ______ and annoying SECURITY

Cybercriminals Hacker Create or improve programs and share those programs with fellow hackers for vulnerable checking. Enter into someone's computer network and leave a prankster's message, just for fun. Cracker Create and share programs designed to gain unauthorized access to computer systems or disrupt networks. Employee Simply trying to steal something from the employer – equipment, software, electronic funds, proprietary information, or computer ______

First-party cookies Cookies created by the website that the user is currently visiting. Third-party cookies (Tracking cookies) Usually generated by an advertising company that is affiliated with the website you are currently ______

They then sell the electronic profiles to advertising and marketing company – expose our privacy and annoying SECURITY Concerns with safeguarding data, hardware, and software against misuse and harm from natural catastrophes, sabotage, and ______

A list of recently ______

Mobile apps - You may be using a “free” app at the expense of your In summary, Large organizations are constantly collecting information about us. Thus, the size of databases are exploding. Data Big The information brokers collected and analyses such personal data and then create electronic ______

Web browser cookies - Data brokers purchase this information from websites enabling the cookies and may even place cookies on your browser ______

Public records - Marriage licenses, arrest records, voter registrations, motor vehicle records, census data, and bankruptcy records are just a few examples of potentially publicly available information that data brokers can ______

Both brick-and-mortar and online merchants collect, track, and share your information through your store loyalty card number. Tracking your purchases can help data brokers better understand your spending ______

Description

Test your knowledge on privacy issues, computer security, security measures, and ethical concerns related to cybersecurity. This quiz covers topics such as the ability to control personal information, accuracy, property, access, and processing personal data in a corporate scenario.

Make Your Own Quiz

Transform your notes into a shareable quiz, with AI.

Get started for free