Page 264 - Ai_417_V3.0_C9_Flipbook
P. 264
The following is the list of Do's and Don’t ‘s to be followed for best practices of cyber security:
Do’s Don’t’s
● Use strong, unique passwords with a mix of ● Avoid sharing personal info like real name or
characters for each account. phone number.
● Activate Two-Factor Authentication (2FA) for ● Don’t send pictures to strangers or post them on
added security. social media.
● Download software from trusted sources only and ● Don’t open emails or attachments from unknown
scan files before opening. sources.
● Prioritise websites with "https://" for secure logins. ● Ignore suspicious requests for personal info like
● Keep your browser, OS, and antivirus updated. bank account details.
● Adjust social media privacy settings for limited ● Keep passwords and security questions private.
visibility to close contacts. ● Don’t use copyright software without permission.
● Always lock your screen when away. ● Avoid cyberbullying or use of offensive language
● Connect only with trusted individuals online. online.
● Use secure Wi-Fi networks. ● Don't respond to phone calls or emails, asking for
● Report online bullying to a trusted adult confidential data.
immediately. ● Don't leave wireless or Bluetooth turned on when
● Do use privacy settings on social media sites to not in use.
restrict access to your personal information.
Reboot
1. How are data security and data privacy related?
2. List down practices that can help you ensure data privacy.
Acquiring, Processing, and Interpreting Data
Working with data involves three key steps: acquiring, processing, and interpreting. First, gather data from
sources like surveys and databases. Next, process it by cleaning and organising it for accuracy. Finally, analyse
the data to find patterns and insights that help make informed decisions.
Types of Data
In statistics, various types of data are gathered, analysed, interpreted, and presented. These data consist of
individual factual pieces recorded for analysis. Data analysis involves interpretation and presentation, producing
statistics to get some meaningful insight from that data. Data classification and handling are crucial processes
that use multiple tags and labels to define data, ensuring its integrity and confidentiality. Artificial Intelligence is
crucial, with data serving as its foundation. We come across different types of data and information every day.
262 Touchpad Artificial Intelligence (Ver. 3.0)-IX

