A data breach is the unauthorized access, loss or theft of sensitive data by a person or group who is not authorized to do so. Such a breakdown can be caused by human error, inadequate safety measures or technical faults. … Read More
Glossar
Data governance
Data governance is a term from information management practice that refers to the management and control of data within an organization. Data governance aims to ensure that data is properly recorded, stored, managed and used within the company. Effective data … Read More
Data Literacy
Data literacy is the ability to understand, interpret, analyze and communicate data. It is an important part of digital literacy and the ability to navigate in today’s data-driven world. Data literacy encompasses the ability to identify, collect, store and organize … Read More
Data management
Data management is a computer science term that deals with the management of data in a company, an organization or an individual context. It covers the entire life cycle of data, from its creation and collection through to storage, processing, … Read More
Data Mining
Data mining is a process of discovering useful information from large amounts of data by identifying patterns and relationships that might not otherwise be obvious. It is a machine learning method that is frequently used in science, business and other … Read More
Data protection impact assessment
Data protection impact assessment (DPIA) is a procedure used in the field of data protection to assess and minimize the impact of data processing on the privacy of data subjects. The purpose of a DPIA is to identify potential risks … Read More
DDoS attack
A DDoS attack (Distributed Denial of Service) is a cyber attack that aims to make a system – usually a web server or online service – inaccessible by overloading its resources. To do this, the server or network is flooded … Read More
Defense Cyber Security
Defense Cyber Security refers to the protective measures taken to protect government and military networks, systems and data from cyber attacks and threats. There are several options for Defence Cyber Security, including: Network monitoring and analysis to detect and prevent … Read More
DNS spoofing
DNS spoofing (also known as DNS spoofing or DNS hijacking ) is an attack technique in which attackers manipulate the Domain Name System (DNS) to direct users to fake websites. The DNS is responsible for converting web addresses such as“www.example.com” … Read More