Contextualize Your Risk2:55 with Greg Stromire
Security is always a tradeoff with convenience. We’ll start this stage with a video about managing risks in different contexts, while keeping our security practical.
- Context -- Different roles and environments that a person may experience which can affect their trust.
[MUSIC] 0:00 Now that we have an understanding of the sensitive information in our online 0:04 activity, as well as a developed framework for possible threats, 0:08 it's time we explore some common attacks and how to protect ourselves against them. 0:12 You don't have to be a security expert to defend yourself. 0:16 Simple awareness can go a long way toward prevention. 0:20 Security is often a tradeoff with convenience. 0:23 Locking your door for example, is an inconvenience that most of us tolerate for 0:26 the security it provides. 0:30 Passwords are another example. 0:32 If we could be sure that no one could access our accounts without them, 0:34 then I'm sure most of us would be glad to be rid of them. 0:37 But they are an important tradeoff to make. 0:40 Other trade offs may or may not be as important to us. 0:44 One way to be absolutely certain that your email is never hacked is to never create 0:47 an account in the first place. 0:52 And for some, that is an acceptable trade off. 0:54 But for others, online accounts and 0:57 services like email are an indispensible part of our daily lives. 0:58 The important thing to consider is what makes the most sense for you. 1:03 We also take on different roles in our lives that can 1:07 augment the importance of these tradeoffs with convenience. 1:10 I am much more willing to tolerate inconveniences for 1:13 added security when using services related to work, for example. 1:16 While on the other hand, I may not go through additional lengths to protect 1:21 an anonymous account for a gaming service that has no access to financial info. 1:25 Consider the roles in your own life and the related online activities. 1:29 And also think back to the threat modeling you did in a previous video. 1:34 In which context would you want to practice the most security? 1:38 Your work email account which has contact info of most of your co workers, 1:41 a personal banking account, your library account, a free music streaming service. 1:47 Another decision to consider is ultimately about trust. 1:54 At some point, if you want to participate online in any meaningful way, you'll have 1:57 to place your trust in the devices, services, and technologies involved. 2:02 It's important to make that decision for 2:07 yourself with as much information as possible. 2:08 Consider the devices and services in your life. 2:12 With whom are you implicitly placing your trust? 2:15 Your personal laptop, your work email service, 2:19 your Internet service provider, or ISP, your cell phone company. 2:23 Do I trust the person delivering components to my cell phone manufacturer? 2:28 Don't get too caught up thinking about all the little components 2:32 of these devices and services. 2:35 You may never get online again. 2:37 Thinking about your implicit trust can move it into an explicit trust. 2:40 This can help you make more informed and 2:45 intentional decisions about your privacy and security. 2:47 Again, the most important part is to draw the line of trust for yourself. 2:51
You need to sign up for Treehouse in order to download course files.Sign up