<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>IB Computer Science</provider_name><provider_url>https://learnlearn.uk/ibcs</provider_url><author_name>learnlearnadmin</author_name><author_url>https://learnlearn.uk/ibcs/author/learnlearnadmin/</author_url><title>Security, Privacy &amp; Integrity of Data - IB Computer Science</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="ZzcSDsoGw8"&gt;&lt;a href="https://learnlearn.uk/ibcs/security-privacy-integrity-data/"&gt;Security, Privacy &amp; Integrity of Data&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://learnlearn.uk/ibcs/security-privacy-integrity-data/embed/#?secret=ZzcSDsoGw8" width="600" height="338" title="&#x201C;Security, Privacy &amp; Integrity of Data&#x201D; &#x2014; IB Computer Science" data-secret="ZzcSDsoGw8" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l&lt;n.length;l++)n[l].style.display="none";for(l=0;l&lt;i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><description>Data Security Data security is concerned with stopping unauthorised access to computer systems and the data they hold. Common threats include hacking, social engineering and accidental distribution of sensitive data. There are many examples of businesses of and organisations that have been badly affected by breaches of data security. In government and medical systems, this&hellip;&nbsp;Read More &raquo;</description><thumbnail_url>https://learnlearn.uk/alevelcs/wp-content/uploads/sites/20/2020/03/data-security-privacy-alevel-cie-ocr-aqa-300x203.png?_t=1619246757</thumbnail_url></oembed>
