yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Importance of Data Security | Internet safety | Khan Academy


2m read
·Nov 10, 2024

I'm going to make a bold prediction.

You probably don't like people stealing your identity, which allows them to steal your money or maybe tell the whole universe what you're up to, and being able to track you and your family and compromise your security.

These don't feel like good things.

And so if that is true of you, it's true of me. I don't like any of those things; I want to keep my private information private.

Then you should care about data security.

And that's what we're going to do in this unit. You're going to learn a lot about personally identifiable information. Your name is one example, but also things like your social security number or things that are indirectly personally identifiable, like your address or your phone number.

Why that's important?

And then we're going to learn the ways that people are going to try to get a hold of it and why they want to get a hold of it. Because they might want to misrepresent you or publish things about you on the internet, or control your presence on the internet, or steal money from you or from others that you care about.

And then we're going to learn about ways to protect from those. A lot of that's going to be behavior change on your part to be a little bit more vigilant, but also technology ways of keeping your data secret: encrypting your data, authentication, making sure that the person who says they are who they are are actually them.

So enjoy this unit on data security.

It isn't just interesting, which it is; it could save you a lot of money, a lot of pain, and a lot of embarrassment.

More Articles

View All
15 Smartest Ways to Spend Your Money
Now, Alexir, the dumbest thing we can do with money is to spend it impulsively, right? And to spend it beyond our means. But there are four smart factors to spending money, and if your expenses fit into these factors, well, you’re spending smartly. First…
Big Brother is Watching
The voice came from an oblong metal plaque, like a dulled mirror, which formed part of the surface of the right-hand wall. The instrument, the Tila Screen, it was called, could be dimmed, but there was no way of shutting it off completely. The telescreen …
AMC TO $100,000 | What You MUST Know
What’s at Melbourne Capital? It’s Wall Street bets here. And before we start the video, we gotta grab some popcorn because before we go to the Moon, we gotta make a quick pit stop at the movie theater and talk about the insanity that is AMC. That’s right…
Asexual and sexual reproduction | High school biology | Khan Academy
Let’s talk a little bit about reproduction now on Earth, and who knows, if we go to other planets, we might find new ways that organisms can reproduce. But on Earth, there are two primary ways that organisms reproduce. The first is, let’s say this is som…
Examples of null and alternative hypotheses | AP Statistics | Khan Academy
We are told a restaurant owner installed a new automated drink machine. The machine is designed to dispense 530 milliliters of liquid on the medium size setting. The owner suspects that the machine may be dispensing too much in medium drinks. They decide …
Scaling functions horizontally: examples | Transformations of functions | Algebra 2 | Khan Academy
We are told this is the graph of function f. Fair enough. Function g is defined as g of x is equal to f of 2x. What is the graph of g? So, pause this video and try to figure that out on your own. All right, now let’s work through this. The way I will thi…