yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Importance of Data Security | Internet safety | Khan Academy


2m read
·Nov 10, 2024

I'm going to make a bold prediction.

You probably don't like people stealing your identity, which allows them to steal your money or maybe tell the whole universe what you're up to, and being able to track you and your family and compromise your security.

These don't feel like good things.

And so if that is true of you, it's true of me. I don't like any of those things; I want to keep my private information private.

Then you should care about data security.

And that's what we're going to do in this unit. You're going to learn a lot about personally identifiable information. Your name is one example, but also things like your social security number or things that are indirectly personally identifiable, like your address or your phone number.

Why that's important?

And then we're going to learn the ways that people are going to try to get a hold of it and why they want to get a hold of it. Because they might want to misrepresent you or publish things about you on the internet, or control your presence on the internet, or steal money from you or from others that you care about.

And then we're going to learn about ways to protect from those. A lot of that's going to be behavior change on your part to be a little bit more vigilant, but also technology ways of keeping your data secret: encrypting your data, authentication, making sure that the person who says they are who they are are actually them.

So enjoy this unit on data security.

It isn't just interesting, which it is; it could save you a lot of money, a lot of pain, and a lot of embarrassment.

More Articles

View All
Comparing payment methods | Consumer credit | Financial Literacy | Khan Academy
Let’s say that we have decided to buy a television for $499, and we now need to think about how we are going to pay for this $499 television. We know we have many different options, and I’m presenting five of them to you in this video. We could pay with c…
The Fight to Stop Illegal Bear Trafficking in Southeast Asia | National Geographic
What I’ve seen in LA is spare cages, no bigger than, uh, 2 m by 2 m by 2 m. These animals would likely be placed in those cages as cubs and spend the duration of their lives there. We’ve seen a worrying trend with the increase in captive population of wil…
JERRY BLOOP REVIEWS: MGS Peacewalker, Alpha Protocol, Crackdown 2, Dragon Quest IX
Shiny Vsauce and the first episode of uninformed video game reviews. A lot of people commented on the fact that Jerry Bloob has a pillow underneath his sweatshirt. Why? Well, he actually has a very rare medical condition that leaves his nipples razor-shar…
How I make money mining bitcoins
Eric Elliott: “I’m an internet developer. I am a Bitcoin miner. Coin is a decentralized cryptocurrency, basically a virtual form of money. Bitcoin is controlled by a software algorithm in order to control the amount of Bitcoins that are released into the …
Remarks by Kirsty Nathoo
So that wraps up the day of talks. We do have a reception now downstairs; that’s downstairs where you had your lunch, and also outside in the courtyard. Before everybody disappears, I do have some thank yous. Thank you very much to everybody who has been…
CS50 Lecture by Mark Zuckerberg - 7 December 2005
MICHAEL D. SMITH: This afternoon I have the pleasure of introducing Mark Zuckerberg, which is one of our guest speakers this semester to come and talk a little bit about computer science in the real world. As most of you probably know, as you guys all do …