Ways of representing data
Infographics
- A visual representation of information that combines text, images, and charts to convey complex data clearly.
- Infographics are used to simplify complex information and make it engaging.
Data Visualization
- The process of converting data into visual representations like charts, graphs, and infographics.
- Visualizations are used to make data easier to understand and interpret.
Data visualization helps to communicate information effectively and make data-driven decisions.
Theory of KnowledgeHow does the way data is represented affect our understanding and interpretation of it?
Data Security
- The protection of data from unauthorized access, use, disclosure, disruption, modification, or destruction.
- Data security is crucial to ensure that data is protected and not misused. There are several techniques to ensure data security:
- Encryption
- Data masking
- Blockchain
Encryption
- The process of converting readable data into unreadable characters to prevent unauthorized access.
- Encryption is a process that transforms plain text into cipher text using an encryption key.
- The encryption key is a string of characters that is used to encrypt the data.
- The cipher text is the encrypted data that is unreadable without the encryption key.
- The cipher text can be decrypted back into plain text using a decryption key.
- The decryption key is a string of characters that is used to decrypt the data.
- The decryption key can be the same as the encryption key (which is known as symmetric encryption) or different to the encryption key (asymmetric (public key) encryption).
- Asymmetric key encryption is much more secure than symmetric encryption due to the usage of two separate cipher keys.
- However, due to this same reason, it is also more difficult to implement and requires additional safety protocols.
Data Masking
- The process of replacing sensitive data with fictional data to protect privacy while maintaining functionality.
- Data masking is a technique used to protect sensitive data by replacing it with fictional data.
- The fictional data is similar in format to the original data, but it is not real.
- The masked data can be used for testing, development, or analytics without exposing the sensitive information.
- Data masking is useful when sharing data with third parties or using data for non-production purposes.
Examples of data masking include scenarios such as using pseudonyms instead of actual names on social media to protect one's identity and obscuring credit card numbers to protect financial data.
Blockchain
- A decentralized and distributed digital ledger that records transactions across multiple computers in a secure and transparent manner.
- Blockchain is a decentralized and distributed digital ledger that records transactions across multiple computers in a secure and transparent manner.
- Blockchain consists of a chain of blocks, where each block contains a list of transactions.
- Each block is linked to the previous block using a cryptographic hash, creating a chain of blocks.
- Blockchain is secure because:
- The data in each block is encrypted using cryptographic algorithms.
- The blockchain is distributed across multiple computers, making it difficult to alter the data without consensus from the network.
- Blockchain is transparent because:
- The data in the blockchain is visible to all participants in the network.
- Any changes to the data are recorded in the blockchain, creating a permanent audit trail.
- Blockchain is used in various applications, such as:
- Cryptocurrencies (e.g., Bitcoin, Ethereum).
- Supply chain management
- Digital identity verification
- Voting systems
- Many people think that the blockchain is only used for cryptocurrencies.
- This is a mistake, as the blockchain may be used in various scenarios, some of which are outlined above.