Data is a valuable commodity and therefore a juicy target for malicious parties. Learn some of the most common vulnerabilities in systems in this video.
- Vulnerability in the privacy context … is a little bit different than vulnerability … as we hear it in the security world, … where vulnerability is really the surface of attack … where someone can get in or information can go out … in an unexpected or even criminal way. … Vulnerability in a data protection and privacy context … is the vulnerability that is really shared. … One side, the donor of the information, … me, the carbon based unit, … the individual that shares information or uses services … that process information. … And on the other side the organization … that really builds its digital asset base … based upon true, accurate, fair, moral, legal, and ethical … information that it processes. … Those data stories that are processed by the organization … that help serve the customer and also recruit … and invite new and exciting employees. … So the vulnerability in sharing … information is always present. … Am I sharing it correctly? … Am I processing it correctly? … Is this the story that is the story I want to tell? …
- Relate the concept of data as intellectual property.
- Examine the ways in which moral, legal, and ethical concerns apply to data privacy.
- Explain how context applies to personal private information.
- Recognize the motivations of individuals accessing data they are not authorized to access.
- Define the implications of moral crumple zones.
Skill Level Intermediate
1. What Is Data Privacy?
2. The Importance of Data Privacy
3. What's at Stake?
4. Privacy Solutions
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.