Introduction to Data Privacy and Security
Expert-defined terms from the Professional Certificate in AI Data Privacy and Security course at HealthCareStudies (An LSPM brand). Free to read, free to share, paired with a globally recognised certification pathway.
Introduction to Data Privacy and Security Glossary #
Introduction to Data Privacy and Security Glossary
A #
A
Access Control #
Access control is a security measure that regulates who or what can view or use resources in a computing environment. It involves identifying users and enforcing policies to determine which information they can access and what actions they can perform.
Advanced Persistent Threat (APT) #
An advanced persistent threat is a sophisticated, long-term cyberattack carried out by a group with significant resources and expertise. APTs often target organizations for espionage or sabotage, aiming to remain undetected for extended periods.
Authentication #
Authentication is the process of verifying the identity of a user or system trying to access a network or resource. It typically involves providing credentials such as passwords, biometric data, or security tokens.
B #
B
Biometric Data #
Biometric data refers to unique physical or behavioral characteristics that can be used to identify individuals, such as fingerprints, facial features, or voice patterns. Biometrics are often used in authentication and access control systems.
Blockchain #
Blockchain is a decentralized, distributed ledger technology that securely records transactions across multiple computers. Each block in the chain contains a cryptographic hash of the previous block, making it resistant to tampering.
C #
C
Compliance #
Compliance refers to conforming with laws, regulations, and industry standards related to data privacy and security. Organizations must comply with requirements such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA).
Confidentiality #
Confidentiality is the principle of keeping sensitive information private and preventing unauthorized access. Data encryption, access controls, and secure communication channels are common methods to maintain confidentiality.
Cybersecurity #
Cybersecurity is the practice of protecting computer systems, networks, and data from cyber threats such as malware, ransomware, and unauthorized access. It encompasses a range of technologies, processes, and policies to safeguard information assets.
D #
D
Data Breach #
A data breach is an incident in which sensitive, protected, or confidential information is accessed, stolen, or exposed without authorization. Data breaches can result from cyberattacks, insider threats, or human error.
Data Encryption #
Data encryption is the process of converting plaintext data into ciphertext to protect it from unauthorized access. Encryption algorithms use keys to encode and decode information, ensuring that only authorized parties can read the data.
Data Governance #
Data governance is a set of processes, policies, and standards for managing and protecting an organization's data assets. It involves defining data ownership, quality, security, and compliance requirements to ensure data integrity and usability.
Data Loss Prevention (DLP) #
Data loss prevention is a strategy for identifying, monitoring, and protecting sensitive data to prevent unauthorized disclosure or leakage. DLP solutions use content inspection and policy enforcement to mitigate data loss risks.
Data Privacy #
Data privacy refers to the protection of personal information collected, processed, or stored by organizations. Privacy laws and regulations govern how data can be used, shared, and retained to safeguard individuals' privacy rights.
Data Protection Officer (DPO) #
A data protection officer is a designated individual responsible for overseeing an organization's data protection strategy and compliance with privacy regulations. The DPO ensures that data processing activities are lawful and transparent.
Data Retention #
Data retention is the practice of storing information for a specific period based on legal, regulatory, or business requirements. Organizations must establish data retention policies to manage data lifecycle, storage costs, and compliance obligations.
E #
E
Encryption Key #
An encryption key is a unique code or password used to encrypt and decrypt data during transmission or storage. Keys can be symmetric (shared) or asymmetric (public-private) and are essential for securing sensitive information.
Endpoint Security #
Endpoint security is a strategy for protecting devices such as computers, mobile phones, and IoT devices from cybersecurity threats. It includes antivirus software, firewalls, intrusion detection systems, and encryption to secure endpoints.
Exploit #
An exploit is a piece of software or code that takes advantage of a vulnerability in a system or application to compromise security. Attackers use exploits to gain unauthorized access, execute commands, or escalate privileges on target systems.
F #
F
Firewall #
A firewall is a network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules. Firewalls act as a barrier between trusted internal networks and untrusted external networks to prevent unauthorized access.
G #
G
General Data Protection Regulation (GDPR) #
The General Data Protection Regulation is a European Union law that governs the protection of personal data and privacy rights of individuals. GDPR imposes strict requirements on organizations handling EU residents' data, including data breach notification and consent management.
H #
H
Health Insurance Portability and Accountability Act (HIPAA) #
The Health Insurance Portability and Accountability Act is a U.S. law that sets standards for protecting patients' medical records and personal health information. HIPAA regulations apply to healthcare providers, insurers, and other entities handling protected health information.
I #
I
Incident Response #
Incident response is a structured approach to managing and mitigating security incidents such as data breaches, cyberattacks, or system compromises. It involves detecting, analyzing, containing, eradicating, and recovering from security breaches to minimize damage.
Information Security #
Information security is the practice of protecting the confidentiality, integrity, and availability of data assets from unauthorized access, disclosure, alteration, or destruction. Security controls, risk management, and compliance frameworks are used to safeguard information.
Internet of Things (IoT) #
The Internet of Things refers to a network of interconnected devices embedded with sensors, software, and communication technologies to exchange data and perform automated tasks. IoT devices include smart home appliances, wearables, and industrial sensors.
IT Security #
IT security, also known as cybersecurity or computer security, focuses on protecting information technology systems, networks, and data from cyber threats. IT security measures include access controls, encryption, antivirus software, and security awareness training.
J #
J
Job Rotation #
Job rotation is a security practice that involves moving employees across different roles or departments to reduce the risk of insider threats and fraud. By limiting employees' access to sensitive information and systems, organizations can enhance data security.
K #
K
Keylogger #
A keylogger is a type of malicious software that records keystrokes on a computer or mobile device without the user's knowledge. Attackers use keyloggers to steal passwords, credit card details, and other sensitive information for fraudulent purposes.
L #
L
Least Privilege #
Least privilege is a security principle that restricts users' access rights to the minimum level required to perform their job functions. By granting only necessary permissions, organizations can limit the impact of insider threats and unauthorized access.
M #
M
Malware #
Malware, short for malicious software, is a type of software designed to disrupt, damage, or gain unauthorized access to computer systems. Common types of malware include viruses, worms, Trojans, ransomware, and spyware.
N #
N
Network Security #
Network security encompasses technologies, processes, and policies designed to protect computer networks from cyber threats. It includes measures such as firewalls, intrusion detection systems, VPNs, and network segmentation to secure network infrastructure.
O #
O
Open Source Software #
Open source software is computer software with its source code available for users to view, modify, and distribute freely. Open source projects promote collaboration, transparency, and innovation while allowing users to customize software to meet their needs.
P #
P
Phishing #
Phishing is a social engineering technique used by cybercriminals to deceive individuals into divulging sensitive information such as passwords, usernames, or financial data. Phishing attacks often involve fraudulent emails, websites, or messages impersonating legitimate entities.
Privacy by Design #
Privacy by design is a framework for embedding privacy protections into the design and development of products, services, and systems. By integrating privacy features from the outset, organizations can enhance data protection and compliance with privacy regulations.
Public Key Infrastructure (PKI) #
Public key infrastructure is a system of hardware, software, policies, and procedures that manage digital certificates and encryption keys. PKI enables secure communication, authentication, and data integrity in public key cryptography systems.
Q #
Q
Quantum Computing #
Quantum computing is a revolutionary computing paradigm that leverages quantum mechanics principles to perform complex calculations exponentially faster than classical computers. Quantum computers have the potential to break traditional encryption algorithms used for data security.
R #
R
Ransomware #
Ransomware is a type of malware that encrypts files on a victim's computer or network, demanding payment (ransom) for decryption. Ransomware attacks can cripple organizations, disrupt operations, and result in data loss if not mitigated promptly.
Risk Management #
Risk management is the process of identifying, assessing, and mitigating risks to an organization's information assets. It involves analyzing threats, vulnerabilities, and potential impacts to establish controls and measures for managing security risks effectively.
S #
S
Security Awareness Training #
Security awareness training educates employees about cybersecurity threats, best practices, and policies to reduce the risk of human error and security incidents. Training programs cover topics such as phishing, password security, and social engineering awareness.
Security Incident #
A security incident is an event that compromises the confidentiality, integrity, or availability of information assets. Security incidents include data breaches, malware infections, unauthorized access, and other cybersecurity incidents that require investigation and response.
Security Policy #
A security policy is a set of rules, guidelines, and procedures that define an organization's approach to information security. Security policies outline expectations, responsibilities, and controls for protecting data, systems, and networks from threats.
Social Engineering #
Social engineering is a tactic used by cyber attackers to manipulate individuals into disclosing confidential information or performing actions that compromise security. Techniques such as pretexting, phishing, and baiting exploit human psychology to exploit vulnerabilities.
T #
T
Threat Intelligence #
Threat intelligence is information about cybersecurity threats, vulnerabilities, and attacker tactics that help organizations identify, assess, and respond to security risks. Threat intelligence sources include threat feeds, analysis reports, and security research publications.
Two #
Factor Authentication (2FA): Two-factor authentication is a security mechanism that requires users to provide two forms of verification to access an account or system. Common 2FA methods include passwords, biometrics, security tokens, or mobile OTP codes to enhance authentication security.
U #
U
Unified Threat Management (UTM) #
Unified threat management is a comprehensive security solution that integrates multiple security features into a single platform. UTM devices combine firewall, antivirus, intrusion detection, VPN, and content filtering capabilities to protect networks from cyber threats.
V #
V
Vulnerability Assessment #
Vulnerability assessment is a systematic process of identifying weaknesses in an organization's IT infrastructure, applications, or systems that could be exploited by attackers. Vulnerability scans, penetration testing, and security audits are used to assess security posture and remediate vulnerabilities.
W #
W
Web Application Firewall (WAF) #
A web application firewall is a security solution that protects web applications from common cyber threats such as SQL injection, cross-site scripting, and DDoS attacks. WAFs filter, monitor, and block malicious traffic to secure web applications and prevent data breaches.
X #
X
XSS (Cross #
Site Scripting): Cross-site scripting is a web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. XSS attacks can steal sensitive information, deface websites, or redirect users to malicious sites by exploiting client-side vulnerabilities.
Y #
Y
Zero #
Day Exploit: A zero-day exploit is a cyberattack that targets a previously unknown vulnerability in software or hardware before a patch or fix is available. Zero-day exploits can be highly damaging as they give attackers the advantage of exploiting security flaws before they are discovered and mitigated.
Z #
Z
Zero Trust #
Zero Trust is a security model based on the principle of never trusting any user or device by default, regardless of their location or network access. Zero Trust architecture assumes that threats exist both inside and outside the network, requiring continuous authentication, authorization, and monitoring to protect data assets.