One or more data elements which individually or taken together identify a specific person.
What is PII (Personally Identifiable Information)?
It's a combination of structured and unstructured data available through the internet and collected by many organizations. This data can be mined for information that can be used in machine learning, predictive modelling and advanced analytics.
What is Big Data?
This is your actual physical location on the earth, plotted as latitude and longitude, which can then be converted into physical addresses using mapping software.
What is your Geolocation?
When you download a new application to your mobile device, it will often ask for your agreement to access a variety of data on your device. You have the ability to allow or deny access.
What are App Permissions?
A technique I can use if I'm so concerned about tracking cookies and the sharing of my data to parties I don't know that I decide never to use a smart phone.
What is a Risk Avoidance?
In the United States, it is the data element that uniquely identifies a specific person.
What is a social security number?
These are small text files dropped on a web browser to record data about a user of that browser including purchases, activities and geolocation.
What are tracking cookies?
A system that uses satellites in orbit around the earth and are used in conjunction with devices on the ground to determine a location of the device.
What is GPS or Global Positioning System.
They (the bad guys) will utilize permissions to weaponize against users with malware. Major app stores screen original apps for malware when approving them for their stores. Rather than the original app, they will hide the malware in updates.
Who are Malware Gangs?
A framework in which I can make decisions based on my morale values.
What are Ethics?
One of the biggest concerns with the security of your personal information is that it may be compromised through a data breach. If compromised, you may become one of these.
What is an Identify Theft victim?
They are one of the main sources of Big Data.
What are cookies?
A method that uses cellular towers to determine the location of a mobile device connected to the towers.
What is Triangulation?
An example of an app that may request 70 or more permissions to phone features such as microphone, camera, files and text messages. And you though it was a simple way to illuminate...
What is a Flashlight app?
They are codified rules that govern acceptable behaviors in a society. They are set and enforced by governments and include penalties for violations.
What are Laws?
When your health information is stolen or exposed publicly.
What is Medical Identity Theft?
These are small text files that a website will place on your browser to allow the site to function. They will do things like keep track of who you are are during a session or what our website preferences might be. They make the experience of using the site functional, more streamlined and effective.
What are essential cookies?
With your permission, mobile applications will track your location. Data is shared with third parties such as advertisers in order to personalize advertisements, promote coupons and discounts and “better customize the user experience.”
What is Geolocation Data?
Always check the permissions that an app is asking permission for and only grant those that are essential to using the app. If there is a unusually high number of permissions, that may be an indication that the app is this and you shouldn't install it.
What is Malicious?
A technique that we used as a group in class to assess the best answer to an ethical question. We took a position in one of two corners of the room and offered persuasive arguments to encourage the opposite side to come over to our position.
What is Vote with Your Feet?
Some actions you can take to do this include the following: Shred important documents before discarding them, avoid sharing too much information on Social Media and keep your Social Security Card in a safe place.
How can I protect my PII?
A law in the European Union that requires website providers to be transparent about how their websites works and what data they collect about you. They must give you the ability to opt out of data that is not essential for the site to function.
What is the GDPR or General Data Protection Regulation?
They use geolocation data to track where all their devices are located. This data is logged and stored.
Who are Mobile Phone Carriers?
Examples include Uber, Waze and Google Maps. Access to geolocation data is an essential permission to allow in order for the app to function.
What are Location-based Apps?
Cybersecurity laws are concerned with one or more of the elements of foundation of cybersecurity. It also defines the essentials to have in place to say that a system or data is secure.
What is the CIA Triad?