Bummer! This is just a preview. You need to be signed in with a Basic account to view the entire video.
Start a free Basic trial
to watch this video
In this video, we’ll introduce some core concepts related to personal data online. We’ll also touch on why privacy matters. You will even find out for yourself if your accounts have been involved in a major security breach.
New Terms:
- Breach / Leak -- A forced or unintentional release of private data from an online service.
- Anonymity -- The ability to exist, and especially communicate, in a manner that does not reveal any personally identifiable information about the source.
- Privacy -- Unhindered agency to express oneself selectively, with direct control over one’s own information and explicit boundaries.
- Authenticity -- Provide, with a high level of confidence, an assurance of the identity of an individual or message through reliable and verifiable means.
Further Reading:
Yahoo Hack: 1bn accounts compromised by biggest data breach in history
-
0:00
[MUSIC]
-
0:04
Welcome to the Security Literacy course.
-
0:06
Thanks so much for joining us.
-
0:08
The Internet is an incredible resource for knowledge and communication.
-
0:12
Many of us use it multiple times a day, whether it's for work, or
-
0:16
school, or interacting with family and friends.
-
0:19
We often use it without a second thought about how our messages are actually sent
-
0:22
and received.
-
0:24
The reality is that the technologies we use are complex, and
-
0:27
involve many more people and devices than just you and
-
0:30
the person you're emailing, or the website you're visiting.
-
0:33
And with this additional complexity,
-
0:35
comes additional risk, often to your privacy and security.
-
0:39
This course will equip you with the tools and
-
0:42
knowledge necessary to keep yourself secure online.
-
0:44
You'll get a crash course in some of the most common ways that your privacy and
-
0:48
security can be threatened.
-
0:49
You'll develop a personalized framework for
-
0:51
thinking about your online activity through the lens of security.
-
0:55
And you'll establish some best practice behaviors, so that your personal data and
-
0:58
privacy remain intact.
-
1:01
One of the most common threats to a person's Internet security
-
1:04
is when an online service has a breach or a leak of their data.
-
1:08
This is where the private information that they hold
-
1:11
has been made public without authorization.
-
1:13
Chances are, you have already received a notification from a popular service
-
1:17
informing you that they had a breach and instructing you to change your password.
-
1:21
A great website for such breaches is haveibeenpwned.com.
-
1:24
It will search any email address against known service breaches.
-
1:29
Let me enter my own email as a demo.
-
1:36
And it looks like my address was part of a breach.
-
1:39
As it says below, last.fm, a popular music streaming service, was hacked, and
-
1:43
millions of user accounts were exposed.
-
1:45
I would immediately change my last.fm password if I hadn't already done so.
-
1:50
I encourage you to go to this site, right now, and enter your email, too.
-
1:53
I'll wait.
-
1:55
If the site reports that you have an account with a breached service,
-
1:58
and you haven't yet changed your password, do it now.
-
2:02
It's very important.
-
2:03
Also change the password for any sites that use the same password you use for
-
2:06
the breached site, and
-
2:08
don't be discouraged if you had an account show up as pwned.
-
2:11
It happens to the best of us, often through no fault of our own.
-
2:15
This is really one of the main risks about breaches.
-
2:17
For example, an attacker may take the passwords from a seemingly harmless music
-
2:21
streaming service and try to log into banks, or to forge other identities.
-
2:26
This is also why sites often encourage use of strong, unique passwords.
-
2:30
Good passwords are one of the easiest and
-
2:32
most effective ways to defend against this kind of attack, and
-
2:35
a great way to take your first step toward a more secure online presence.
-
2:40
As we explore online security,
-
2:42
it's helpful to keep a few important concepts in mind.
-
2:45
Anonymity, privacy, and authenticity.
-
2:47
You may already be familiar with these terms, but
-
2:50
it's worth revisiting in the context of online activity.
-
2:54
Anonymity, [SOUND] the ability to exist and, especially, communicate in a manner
-
2:59
that does not reveal any personally identifiable information about the source.
-
3:03
We often think about being anonymous as a form of privacy.
-
3:07
While there are similarities, you can often have one without the other.
-
3:10
And, in reality, achieving true anonymity online is quite a difficult task,
-
3:15
and well outside the scope of this course.
-
3:17
Privacy, [SOUND] unhindered agency to express oneself selectively,
-
3:21
with direct control over one's own information and explicit boundaries.
-
3:26
This is one of the most desired properties of our online activity, and
-
3:29
certainly one of the most threatened.
-
3:32
Authenticity, [SOUND] provide, with a high level of confidence, an assurance of
-
3:36
the identity of an individual or message through reliable and verifiable means.
-
3:40
The significance of this concept may not seem as obvious as the others when
-
3:44
relating to online security, but it is vital.
-
3:47
When considering privacy online, there's often a myth
-
3:49
that you don't have anything to worry about if you have nothing to hide.
-
3:54
Edward Snowden, a well-known figure in privacy and security,
-
3:57
has this to say in response.
-
3:59
Arguing that [SOUND] you don't care about the right to privacy because you have
-
4:03
nothing to hide is no different than saying you don't care about free speech
-
4:06
because you have nothing to say.
-
4:08
Now that you've been introduced to some core concepts relating to online security,
-
4:12
and even had a taste of how it could affect you directly by checking your email
-
4:16
against known breaches, I hope that you have an increased interest in security.
-
4:21
In the next video, we'll build on this foundation by diving a bit deeper
-
4:25
into the parts of Internet traffic exposed during common online activities.
You need to sign up for Treehouse in order to download course files.
Sign up