girl

Protection de la vie privée

Be Cyber Strong

Secure your secrets

Getting real about privacy and security

Online privacy and security issues don’t always have clear right and wrong solutions. Protecting your personal and private information – all the stuff that makes you you – means asking the right questions and finding your own educated answers.

Activities

How to build a great password
Keep it to yourself
Interland:
Tower of Treasure

Goals

Learn why privacy matters, and how it relates to online security.

Practice how to create strong passwords.

Review the tools and settings that protect against hackers and other threats.

Downloads

Download this chapter
Download all the chapters

Vocabulary 

Privacy

Protecting people’s data and personal information (also called sensitive information).

Security

Protecting people’s devices and the software on them.

Two-step verification (also called two-factor verification and two-step authentication)

A security process where logging in to a service requires two separate steps or two “factors,” such as a password and a one-time code. For example, you may have to enter your password and then enter a code that was texted to your phone or a code from an app.

Password or passcode

A secret combination used to access something. It may take different forms; for example, you may have a four-digit number-only code that you use for your phone lock and a much more complex password for your email account. In general, you should make your passwords as long and complex as you can while still being able to remember them.

Encryption

The process of converting information or data into a code that makes it unreadable and inaccessible.

Complexity

The goal when creating a secure password. For example, a password is complex when it has a mix of numbers, special characters (like “$” or “&”), and both lowercase and uppercase letters.

Hacker

A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data.