yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Importance of Data Security | Internet safety | Khan Academy


2m read
·Nov 10, 2024

I'm going to make a bold prediction.

You probably don't like people stealing your identity, which allows them to steal your money or maybe tell the whole universe what you're up to, and being able to track you and your family and compromise your security.

These don't feel like good things.

And so if that is true of you, it's true of me. I don't like any of those things; I want to keep my private information private.

Then you should care about data security.

And that's what we're going to do in this unit. You're going to learn a lot about personally identifiable information. Your name is one example, but also things like your social security number or things that are indirectly personally identifiable, like your address or your phone number.

Why that's important?

And then we're going to learn the ways that people are going to try to get a hold of it and why they want to get a hold of it. Because they might want to misrepresent you or publish things about you on the internet, or control your presence on the internet, or steal money from you or from others that you care about.

And then we're going to learn about ways to protect from those. A lot of that's going to be behavior change on your part to be a little bit more vigilant, but also technology ways of keeping your data secret: encrypting your data, authentication, making sure that the person who says they are who they are are actually them.

So enjoy this unit on data security.

It isn't just interesting, which it is; it could save you a lot of money, a lot of pain, and a lot of embarrassment.

More Articles

View All
Intermediate value theorem example | Existence theorems | AP Calculus AB | Khan Academy
Let F be a continuous function on the closed interval from -2 to 1, where F of -2 is equal to 3 and F of 1 is equal to 6. Which of the following is guaranteed by the intermediate value theorem? So before I even look at this, what do we know about the int…
Factoring polynomials using complex numbers | Khan Academy
We’re told that Ahmat tried to write ( x^4 + 5x^2 + 4 ) as a product of linear factors. This is his work, and then they tell us all the steps that he did, and then they say in what step did Ahmad make his first mistake. So pause this video and see if you …
Frogfish or Seaweed...Who's to Say! | National Geographic
As a passing fish, you’d be forgiven for confusing this frog fish with a mound of seaweed. But it would be the last mistake you probably ever make. As it turns out, the frog fish is a terrifying ambush predator. The spines on this fish act as a sort of ha…
Protecting the Okavango Ecosystem | National Geographic
[Music] From the air to the ground [Music]. Innovations in science and technology are helping scientists from the National Geographic Okavango Wilderness Project explore an ecosystem of rivers in Angola. Let’s supply water to the Okavango Delta in Botswan…
Into the Ocean | Branching Out | Part 3
[Music] As we eco-road trip across this amazing land, we can’t forget the rivers we’ve crossed and the waves crashing beside coastal roads. More than 70 percent of our planet is covered in water, and more than 96 of that is in our oceans. Unfortunately, 1…
Horrific Freefall into the Deepest Ocean | The Sad Story of Flight 447
What’s happening? I don’t know what’s happening. We’re losing control of the aircraft here! We lost all control of the aircraft! What you’re witnessing is the beginning of one of aviation’s greatest mysteries: a top-notch aircraft, an experienced crew, a…