Identify best practices for personal cyber hygiene.

Identification should include

  • using techniques to protect personal data (e.g., encryption, passwords, preferences on devices, location)
  • distinguishing between acceptable and unacceptable data to share (e.g., social media, apps)
  • comparing the risks and benefits of sharing data
  • understanding privacy policies before installing and/or using applications. 

Process/Skill Questions: 

  • What are the benefits of using multifactor authentication vs. single-factor authentication?
  • What are the risks and benefits of sharing data?
  • Why is it imperative to read through the entire privacy policy before agreeing to or accepting the terms of use?
  • What steps should be taken if one is confused by a privacy policy?