Aims & Outcomes

By the end you should be able to:-


  1. Describe legal and ethical obligations around storing and sharing personal and business data.
  2. Explain causes and effects of data security breaches.
  3. Describe how to protect data against security breaches.
Big Data Word Cloud

For each outcome, course participants should be able to:-

security fundementals

Outcome 1

Describe legal and ethical obligations around storing and sharing personal and business data.

  1. Describe the laws that apply to the storing & sharing of data
  2. Describe some of the ethical consideration of organisations storing and sharing data.
  3. Give examples of best practices in the application of ethics in organisations.
data security

Outcome 2

Explain causes and effects of data security breaches.

  1. Define a data security breach
  2. Provide recent real life examples of data security breaches.
  3. Provide common causes of data security breaches
  4. Explain some potential effects of a data security breach on individuals.
  5. Explain some potential effects of a data security breach on organisations.
digital forensics

Outcome 3

Describe how to protect data against security breaches.

  1. Identify software that can be used to enhance security.
  2. Identify hardware that can be used to enhance security.
  3. Identify workplace rules that can be used to enhance data security
  4. Apply selected methods of enhancing data security to a specific situation
  5. Create a data security solution for a recent data security breach.

Big Data


Developments in technology has enabled to organisations to capture, store, share and analyse vast amounts of data. This includes data produced by ourselves by what we buy, what sites we visit, where we work and even our DNA can be classed as data. Data is also produced by things that move; such as parcels, transport systems (planes, trains and automobiles) etc; things that change, like the weather, sales patterns, population growth etc and sensors like cameras, satellites, radar etc.

All this data has led to the growth of so called Big Data which can be analysed to identify new patterns in buying trends, the emergence of new diseases, possible cures, the best diets, the movement of populations etc.

On the face of it, big data seems a good thing but it raises important questions. Like, who owns your DNA (the building blocks of genes that determine how you look, your health and many other things) and if not you, then who? Should your DNA and medical records be shared with others if it possibly helps find a new cure? Should your every movement be recorded? Should what you eat be monitored? Should your every email be examined?

Answering some of these questions and discovering what protections and rights you have in the world of big data is the aim of this topic.

Rounded Image
Tasks
Content for Accordion Panel 1
Placeholder image
Content for Accordion Panel 2
Content for Accordion Panel 3

Can you now do?


  • Have an awareness of and understand the term Big Data
  • Provide examples of some of the issues surrounding big data

If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.

Cyber Security

  • Security Fundamentals
  • Data Security
  • Digital Forensics
  • Ethical Hacking
Supporting courses by the SQA Logo
css badge
html badgee