Identify best practices for personal cyber hygiene.
Identification should include
- using techniques to protect personal data (e.g., encryption, passwords, preferences on devices, location)
- distinguishing between acceptable and unacceptable data to share (e.g., social media, apps)
- comparing the risks and benefits of sharing data
- understanding privacy policies before installing and/or using applications.
Process/Skill Questions:
- What are the benefits of using multifactor authentication vs. single-factor authentication?
- What are the risks and benefits of sharing data?
- Why is it imperative to read through the entire privacy policy before agreeing to or accepting the terms of use?
- What steps should be taken if one is confused by a privacy policy?