Skip to main content

Posts

Showing posts from May, 2022

Blog 5: Data Life Cycle

What is the data life cycle?  The data life cycle, also known as the information life cycle, relates to the duration of data storage in your system. This life cycle describes all of the processes that your data goes through, starting with its first acquisition. Every living organism goes through a succession of stages in life science: infancy, growth and development, productive maturity, and old age. These stages differ depending on where you are on the evolutionary tree. Salmon die soon after spawning, whereas whales can live to be grandmothers. A mouse, fox, and butterfly all have completely different life cycles, even though they reside in the same field. Similarly, various data items will experience different stages of life at varying rates. As an example of a data lifecycle framework, consider the following: 1. Data creation, ingestion, or capture  You gather information in some way, whether you produce it via data entry, acquire it from other sources, or get signals from equipmen

Blog 4: Public Wi-fi Risks

  Are you looking for a free Wi-Fi hotspot? Then be prepared to pay with your personal information. Using free public Wi-Fi has become a daily practice for some individuals in our connected society. Secure and trustworthy connections, however, are not necessarily what they appear to be. Hackers and cybercriminals might take advantage of public Wi-Fi hotspots to breach your privacy and steal your data. Many of us have been in circumstances when public Wi-Fi is our only choice for getting online right away. If you're a frequent user of the nearby Wi-Fi hotspot, read about the dangers of unprotected Wi-Fi to prevent being a victim of a cyberattack. Why using public Wi-Fi connections may be dangerous? Data breaches and virus infections are two of the most serious concerns of using public Wi-Fi. In the first case, hackers using public Wi-Fi can intercept data you send via an unsecured connection. In the second case, fraudsters may imitate a legal website in order to deceive you into dow