0% found this document useful (0 votes)
56 views4 pages

Data Literacy Notes

Unit 2 focuses on data literacy, emphasizing its importance for informed decision-making and problem-solving. It outlines the concepts of data security and privacy, highlighting best practices for protecting sensitive information and mitigating cyber threats. The document also provides guidelines for maintaining cybersecurity through do's and don'ts.

Uploaded by

samreenshobi80
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views4 pages

Data Literacy Notes

Unit 2 focuses on data literacy, emphasizing its importance for informed decision-making and problem-solving. It outlines the concepts of data security and privacy, highlighting best practices for protecting sensitive information and mitigating cyber threats. The document also provides guidelines for maintaining cybersecurity through do's and don'ts.

Uploaded by

samreenshobi80
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Unit 2 - Data Literacy

Unit 2.1 - Basics of Data Literacy

Data literacy means knowing how to understand, work with, and talks about data. It's about being able to
collect, analyze, and show data in ways that make sense.

Why Data Literacy is important?

Data literacy is essential because it enables individuals to make informed decisions, think critically, solve
problems, and innovate.

Data Literacy Process Framework

The data literacy framework provides guidance on using data efficiently and with all levels of awareness. Data
literacy framework is an iterative process.

What are Data Security and Privacy? How are they related to AI?
Data privacy referred to as information privacy is concerned with the proper handling of sensitive data
including personal data and other confidential data. Examples:

1) Downloading an unverified mobile application


2) Accepting the Terms of Service without reading
3) A data breach at a government agency can put top secret information in the hands of an enemy state.
4) A breach at a hospital can put personal health information in the hands of those who might misuse

The following best practices can help you ensure data privacy:

● Understanding what data, you have collected, how it is handled, and where it is stored.

● Necessary data required for a project should only be collected.

● User consent while data collection must be of utmost importance.

What is Data Security?

Data security is the practice of protecting digital information from unauthorized access, corruption, or theft
throughout its entire lifecycle.

Why Data Security is important?

Due to the rising amount of data in the cloud there is an increased risk of cyber threats. The most appropriate
step for such an amount of traffic being generated is how we control and protect the transfer of sensitive or
personal information at every known place. The most possible reasons why data security is more important
now are:

• Cyber-attacks affect all the people

• The fast-technological changes will boom cyber attacks

Best Practices for Cyber Security

Cyber security involves protecting computers, servers, mobile devices, electronic systems, networks, and data
from harmful attacks.

Do’s (Any 4)

• Use strong, unique passwords with a mix of characters for each account. • Activate Two-Factor
Authentication (2FA) for added security. • Download software from trusted sources and scan files before
opening. • Prioritize websites with "https://" for secure logins. • Keep your browser, OS, and antivirus updated
regularly. • Adjust social media privacy settings for limited visibility to close contacts. • Always lock your
screen when away. • Connect only with trusted individuals online. • Use secure Wi-Fi networks. • Report
online bullying to a trusted adult immediately.

Don’t ‘s(Any 4)

• Avoid sharing personal info like real name or phone number. • Don't send pictures to strangers or post
them on social media. • Don't open emails or attachments from unknown sources. • Ignore suspicious
requests for personal info like bank account details. • Keep passwords and security questions private. • Don't
copy copyrighted software without permission. • Avoid cyberbullying or using offensive language online.

You might also like