Aims & Outcomes

By the end you should be able to:-


  1. Describe legal and ethical obligations around storing and sharing personal and business data.
  2. Explain causes and effects of data security breaches.
  3. Describe how to protect data against security breaches.
Big Data Word Cloud

For each outcome, course participants should be able to:-

security fundementals

Outcome 1

Describe legal and ethical obligations around storing and sharing personal and business data.

  1. Describe the laws that apply to the storing & sharing of data
  2. Describe some of the ethical consideration of organisations storing and sharing data.
  3. Give examples of best practices in the application of ethics in organisations.
data security

Outcome 2

Explain causes and effects of data security breaches.

  1. Define a data security breach
  2. Provide recent real life examples of data security breaches.
  3. Provide common causes of data security breaches
  4. Explain some potential effects of a data security breach on individuals.
  5. Explain some potential effects of a data security breach on organisations.
digital forensics

Outcome 3

Describe how to protect data against security breaches.

  1. Identify software that can be used to enhance security.
  2. Identify hardware that can be used to enhance security.
  3. Identify workplace rules that can be used to enhance data security
  4. Apply selected methods of enhancing data security to a specific situation
  5. Create a data security solution for a recent data security breach.

Big Data


Developments in technology has enabled to organisations to capture, store, share and analyse vast amounts of data. This includes data produced by ourselves by what we buy, what sites we visit, where we work and even our DNA can be classed as data. Data is also produced by things that move; such as parcels, transport systems (planes, trains and automobiles) etc; things that change, like the weather, sales patterns, population growth etc and sensors like cameras, satellites, radar etc.

All this data has led to the growth of so called Big Data which can be analysed to identify new patterns in buying trends, the emergence of new diseases, possible cures, the best diets, the movement of populations etc.

On the face of it, big data seems a good thing but it raises important questions. Like, who owns your DNA (the building blocks of genes that determine how you look, your health and many other things) and if not you, then who? Should your DNA and medical records be shared with others if it possibly helps find a new cure? Should your every movement be recorded? Should what you eat be monitored? Should your every email be examined?

Answering some of these questions and discovering what protections and rights you have in the world of big data is the aim of this topic.

Rounded Image
Tasks

Starting a new section, so let's create our first page within the section Data Security,in our developing Notebook. Call it Big Data and answer the following questions.

  1. Explain the term Big Data.
  2. Describe what make big data different to other sorts of data.

Some say people should be concerned about Big Data, so watch the video and answer the questions.

  1. What are the four big concerns about big data?
  2. What might be the benefits to individuals for sharing data?
  3. Weighing concerns about big data against possible benefits, give your opinion about big data. Is it a good or bad thing for individuals?

Time to get ready for some serious hacking. And this involves a some preparation work and familiarisation with a new operating system that works differently to Windows.

The operating system is called Linux which is open source software. And because it's open source, it's source code is freely available and others can contribute to it. One downside to being open source, is that there are a number of different 'flavours'. i.e the core of the operating system is the same but looks slightly different and built with a different purpose in mind.

We are going to be using Kali Linux, specially developed by Offensive Security for hacking and penetration testing. At it's heart, Kali Linux is a large collection of proven hacking tools that can be used for testing the security of networks and discovering who did what when in hack attacks.

The following steps involves installing Kali Linux on your computer at home. You can install it on a USB pen-drive which you would do if you required portability, but it involves messing around with your BIOS, which is not necessarily a good thing.

Security professionals use Kali Linux, because the collection of tools is so comprehensive and because it works on all platforms. You could try avoid installing Kali Linux, as there some Windows equivalents for some of the main programs but not for all, and separately they would in the end, use up more storage space.

What we are about to do, is not difficult, but make sure you have permission.
Open Source Logo
1. Get Oracle Virtual Box
Virtual Box

VirtualBox is powerful piece of software produced by Oracle. It can be installed on any platform and enables computers to run other operating systems and programs that work with those operating systems.

So if you wanted, you can get your PC to work like an Apple using Apple apps, and even more likely get your Apple device to run Windows with PC type applications.

You can download VirtualBox from here

Follow the steps on the video to install it.

Also download the VirtualBox extension pack which adds some useful functionality to VirtualBox. The same file works for all platforms and you can get it here.

2. Get Kali Linux
Kali Linux

With VirtualBox ready, it's time to get hold of Kali Linux. It's a big file 2.6Gb. You can download from here. If you have a torrent client program, use the torrent link, which provides the possibility of suspending and resuming downloads.

The file is an iso or an image file normally associated with optical drives (CD's, DVD's etc). They need an additional program to open them or extract their contents. A good free version a suitable program can be downloaded.

Work along with the video to get Kali Linux installed.

3. Problem Solving
Problem Solving

A common problem after installing Kali Linux is that it doesn't go full screen. Instead, it runs as a small window inside a much larger one. So watch the video to cure this problem.

Another issue that might arise is the inability to access folders or move files from Windows in Linux. This is just a matter of changing a few settings and creating a shared folder.

Finally if attempting to use Wireless sniffing and cracking programs you may find that your network adapter is not supported. Worry not. A solution is at hand. The necessary file can be found at here

After you've copied the file, to load wireless card support you only have to type

  1. cd Desktop
  2. root@kali ls
  3. root@kali Desktop cd compat rest of title make load

Hopefully congratulations are in order and you've been successful in installing Kali Linux.

If you've still have problems, search on the internet for a cure. and if you still can't find a solution, tell your teacher.

Can you now do?


  • Have an awareness of and understand the term Big Data
  • Provide examples of some of the issues surrounding big data
  • While not essential for the course, know how to install VirtualBox and Kali Linux

If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.

Cyber Security

  • Security Fundamentals
  • Data Security
  • Digital Forensics
  • Ethical Hacking
Supporting courses by the SQA Logo
css badge
html badgee