eSecurity 1 - Personal Data Flashcards
Unit 5
What’s personal data?
Any data that relates to you + your identity.
Examples of personal data
- Name
- Address
- Telephone number
- Email address
- Bank details
- Medical records
- Salary
- Political opinions
What’s the danger of revealing any of your personal data?
Exposing yourself to identity theft, fraud, bullying and blackmail.
The moment you reveal any personal data to another, you are providing them with the potential to harm you or your identity.
Guidelines to keep your computer safe 1
Regarding data
- Have strong passwords set on any account that holds personal data. Stronger passwords include characters, numbers and symbols and are not recognisable as words.
- Encrypt (scramble text so that it cannot be read without a decryption key) any personal data that you store on your computer.
- Make use of any biometric devices (devices that measures a person’s biological data, such as thumbprints), that are built into technology.
Guidelines to keep your computer safe 2
Regarding software
- Have a firewall present, scanning incoming and outgoing data from your computer system.
- Regularly scan your computer with preventative software, such as an anti-virus package, that is used to identify a virus on a computer and remove it.
- Set all privacy controls to the most secure settings that are available on social media accounts
Guidelines to keep your computer safe 3
Regarding what you visit
- Do not open any email attachments from a sender you do not recognise.
- Check the URL attached to any link requesting data to see if it is genuine.
- If it is possible, use a virtual private network (VPN), an encrypted connection that can be used to send data more securely across a network.
Guidelines to keep your computer safe 4
Regarding your data
- Only visit and provide data to websites that are a trusted source.
- Remove data about your location that is normally attached to your photos and videos that you may post, such as geotags (an electronic tag that assigns a geographical location).
Guidelines to keep your computer safe 5
Regarding interactions with others
- Report and block and suspicious user.
- Use a nickname or pseudonym when using the internet for entertainment, for example, playing online games.
- Do not become friends on social networking sites with people you do not know.
- Be cautious about any pictures or opinions that you post or send to people.
How is personal data collected?
- Shoulder surfing
- Phishing
- Smishing
- Vishing
- Pharming
What’s shoulder surfing?
Shoulder surfing is the ability to get information or passwords by observing as someone types them in. Could be physically, CCTV (stay behind ATM).
What’s Phising?
When a person sends a legitimate looking email to a user. The email contains a link to a website that also looks legitimate. The user is encouraged to click the link and to input personal data into a form on the website ot just ask the user to reply to the email with their personal data.
Its main aim is to obtain user’s personal data.
What does the person do with the data in phishing?
This person can then use this data for criminal acts, for example, to commit fraud or steal the person’s identity.
What’s a common feature of phishing emails?
Intimidation, threatening the user that they must click the link and rectify a situation immediately, or there will be a further issue.
How to recognise phishing 1
Who? Where?
- Don’t even open email that is not from a sender that you recognise or a trusted source.
- Legitimate companies will send an email that uses their domain name. If this does not look legitimate, for example, does not contain the correct domain name, then it is probably fake.
- A link in an email from a legitimate company will also normally contain the domain name of the company. See the address of the URL that is attached. If the URL does not contain the domain name, or also contains typical errors such as spelling mistakes, then be suspicious of this.
How to recognise phishing 2
What?
- Legitimate companies will never ask for your personal data using email. Be immediately suspicious of any email that requests your personal data.
- Legitimate companies will normally address you by your name. Be suspicious of any email that addresses you as ‘Dear Member’ or ‘Dear Customer’.
- Legitimate companies are protective of their professional reputation and thoroughly check any communications. They will make sure that all information given is grammatically correct are correctly spelt. Be suspicious of any email that contains bad grammar or spelling mistakes.