Explain the basics of being safe online, including what cybersecurity is and its potential impact.
Explain the most common cyber threats, attacks and vulnerabilities.
Explain how organizations can protect their operations against these attacks.
Access various information and resources to explore the different career options in cybersecurity.
Module 3 - Protecting your Data and Privacy
Welcome to this module, which looks at how to protect yourself online and maintain your privacy.
Remember, your online data is valuable to cybercriminals. So what can you do to stay safe?
There are some simple strategies that you can use to protect your personal devices and maintain your
data securely. Let’s take a look at what these are.
Chapter 3.2 - Data Maintenance
Are you ready to share all of your photos with strangers?
Your financial information with your friends?
Your email passwords with the general public?
No?
Then your data must be encrypted.
3.2.1 What Is Encryption?
Encryption is the process of converting information into a form in which unauthorized parties cannot
read it. Only a trusted, authorized person with the secret key or password can decrypt the data and
access it in its original form.
Note that the encryption itself does not prevent someone from intercepting the data. It can only
prevent an unauthorized person from viewing or accessing the content. In fact, some criminals may
decide to simply encrypt your data and make it unusable until you pay a ransom.
3.2.2 How Do You Encrypt Your Data?
Software programs are used to encrypt files, folders and even entire drives.
Encrypting File System (EFS) is a Windows feature that can encrypt data. It is directly linked to a
specific user account and only the user that encrypts the data will be able to access it after it
has been encrypted using EFS.
Discover how to encrypt data using EFS in all Windows versions (except Windows 10 Home).
Step 1Step 2Step 3Step 4Step 5
Consider the amount of valuable data you have stored on your mobile phone or laptop. You probably have
important documents, contact information and family photos!
So imagine if your mobile phone was stolen or you lost your laptop. All that information would be
lost... unless you have it backed up!
3.2.3 Back Up Your Data
Having a backup may prevent the loss of irreplaceable data. To back up data properly, you will need
an additional storage location for the data and you must copy the data to that location regularly.
3.2.4 Are They Really Gone?
You’ve logged into your laptop but it contains some photos belonging to the previous user, who no
longer works at @Apollo. Your line manager asks you to delete them. You drag the photos into the
recycle bin, open the recycle bin, select them and click ‘Delete’ once again. That should do it!
Do you think the photos are really gone from the laptop?
When you move a file to the recycle bin and delete it permanently, the file is only inaccessible
from the operating system. Anyone with the right forensic tools could still recover the file due to
a magnetic trace left on the hard drive.
So how do you ensure that erased data is no longer recoverable? Let’s see…
3.2.5 How Do You Delete Your Data Permanently?
Have you ever had to delete data or get rid of a hard drive? If so, did you take any precautions to
safeguard the data to keep it from falling into the wrong hands?
Find out what you should do to ensure you delete your files securely and permanently.
Don’t forget about data that may be stored online in the cloud. These copies will also need to be
deleted.
Take a moment to consider where you save your data. Is it backed up and encrypted? Why not put some of
the information from this topic into practice and keep your valuable information safe and secure?
You should also be aware of how your personal data will be treated when you enter into a service
agreement with an online service provider.