yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Importance of Data Security | Internet safety | Khan Academy


2m read
·Nov 10, 2024

I'm going to make a bold prediction.

You probably don't like people stealing your identity, which allows them to steal your money or maybe tell the whole universe what you're up to, and being able to track you and your family and compromise your security.

These don't feel like good things.

And so if that is true of you, it's true of me. I don't like any of those things; I want to keep my private information private.

Then you should care about data security.

And that's what we're going to do in this unit. You're going to learn a lot about personally identifiable information. Your name is one example, but also things like your social security number or things that are indirectly personally identifiable, like your address or your phone number.

Why that's important?

And then we're going to learn the ways that people are going to try to get a hold of it and why they want to get a hold of it. Because they might want to misrepresent you or publish things about you on the internet, or control your presence on the internet, or steal money from you or from others that you care about.

And then we're going to learn about ways to protect from those. A lot of that's going to be behavior change on your part to be a little bit more vigilant, but also technology ways of keeping your data secret: encrypting your data, authentication, making sure that the person who says they are who they are are actually them.

So enjoy this unit on data security.

It isn't just interesting, which it is; it could save you a lot of money, a lot of pain, and a lot of embarrassment.

More Articles

View All
Going Through Hell (and Outsmarting the Devil)
What is hell? Is it a physical place that we go to in order to receive punishment? Or is it, perhaps, a human experience that our ancestors have tried to explain by using metaphors of terrifying worlds of torture? Many people these days would argue agains…
Embrace The Darkness (Carl Jung & The Shadow)
Swiss psychiatrist Carl Jung noticed that the traits we repress in ourselves are cast into the unconscious. The more we repress, the more we cultivate an unconscious entity called The Shadow. These unwanted characteristics may be hidden behind the masks w…
Properties of buffers | Acids and bases | AP Chemistry | Khan Academy
A buffer solution consists of a significant amount of a weak acid and its conjugate base. Let’s say we have a generic weak acid HA and its conjugate base A⁻. We’re going to use some particulate diagrams to try to understand how buffers work. So for our f…
Would Neil deGrasse Tyson Accept a Drone Delivery? | StarTalk
[Music] I don’t want a drone coming outside my window; it’s that simple. If you have a drop point for drones to deliver goods and services, fine. If you got a package, leave it in the back. But don’t come up to my window knocking and say, “Are you in? Ca…
Humans Are Exceptional
Three out of these four theories have an interesting pattern to them, with good explanations in epistemology. We’re saying conjectures and their refutations, and error correction is how we improve knowledge. With genetic evolution, genetic mutations, vari…
Make Chris Brown CRY! (Interactive)
[Music] Hey, thank you, thank you, thank you, everybody! Oh, thank you! How’s it going, guys? I apologize that the video quality isn’t better. I’m actually broadcasting from Kansas right now, which is where I grew up. I’ve been celebrating the fourth with…