Unit 2-Question 2


The following video provides information about the data we leave behind, privacy and who has access to it.

Just as we have to be careful around the data we share about ourselves, we need to be thoughtful about the data we collect and share about others and how we store and use that information. In the secondary years, there are many opportunities where students could be collecting data about others. Perhaps via research projects (e.g. surveys, interviews) or via their programming projects that ask users to enter data about themselves e.g. login information to access an app/site, data that users input as they interact with a program (e.g. photos or last location).

In industry and workplaces, there are strict policies, codes of conduct and requirements that advise how human data (including for research purposes) are collected, stored and used, for example Australia’s National Statement on Ethical Conduct in Human Research. These are very complex documents used by professionals, however, students can start to think critically about how data is involved in their own projects within the classroom, with guidance from the teacher, abiding by relevant Collection Notices as part of school sector Privacy Policies (e.g. Vic Department of Education and Training as an example).

Considering how data is handled, stored and used during the design and project process is critical. In the design of their projects, students should consider:

  • What types of data is being collected (about people, places and things)?
  • What is personal and private information? Is all the data collected necessary and useful?
  • What tools are being used and what are the data and security terms and conditions? (e.g. programming platform or survey tool)
  • How is the identity of participants/users protected?
  • How are participants/users informed about any data collection and storage strategies?
  • Who has authorised access to the data? (e.g. a team, individual, teacher)
  • What would be the implication or risks if someone unauthorised had access to the data?
  • How and where will students collect and store the information so that it is kept safe from unauthorised users?
  • What happens to the data once the project has ended? (e.g. deleted or kept with the teacher)

 

Within research or programming projects, students can also design user-facing information (e.g. a consent form or an app/program ‘Terms and Conditions’ information page) that explain how participant/user data is to be collected, used and stored; demonstrating good design and security practices. He following diagram visualises the basic elements of a computer network. As shown in the video, all digital systems within a network, laptops, tablets and mobile phones, are called nodes and are connected together with either wired or wireless connections called links.

 

The two most important basic elements of a computer network are the switch and router

  • Switches facilitate the connection between all the devices in a small network.

Routers facilitate the connection of multiple switches and their connected networks, to form an even larger network. The router allows networked devices and users to connect to the Internet.

Network security consists of the policies and practices adopted to prevent and monitor unauthorised access of a computer network, routers and other network-related resources. Network security includes protection of data and application in the network from cyber attacks (e.g. anti-malware), virtual private networks, firewall protection and network access control policies.

Firewalls: A building might have a digital password system or a security guard as a first point of defence and our computers are protected from intruders with ‘firewalls’.

Firewalls act to protect computer networks in the same way as a wall stops the spread of a fire. A firewall can be a software or hardware. It monitors the network traffic and maintains a set of rules to decide whether the data packets (e.g. files, email) can pass through the firewall into the network (e.g. LAN) computer system from another network (e.g. Internet) or whether they should be blocked or discarded.

Ideas about security in information technologyRecently, the media reported that the BKIS Cyber ​​Security Center discovered a security hole by facial recognition when accessing the computer. This shows that security in information technology is not easy. I have a comment that researchers looking for security solutions in information technology today are still using limited, stolen things such as characters, fingerprints, etc. to make passwords. access password. Maybe this comment is not satisfactory because I am not an information technology person, but with the use of finite things such as characters and numbers, sooner or later the characters in the access password It can also be broken or stolen. I have an idea that I don’t know if it can be done, but I boldly put it up here for information technology people to evaluate and, if possible, use it. My idea is that the computer user will choose a detail or a certain area of ​​a picture or picture provided by the computer as a password to access the computer or to the database. This method has several advantages:)))• There will be an infinite number of passwords generated so no device will be able to find out the set password.• Easier to remember than passwords established by the character system if short, easy to find, and if long, difficult to remember. If you can’t remember the password and have to use more methods of writing it down, the password will lose a lot of its meaning. Choosing a detail in the picture will be easier to remember because the picture can appear many times on the screen.• Quick access by just one mouse click or touch on the screen while eliminating the effect of software monitoring data updates from the keyboard.• User protection factors such as SSL protocol or OTP one-time authentication code are also under threat from many sides. The Heartbleed vulnerability in the hugely popular OpenSSL application library has shocked the world. A series of critical vulnerabilities were also discovered in other SSL libraries. For iOS operating system, the commonly used open source library AFNetworking also has serious security holes. The method of verifying transactions by OTP sent via SMS is also the target of many threats such as: attacks targeting GSM, 3G networks and malicious code (Torro, Zeus, Zitmo, Citadel, Perkele) …). According to Kasperksy Labs, the number of malware attacks on banking transactions has increased 20 times, many of which target OTP sent via SMS

2.jpg

+ There are no comments

Add yours

This site uses Akismet to reduce spam. Learn how your comment data is processed.