5 eSecurity – Personal Data Security and Confidentiality
Learning Objective (AO1‑AO3)
Explain the concepts of personal data, security and confidentiality; analyse the main threats to personal data and the different types of malware; evaluate technical, organisational and legal controls (including their advantages and disadvantages); and apply this knowledge to everyday computing environments.
Key Definitions (AO1)
Personal Data: Any information that can identify an individual, directly or indirectly (e.g., name, address, ID number, biometric data).
Security: Measures taken to protect data from unauthorised access, alteration, loss or destruction.
Confidentiality: The principle that personal data must only be accessed by authorised persons for legitimate purposes.
Integrity: Ensuring data remains accurate and unaltered during storage, transmission and processing.
Availability: Ensuring authorised users can access data when required.
Malware: Malicious software designed to damage, disrupt or gain unauthorised access to computer systems (e.g., trojan, worm, ransomware).
Why Personal Data Security Matters (AO2)
Prevents identity theft and financial fraud.
Protects privacy rights under legal frameworks such as GDPR and the Data Protection Act 2018.
Maintains trust between individuals, organisations and service providers.
Reduces reputational damage and legal penalties for businesses.
Real‑World Illustration (AO2)
In 2023 the UK NHS suffered a breach where an employee’s lost laptop contained unencrypted patient records. The incident breached confidentiality and triggered a GDPR fine because the data were not protected by appropriate technical controls (encryption, access restrictions). The case highlights the importance of data minimisation, purpose limitation and secure disposal.
Core GDPR Principles (AO1‑AO2)
Lawfulness, fairness and transparency
Purpose limitation – personal data must be collected for specified, explicit and legitimate purposes.
Data minimisation – only the data necessary for the purpose should be collected and retained.
Accuracy
Storage limitation
Integrity and confidentiality (security) – Article 32 requires appropriate technical and organisational measures.
Accountability
Common Threats to Personal Data (AO2)
Malware – viruses, ransomware, spyware that can exfiltrate or encrypt data.
Phishing & Social Engineering – deceptive attempts to obtain credentials via email, SMS (smishing), voice (vishing) or fake websites (pharming).
Unauthorised Physical Access – loss or theft of devices containing personal data.
Insider Threats – employees or contractors misusing privileged access.
Insecure Networks – public Wi‑Fi or unencrypted connections that allow eavesdropping.
Data Classification Levels (AO1‑AO2)
Classification
Description
Typical Controls
Public
Information intended for unrestricted public distribution.
Minimal controls; may be posted on websites.
Internal
Information for use within an organisation; not for public release.
Access limited to staff; basic authentication.
Confidential
Personal or sensitive data that could cause harm if disclosed.
Strong authentication, encryption at rest & in transit, audit logs.
Secret / Highly Sensitive
Data whose exposure would result in severe legal, financial or personal damage.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.