yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Importance of Data Security | Internet safety | Khan Academy


2m read
·Nov 10, 2024

I'm going to make a bold prediction.

You probably don't like people stealing your identity, which allows them to steal your money or maybe tell the whole universe what you're up to, and being able to track you and your family and compromise your security.

These don't feel like good things.

And so if that is true of you, it's true of me. I don't like any of those things; I want to keep my private information private.

Then you should care about data security.

And that's what we're going to do in this unit. You're going to learn a lot about personally identifiable information. Your name is one example, but also things like your social security number or things that are indirectly personally identifiable, like your address or your phone number.

Why that's important?

And then we're going to learn the ways that people are going to try to get a hold of it and why they want to get a hold of it. Because they might want to misrepresent you or publish things about you on the internet, or control your presence on the internet, or steal money from you or from others that you care about.

And then we're going to learn about ways to protect from those. A lot of that's going to be behavior change on your part to be a little bit more vigilant, but also technology ways of keeping your data secret: encrypting your data, authentication, making sure that the person who says they are who they are are actually them.

So enjoy this unit on data security.

It isn't just interesting, which it is; it could save you a lot of money, a lot of pain, and a lot of embarrassment.

More Articles

View All
The Battle Between Eel and Stonefish Is One-Sided | National Geographic
Today in the ocean, a life-or-death battle between two extremely capable predators. First up is the stonefish, the killer who hides in plain sight, with sharp spines containing enough venom to kill a person. We’ve chosen a shot of it missing its prey. I’…
Howard Marks on Investing in a Low Interest Rate Environment
How are return high returns achieved? High risk-adjusted returns, how do you get high returns with low risk? The answer, in my experience, is investors make money most safely and most easily when they do things that other people are unwilling to do. What…
Domain and range of lines, segments, and rays | Algebra 1 (TX TEKS) | Khan Academy
So what we have here is two different F of XS defined by their graphs, and what we want to do is figure out the domain and the range for each of these functions. So pause this video and try to figure that on your own before we do that together. Now let’s…
The Law of Productivity
The Increasing Demand for Productivity The world is more demanding now than it’s ever been. The cost of living and competition for jobs is increasing, with AI outright replacing some jobs. At the same time, wages don’t go as far as they did in previous g…
I Took an IQ Test to Find Out What it Actually Measures
In popular culture, the term IQ is everywhere. Do IQ exams do that? You probably need 120 points of IQ. Don’t know what my IQ is. And IQ. IQ. IQ. Low IQ individual. People who boast about their IQ are losers. When people say IQ, what they mean is intell…
Where Do Deleted Files Go?
Hey, Vsauce. Michael here. But now I’m not. I’m gone like 90% of the original silent films ever made. Six of the seven wonders of the ancient world deleted, like that text you thought twice about sending or a Snapchat photo, right? When Stalin decided tha…