home..

P2 | 5.6 - Safe Computing

PII tracking

Personally Identifiable Information (PII): Info specific to an individual. This includes:

PII can be used by others to steal people’s identity.

Be careful with where you share your PII!

What you can do to help protect your PII:

Good things about PII:

Let’s see how your easily your PII spreads and how easily it’s utilized by others without you even knowing:

  1. You’re planning a secret trip to Fiji so you buy tickets online
  2. Google knows you’re going on a trip to Fiji and knows you through your email address and also knows your IP Address
  3. The travel site knows you want to go to Fiji, when you’re going, and who’s going with you
  4. Advertising firms also track you through cookies when you go onto the travel site and follow your movements across the web
    • If you start searching for good places to snorkel in Fiji, you will start getting hit with snorkeling ads
  5. Federal Government knows if you’re traveling to ensure you’re not on a terror watch list
  6. Google Maps tracks you so Google knows where you are
  7. When you enter a shopping mall they track your wifi to see which shopping stores you enter
  8. Stores with cameras also will get pictures of you and store your face and can even track how long you spend in each aisle

Image

Popcorn Hack #1

What measures can individuals take to better protect their PII in an increasingly interconnected digital world?

People can use VPNS to hide their IP addresses and using strong passwords/2FA.

How to Protect Systems and Keep Data Safe

Authorization

Passwords

Multi-Factor Authentication (MFA)

img

Viruses and Malware

How to Protect from Viruses

Encryption and Decryption

Encryption

Decryption

Types of Encryption

For example: I have a public key and a private key. I send my public key to David, and he sends his to me. He uses my public key to encrypt a message, then sends it back to me. I then can use my private key to decrypt this message.

Then, I can uses his public key to encrypt a message to send to him, and he can use his private key to decrypt it.

This way, no matter what, our private keys are not accessible anywhere, and people can only encrypt messages if our public keys are leaked, and not decrypt them.

Popcorn Hack #2

Risks to personal safety

Phising Schemes

An attempt to trick a user ihnto providing personal information,like your usernames and passwords, account numbers, or social numbers.

Phishing emails often look like they’re from a company you know and trust:

They trick you in clicking a link or opening an attachment

Clicking a link or opening an attachment in a phising email will cause unexpected harm leading to:

Keylogger: Records every keystroke made by a user in order to gain fraudulent access to passwords or other confidential information

Rouge access point: A wirelesss network that can give unauthorized access to secure networks.

image

Popcorn Hack #3

How can people access your information?

To Summarize

The internet is a very powerful tool that assists millions in their day to day lives. However, the Internet also houses a lot of dangers. It is important to acknowledge and understand these dangers. Once you are on the internet, so is your private information. It is key that you keep yourself protected and knowledgeable of all potential risks. It is essential for everyone to be educated and aware of the ways poeple gather your data. The internet is a very powerful tool that assists millions in their day to day lives.

Homework!

Fill out this google form: https://forms.gle/jxVPgKMxEiDhUyMf8

Summary:

© 2024    •  Powered by Soopr   •  Theme  Moonwalk