OSFTWARWE Flashcards

(74 cards)

1
Q

Data protection

A

safe from unauthorised access, manipulation, or theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

encryption

A

Encrypting data at rest (in storage) and in transit (while being transferred over the network) ensures that even if a hacker intercepts the data, they cannot read it without the encryption key. Sensitive user data is encrypted before being stored in the database, ensuring security even if the database is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

confidentiality

A

Encrypting data at rest (in storage) and in transit (while being transferred over the network) ensures that even if a hacker intercepts the data, they cannot read it without the encryption key. Sensitive user data is encrypted before being stored in the database, ensuring security even if the database is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

integrity

A

Software protects data integrity by preventing unauthorized modifications or tampering. It is ensured by conducting data validation and integrity checks to ensure data remains accurate and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of cyber attacks to talk about

A

malware infections, ransomware incidents, phishing scams, and other malicious activities that disrupt operations and compromise data integrity. Common types of cyber attacks include phishing, Denial of Service (DoS), and malware. Sql injections, xss, Distributed denial of service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Regulatory compliance

A

GDPR and Australian Privacy Act
A company must notify users within 72 hours of a data breach under GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software development process

A

requirements definition

determining specifications

design

development

integration

testing and debugging

installation

maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how the capabilities and experience of end users influence the secure design features of software (DOT)

A

Users with low technical knowledge:
May need automatic security features (e.g., auto-updates, enforced strong passwords).

Require simple and clear security messages.

Advanced users:
Prefer customizable security settings.

May need role-based access control (RBAC) to configure permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Expanding on previous point

A

Clueless Users
Have little to no understanding of security principles.

Tend to prioritize convenience over safety (e.g. reusing passwords, ignoring warnings).

Are more likely to fall for phishing or social engineering attacks.

Force designers to implement user-friendly, idiot-proof security features, like automatic updates or password strength checks.

Rely heavily on default settings and rarely change configurations.

Advanced Users
Have strong security awareness and technical knowledge.

Understand concepts like encryption, phishing, and permissions.

Use secure practices (e.g. unique passwords, VPNs, MFA, firewalls).

Expect control and customization in their systems — they want to configure their own security.

Provide useful feedback to improve secure design, since they recognize weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Usability vs Security Balance

A

Too much security can make software frustrating to use.

Too little security increases risk.

A banking app should use multi-factor authentication (MFA) for extra security but also provide biometric authentication (fingerprint, face recognition) for ease of use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

integrity

A

Guarantees that data remains accurate and unaltered unless modified by an authorised user.

Common techniques include checksums, hashing, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing

A

Hashing converts data into a fixed-length string (a hash) that cannot be reversed to find the original data, using algorithms such as SHA-256 or bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Salts

A

A salt is a random value added to the password before hashing. It ensures that even if two users have the same password, their hashes will be different.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Availability

A

Ensures that software and data are accessible when needed.
Protects against denial-of-service (DoS) attacks, system failures, and data loss.

Implemented through redundancy, backups, and load balancing.

Example: A cloud service provider uses multiple data centres to keep services running even if one fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authorisation

A

Controls what actions users are allowed to perform based on their roles.

Uses role-based access control (RBAC) and least privilege principles.

Prevents users from accessing data and functions they do not need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Accountability

A

Ensures that actions within a system can be traced back to a responsible party.

Implemented through audit logs, tracking changes, and forensic analysis.

Helps with investigating security incidents and enforcing policies.

Example: A security log records login attempts, showing timestamps and user IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cryptography

A

Protects sensitive data using encryption algorithms

Ensures data integrity and authenticity with digital signatures and certificates.

Securely transmits data over networks using TLS and SSL protocols.

Example: HTTPS encrypts web traffic between a browser and a server to prevent interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Sandboxing

A

Restricts applications from accessing system resources beyond their scope.

Prevents malware from affecting the rest of the system.

Used in web browsers, mobile apps, and virtual environments.

Virtual computers are a form of sandboxing because they create isolated, controlled environments that separate software from the host operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Privacy By Design

A

Secure authentication is implemented before software deployment.

Privacy should be a default setting (e.g., opt-in data sharing, secure defaults).

Ensure data encryption, anonymisation, and strong access controls are standard.

Example: A social media platform making private account default

Allow users control over their data (e.g., account deletion, data access requests).

Ensure clear, transparent policies on data collection and usage.

Example: A website allowing users to download and delete their data easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Code Review

A

Peer review of code to detect security issues before deployment.

Helps identify logic errors, security flaws, and inefficiencies.

Example: A developer submits a pull request in GitHub, where another team member reviews and suggests improvements before merging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SAST

A

Static Application Security Testing (SAST) is a method of analyzing an application’s source code to find security vulnerabilities without executing the program. This white-box testing technique identifies security flaws like SQL injection or buffer overflows early in the development lifecycle, allowing developers to fix them before the software is deployed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DAST

A

Dynamic application security testing (DAST) is a method for identifying application vulnerabilities by attacking a running application from the outside, like a malicious user. This “black-box” testing approach uses automated tools to simulate attacks to find issues such as SQL injection and cross-site scripting, which are only revealed when the application is in operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Penetration Testing

A

A simulated cyberattack where security experts (ethical hackers) try to exploit vulnerabilities in a system, network, or app — just like real attackers would. Helps prevent unauthorized access, data breaches, and exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Vulnerability Assessment
A vulnerability assessment is the process of identifying, analyzing, and prioritizing security weaknesses in a system, network, or application before they can be exploited by attackers.
26
Input Validation
Prevents SQL injection, XSS, and buffer overflow attacks.
27
Error Handling
Prevents leakage of sensitive system information. Uses generic error messages instead of exposing system details. Example: Displaying “Invalid username or password” instead of “User not found” to prevent user enumeration attacks.
28
Secure API Development
APIs must be designed to prevent unauthorised access and reduce vulnerabilities. Use authentication and authorisation (e.g., OAuth, JWT). Validate API inputs to avoid injection attacks. Rate-limit requests to prevent denial-of-service attacks. Example: An API key and OAuth token are required to access a payment gateway securely.
29
Memory Management
Memory management ensures that a program safely allocates and frees memory to prevent issues like buffer overflows, memory leaks, or use-after-free errors.
30
Session Management
Session management controls how users stay logged in and interact securely with a system. It involves generating random, unique session IDs, storing them safely (e.g., using Secure and HttpOnly cookies), and invalidating them on logout or timeout. Good session management prevents attacks like session hijacking or fixation. Ensures user sessions are secure and expire after inactivity. Uses secure cookies and tokens.
31
Exception Management
Exception management handles unexpected errors in a controlled way without exposing sensitive system details. Instead of showing debug info or stack traces to users, errors are logged securely for developers. An app uses try-except to handle unexpected failures gracefully.
32
Broken Authentication and Session Management
Ensures passwords are stored securely using hashing. Uses MFA and session expiration policies. Example: Users must verify identity with an SMS code before accessing sensitive account details.
33
XSS CRoss site scripting
XSS happens when an attacker injects malicious JavaScript into a trusted website. When other users visit that site, the script runs in their browser, letting the attacker steal cookies, session tokens, or even modify the page content. To prevent XSS, always sanitize and encode user input, use Content Security Policy (CSP), and avoid directly injecting user data into HTML.
34
CSRF cross site request forgery
CSRF tricks a logged-in user into unknowingly sending a malicious request to a website where they’re authenticated. For example, clicking a fake link could transfer money from their bank account if their session is still active. To prevent CSRF, use anti-CSRF tokens, enforce same-site cookies, and verify the Origin/Referer headers for sensitive actions.
35
Content security policy
CSP is a browser security feature that helps stop attacks like XSS (Cross-Site Scripting) by controlling what content (like scripts, images, or styles) a webpage is allowed to load and run. I
36
Invalid Forwarding and Redirecting
This vulnerability occurs when a web application redirects or forwards users to another URL without properly validating user input. Attackers can exploit this by tricking users into visiting malicious websites through what looks like a legitimate link from a trusted domain.
37
Race conditions
A race condition is when two or more processes or threads try to access or modify shared data at the same time, and the final result depends on the timing of how they run. For instance, if there’s only one product left, both users’ requests to buy it are processed nearly simultaneously. Each thread reads quantity = 1, both pass the availability check, and each executes an UPDATE query decrementing the stock to 0, resulting in a final state of -1. Prevent race conditions by using locks or synchronisation mechanisms to control access to shared resources, ensuring only one thread can access them at a time.
38
File Attacks
These happen when a hacker tricks a system into opening, uploading, or running files it shouldn’t. For example, using path tricks like ../../ to access hidden files, uploading dangerous scripts, or including files from untrusted sources. To stop this, apps should check file names, limit what types can be uploaded, store files securely, and never run user-uploaded files.
39
Side Channel Attacks
These attacks steal information by observing how a system behaves rather than breaking its code. For example, measuring how long a login takes to guess a password or watching power or CPU usage to find encryption keys. They can be prevented by writing code that runs in constant time, adding randomness to calculations, and keeping sensitive processes isolated from others.
40
DevOps
DevOps combines software development and IT operations to speed up the process of building, testing, and deploying apps. It focuses on automation, continuous integration/delivery (CI/CD), and team collaboration to make software updates faster, more reliable, and easier to maintain.
41
Robotic Process Automation
uses software bots to automate repetitive, rule-based tasks — like data entry, form filling, or invoice processing — without changing existing systems. It mimics human actions on a computer to save time and reduce errors. A bot automatically reads invoices from emails, extracts key details (like amount and date), and enters them into an accounting system
42
Business Process Automation
is broader — it automates entire workflows or processes across departments, not just small tasks. It focuses on improving efficiency, consistency, and decision-making by integrating automation into the overall business. When a new employee is hired, the system automatically creates their accounts, sends a welcome email, assigns training modules, and sets up payroll
43
Artificial Intelligence
AI is the bigger concept — it’s all about making computers behave like humans. That means thinking, reasoning, understanding language, solving problems, and even being creative. AI systems can be rule-based (following programmed logic) or learning-based. Example: Chatbots, self-driving cars, or a voice assistant like Siri — all are AI because they try to act “smart.”
44
Machine Learning
ML is a subset of AI — it’s how machines learn from data instead of being manually programmed. You feed the machine tons of data, and it uses statistical methods to find patterns, make predictions, or improve performance over time. Example: Netflix learning your watch habits to recommend shows, or spam filters learning what emails are junk.
45
Supervised Learning
The model learns from labeled data. Input-output pairs are provided during training. Example: Spam email classification (Emails labeled as spam or not spam).
46
Unsupervised Learning
The model learns patterns and relationships from unlabeled data. Used for clustering and anomaly detection. the algorithm groups customers with similar habits without being told what the groups are.
47
Semi Supervised Learning
Combines a small amount of labeled data with a large amount of unlabeled data. Useful when labeling data is expensive or time-consuming. you label a small set of emails as spam or not spam, and the model learns from those, then uses unlabeled emails to improve its accuracy.
48
Reinforcement Learning
The model learns by trial and error and receives rewards or penalties. Used in robotics, gaming, and self-driving cars. Example: A robot learning to navigate an environment by receiving positive reinforcement for correct moves.
49
Data Analysis and Forecasting
ML models predict future trends based on historical data. Used in stock market predictions, weather forecasting, and sales forecasting. Example: A retail company uses ML to forecast demand for seasonal products.
50
Virtual Personal Assistants
AI-powered assistants like Siri, Alexa, Google Assistant use ML for natural language processing (NLP). They learn user preferences and improve interactions over time.
51
Decision Trees
A tree-like structure that breaks down a decision into smaller, simpler parts. Nodes represent decisions or splits based on input data. Used in classification and regression tasks. Example: Predicting whether a customer will buy a product based on age and income.
52
Neural Networks
Neural Networks (NN) simulate how the human brain processes information. Instead of a single equation, they use multiple layers of neurons to extract patterns from data. A network of artificial neurons that simulates how the human brain processes information. Consists of input layers, hidden layers, and output layers. Input Layer → Hidden Layer(s) → Output Layer Each neuron applies a mathematical function to its input and passes the result forward to the next layer. Input Layer: Accepts raw data. Hidden Layers: Process and refine the data. Output Layer: Generates a final prediction (e.g., "dog" vs "cat"). Used in image recognition, natural language processing, and self-driving cars.
53
Linear Regression
A supervised learning algorithm used for predicting continuous values. Fits a straight line to the data points. Example: Predicting house prices based on square footage.
54
Logistic Regression
Used for binary classification problems (e.g., yes/no, spam/not spam). Instead of a straight line, it produces an S-shaped curve (sigmoid function) that maps input values between 0 and 1. Example: Predicting whether an email is spam or not spam. Code Example: Predicting spam emails with logistic regression:
55
KNN
A classification algorithm that assigns a label based on the majority class of its nearest neighbors. Uses Euclidean distance to find the closest points. Works well for pattern recognition and recommendation systems. Example: Recommending movies based on a user’s past preferences.
56
Polynomial Regression
Polynomial regression is an extension of linear regression that can fit curved relationships by adding higher-degree polynomial terms. The equation looks like this: [ y = a + bx + cx^2 + dx^3 + ... ]
57
Assess the impact of automation on the individual, society and the environment (DOT)
1. Safety of Workers Example: Factory robots replacing humans in car manufacturing. Positive: Reduces workplace injuries and fatigue from dangerous or repetitive tasks. Negative: Job loss or reduced hours for manual laborers, leading to unemployment concerns. 2. People with Disability Example: Voice-controlled devices and automated wheelchairs. Positive: Increases independence, accessibility, and quality of life. Negative: Expensive technology can create inequality — not everyone can afford it. 3. Nature and Skills Required for Employment Example: Self-checkout machines replacing cashiers. Positive: Faster service, fewer human errors, and lower business costs. Negative: Loss of entry-level jobs and need for workers to retrain for more technical roles. 4. Production Efficiency, Waste, and the Environment Example: Automated farming with irrigation and sensor systems. Positive: Reduces resource waste, increases yield, and lowers environmental impact. Negative: High setup costs and potential electronic waste from obsolete systems. 5. Economy and Distribution of Wealth Example: AI trading systems and automated business operations. Positive: Boosts productivity, profits, and economic growth. Negative: Concentrates wealth among companies that own the tech, widening the gap between rich and poor.
58
Bias
Selection Bias: The training data does not represent the entire population. Confirmation Bias: AI reinforces existing human biases in decision-making. Historical Bias: Data reflects past inequalities (e.g., hiring discrimination in job applications). Facial Recognition Bias: AI struggles to recognize faces of different ethnicities if the training data is not diverse. Hiring Algorithms: AI tools used for hiring have been found to favor men over women due to past hiring data. Loan Approval AI: AI models may reject loans unfairly if trained on biased financial records.
59
PWA
Web applications that function like native mobile/desktop apps. Offer offline access, push notifications, and responsive design.
60
Data Packets
Information sent across the internet is broken into small units (packets) for transmission. Each packet contains: Header: Includes source/destination IP addresses and other control information. Payload: The actual data being transmitted. Footer: Signals the end of the packet.
61
Internet Protocol (IP)
Unique numerical identifiers assigned to devices for network communication. Two main versions: IPv4: 32-bit addresses (e.g., 192.168.1.1). IPv6: 128-bit addresses (e.g., 2001:db8::ff00:42:8329) for expanded internet capacity. Example: A laptop connecting to a website uses its IP address to request data from the server’s IP.
62
Domain Name System (DNS)
Translates human-readable domain names (e.g., google.com) into IP addresses. Acts as an address book of the internet, mapping domain names to their respective servers. Example: When a user types facebook.com, the DNS finds the corresponding IP and directs the browser to Facebook’s servers.
63
What Are Ports and Why Are They Needed?
Ports are numerical identifiers used by protocols to determine where network traffic should be directed within a system. Each service on a device (e.g., a web browser, email client, or FTP program) communicates through a specific port. Ports ensure that multiple network applications can function simultaneously without interfering with one another. Example: A device can browse the web while receiving emails because web traffic uses port 443 (HTTPS), while email uses port 993 (IMAP).
64
Protocols
HTTP & HTTPS (Hypertext Transfer Protocol / Secure) HTTP (port 80): Transfers web data in plaintext. HTTPS (port 443): Uses SSL/TLS encryption for secure communication. Example: A bank website uses HTTPS to protect login credentials from hackers. TCP/IP (Transmission Control Protocol / Internet Protocol) TCP: Ensures reliable, ordered data transmission by breaking data into packets and reassembling them. IP: Handles addressing and routing of packets between devices. Example: TCP ensures an email arrives intact, even if some packets take different routes. DNS (Domain Name System) Resolves domain names into IP addresses. Uses port 53 to query name servers. Example: When visiting netflix.com, DNS servers find the corresponding IP address and return it to the browser. FTP & SFTP (File Transfer Protocol / Secure File Transfer Protocol) FTP (port 21): Transfers files between clients and servers but lacks security. SFTP (port 22): Uses SSH encryption for secure file transfers. Example: A web developer uploads a website’s files using SFTP to ensure secure transmission. SSL & TLS (Secure Sockets Layer / Transport Layer Security) SSL (deprecated) & TLS: Encrypts data to secure communications between clients and servers. Commonly used for secure login forms, payment gateways, and email encryption. Example: Online banking websites use TLS encryption to protect financial transactions. SMTP, POP3, & IMAP (Email Protocols) SMTP (port 25, or 587 for encryption): Sends outgoing emails. POP3 (port 110): Downloads emails from a server to a local device and then removes the emails from the server. This is an older way of doing things; it made more sense when server space was more expensive and households usually only had one computer. IMAP (port 143, or 993 for encryption): Keeps emails stored on the server while syncing multiple devices. Example: Gmail uses IMAP to allow users to access their email from multiple devices while keeping messages on the server.
65
Secure Sockets Layer (SSL) Certificates SSL/TLS certificates encrypt data transmitted between a client (browser) and a server, preventing eavesdropping. Websites with HTTPS use SSL/TLS to ensure secure transactions. Example: A user logging into an online banking website with an HTTPS connection ensures their credentials are protected from attackers. Encryption Algorithms Convert plain text (readable data) into cipher text (unreadable scrambled data) to protect it from unauthorised access. Common encryption algorithms: AES (Advanced Encryption Standard) – Used for securing sensitive information. RSA (Rivest-Shamir-Adleman) – Commonly used for encrypting communication over the web. ECC (Elliptic Curve Cryptography) – Provides high security with smaller key sizes. Example: A messaging app encrypts text messages using AES-256, ensuring only the intended recipient can decrypt and read them. Encryption Keys Encryption relies on keys that determine how data is scrambled and unscrambled. Types of encryption: Symmetric encryption: Uses the same key for encryption and decryption (e.g., AES). Asymmetric encryption: Uses a public key for encryption and a private key for decryption (e.g., RSA). Example: An e-commerce site encrypts customer credit card details using an RSA public key; only the business's private key can decrypt it. Plain Text and Cipher Text Plain text: Unencrypted data that anyone can read. Cipher text: Encrypted data that appears scrambled. Simple Example – Caesar Cipher: A Caesar cipher is a basic encryption method where each letter is shifted by a fixed number of places in the alphabet. Example: With a shift of 3, HELLO becomes KHOOR. While simple, this method is easily breakable. Real-World Example – AES Encryption: Before encryption: password123 After encryption with AES-256: F5A1B6C9D8E2… Unlike the Caesar cipher, AES is highly secure and widely used. Authentication and Authorisation Authentication verifies a user's identity (e.g., entering a username and password). Authorisation determines what a user is allowed to do (e.g., an admin can access all settings, but a regular user cannot). Example: A user logs into their email (authentication), but only an admin can reset passwords for all users (authorisation). Hash Values A hash function converts data into a fixed-length string that represents the original data. Hashes are irreversible and used to securely store passwords. Common hash functions: SHA-256 – Used for password hashing. MD5 (obsolete) – Previously used for file verification but now insecure. Example: A password mypassword hashed with SHA-256 becomes 5e88489f..., preventing attackers from recovering the original password. Digital Signatures Ensure data integrity and authenticity by verifying that a message or document has not been altered. Generated using asymmetric encryption. Example: When downloading software, a digital signature ensures it was not tampered with before installation.
66
How an Encryption Handshake Works An encryption handshake is a process used to establish a secure connection between a client and a server. This is crucial for HTTPS websites and other secure online communications. Client Hello: The client (e.g., a web browser) sends a request to the server, listing supported encryption algorithms (cipher suites). Server Hello: The server selects the strongest available encryption method and sends back its SSL/TLS certificate, which contains its public key. Key Exchange: The client verifies the server's certificate using a trusted certificate authority (CA). The client and server generate a shared secret key using asymmetric encryption (e.g., RSA or Diffie-Hellman key exchange). Session Key Established: From this point onward, all communication is encrypted using symmetric encryption (e.g., AES), which is faster and more efficient. Secure Communication Begins: The encrypted session allows safe transmission of sensitive data, such as passwords or credit card details. Example: When you log into your online banking account, an encryption handshake ensures that your login details are securely transmitted over HTTPS.
67
Data Mining
The process of analyzing large datasets to find patterns, trends, and relationships. Used in advertising, fraud detection, and recommendation systems. Example: E-commerce sites like Amazon analyze purchase history to recommend products. Security Implications: Hackers can use data mining to identify security vulnerabilities or predict user behavior for phishing attacks.
68
Meta Data
Data about data, describing its content, origin, and structure. Includes information like timestamps, geolocation, and file properties. Example: A photo taken on a smartphone has metadata storing the date, time, and location. Privacy Concern: Websites and companies collect metadata to track users, often without their explicit consent.
69
Streaming Service Management
Platforms like Netflix, YouTube, and Spotify handle enormous amounts of real-time data to deliver seamless experiences. Uses CDNs (Content Delivery Networks) to distribute content efficiently. Requires load balancing to handle millions of concurrent users. Example: Netflix optimises video quality based on a user's internet speed using adaptive streaming. Security Concerns: Cyberattacks like DDoS (Distributed Denial of Service) can target streaming services, overwhelming servers with traffic and causing service outages.
70
W3C Worldwide web Consortium
The World Wide Web Consortium (W3C) is an international organization that develops and maintains web standards to ensure the internet is consistent, accessible, and works across all browsers and devices. It creates key technologies like HTML, CSS, and XML, promotes web accessibility through the WCAG guidelines, and supports security and privacy standards. Overall, W3C ensures the web remains open, reliable, and usable for everyone.
71
Web Accessibility Initiative (WAI)
Aims to make the web usable for people with disabilities. Provides guidelines such as the Web Content Accessibility Guidelines (WCAG) to help developers create accessible web applications. Accessibility features include: Keyboard navigation (ensuring users can navigate without a mouse). Alt text for images (providing descriptions for screen readers). ARIA roles (improving accessibility for interactive elements).
72
Version Control
Tracks Code Changes: Developers can view previous versions of code and revert if needed. Collaboration: Multiple developers can work on a project simultaneously without overwriting changes. Branching and Merging: Developers can work on different features in separate branches before merging changes. Backup and Recovery: Prevents data loss by storing a history of code changes.
73
Template Engine
A template engine is a tool that lets developers create dynamic web pages by combining HTML templates with data from a program or database. It replaces placeholders in the HTML (like {{ user }}) with real values at runtime, making it easy to display personalised or changing content
74
social, ethical and legal issues for data breaches
Social Issues Loss of Trust: Customers may lose confidence in the organisation’s ability to protect their data. Reputation Damage: Businesses and institutions can suffer long-term brand harm and public backlash. Emotional Distress: Victims may face anxiety, embarrassment, or financial stress due to leaked personal information. Impact on Society: Widespread breaches can erode public trust in digital systems and discourage online participation. Ethical Issues Negligence in Data Protection: Failing to implement adequate security measures is unethical, especially when handling sensitive or personal data. Misuse of Information: Unethical use or sale of stolen data (e.g., identity theft, fraud) violates privacy and autonomy. Transparency and Accountability: Organisations have an ethical duty to disclose breaches promptly and take responsibility. Informed Consent: Users should know how their data is stored, used, and protected; failing to communicate this violates ethical data practices. Legal Issues Privacy Laws Violations: Breaches can violate regulations like the Australian Privacy Act 1988, GDPR (Europe), or CCPA (US). Mandatory Reporting: In many regions, companies are legally required to report breaches to authorities and affected individuals. Fines and Penalties: Non-compliance with data protection laws can result in heavy fines or lawsuits. Liability: Organisations can face legal action for negligence or failure to protect users’ personal information.