Module 4 – Digital/cyber security and data protection

Short description

Learning goals

In this module you will:

  • Develop an ability to understand risks and threats, develop knowledge of preventive security measures in the digital environment.
  • Develop an ability to protect personal data and protect privacy in the digital environment (cybersecurity and data protection).
  • Develop an ability to protect yourself and others from potential threats in the digital environment (e.g. online blackmail / harassment). 
  • Develop an ability to work and operate high-tech devices.  
  • Understand that cybersecurity and data protection issues are directly conditioned upon your daily virtual activity and practices.
  • Change your way of thinking about the data security and data protection in your workplace.

Learning outcomes

Knowledge

At the end of this module you will:

  • Know what is data protection, data ethical issues, data legislation, data subject’s rights, cybercrime (why and how it occurs), cryptography, cloud network security, IoT security. 
  • Know the legal consequences, the types of risks and threats and the consequences of it (in which context data protection is required and why).
  • Know in which context cyber attack can occur. 
  • Know the role of cryptography/cloud/IoT security.

Skills

At the end of this module you will:

  • Be able to define/notice risky situations. 
  • Be able to react in the situation of a cyberattack and data protection risks. 
  • Be able to use efficiently basic tools serving to protect data and prevent cyber crimes.
  •  

Attitudes

At the end of this module you will:

  • Embrace a positive approach to protect and prevent yourself and your structure from cybercrimes.
  • Embrace a positive approach to respect data subject’s rights. 
  • Embrace a positive approach to secure data.
  •  

Prerequisites

No specific prior knowledge required. However, basic knowledge of computer and internet use is recommended.

Glossary

Cybersecurity: The practice of protecting computer systems, networks, and data from security breaches, unauthorised access, and cyberattacks.

Data Breaches: Data breaches occur when cybercriminals gain unauthorised access to sensitive information stored by organisations. These breaches can expose personal information, such as names, addresses, social security numbers, or financial data, potentially leading to identity theft and financial fraud. Cybercriminals may exploit vulnerabilities in databases, network security weaknesses, or insider threats to gain access to valuable information, which is then sold on the dark web or used for illegal purposes.

Malware: Short for malicious software, it refers to any software designed to harm or exploit computer systems, including viruses, worms, trojans, and ransomware.

Encryption: The process of converting data into a code to prevent unauthorised access, ensuring that only authorised parties can decrypt and access the original data.

Two-Factor Authentication (2FA): An authentication method that requires users to provide two forms of identification before gaining access to an account or system, adding an extra layer of security.

Social Engineering: A tactic used by attackers to manipulate individuals into divulging confidential information or performing actions that may compromise security.

Internet of Things (IoT): The network of physical devices, vehicles, appliances, and other objects embedded with sensors and software that can connect and exchange data over the internet.

Bibliography

+9 enrolled
Not Enrolled

Module Includes

  • 4 Lessons
  • 10 Topics
  • 1 Quiz
  • Module Certificate