Main content
Computers and the Internet
Course: Computers and the Internet > Unit 4
Lesson 1: Introduction to online data securityWhy care about data security?
The ticking number above is an estimate of the amount of data that's flowed through the Internet since you started reading this article.
The monthly volume of Internet traffic is on the order of billions of gigabytes. To put this number into perspective, every word ever spoken can fit into five billion gigabytes!
What types of data flow through the Internet? One type is numerical such as a city’s temperature. Another type is categorical such as a movie genre. An extremely useful type of data is personally identifiable information (PII). PII refers to any data that can help identify you, such as your address or name.
Organizations use PII to improve users' online experiences.
For example, an e-commerce website like Amazon stores PII (my shopping history) so that it can make better item recommendations. As you can see below, Amazon learned from my prior purchases that I love tea and pens and decided to recommend more kinds of teas and pens.
Let's look at another example: Google Discover, a personalized dashboard for mobile phones. It's an application that helps plan my daily commute and surprisingly, it even knows where I parked my family’s car!
Because parking locations and other forms of PII can be very sensitive, we want companies to keep our PII private and prevent it from falling into the wrong hands.
So then, how do companies keep PII private if it flows through a public, open Internet? How do attackers steal PII and how do companies defend against it?
We'll answer these questions in this unit about online data security.
First, we’ll cover PII in more detail and see the different ways it's collected. Then, we’ll see the different ways attackers steal PII via phishing, rogue access points, or computer malware.
We’ll then show how cryptography can help keep PII private with encryption and also prevent PII from falling into the wrong hands with authentication. We’ll see how encryption sends “locked” PII over the public Internet and unlocks it only if someone presents the correct key. We’ll also see how authentication verifies someone’s identity before sending over PII.
Finally, we’ll see how the Internet incorporates these cryptographic techniques into the TLS and HTTPS protocols.
Let’s begin!
Want to join the conversation?
- why do pepole like stealing your acount?
is it beacuse they want to steal your money?(15 votes)- There are a number of reasons that malicious actors might want to access your account(s). In the case of a bank account, the hacker could potentially steal your money or utilize banking services on your behalf without your permission.
In the case of a social media account, the malicious actor could seek to impersonate you, or obtain information about you/your friends/your family through the social media account that is not usually exposed to the public.
In the case of an account that holds highly sensitive data (e.g., a social security number), the attacker might want to use that information in tandem with other data they have gathered about you to steal your identity.
Regardless of the malicious actor's motives, it is always worth keeping security in mind when interacting with the Internet in any capacity.(25 votes)
- Do attackers work for any secret organisations?(14 votes)
- yes they could there are terrorist groups that work from computers, groups of hackers, that kind of thing usually is targeted toward the government though.(9 votes)
- Why do we need a password?(6 votes)
- to keep our information safe(7 votes)
- How do i get a strong password for my account?(6 votes)
- This article explains how to create and maintain strong passwords:
https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:user-authentication-methods/a/strong-passwords(6 votes)
- what time did this all start(7 votes)
- where can i learn about trading and investing(5 votes)
- its because people are greedy (some are)(6 votes)
- that is not nice(0 votes)
- thats how u get kidnapped like amber the first kid to get kidnapped! :)(5 votes)
- She wasn't the first.(1 vote)
- can a grub hub person be a hacker(5 votes)
- Yes ofc
Never trust people(2 votes)