Lesson Objective
Participants will be able to use security check-up features to manage their online accounts.
Participants will be able to use security check-up features to manage their online accounts.
Ready?
Begin Lesson
A password manager is an encrypted digital vault that stores login information for all of your digital accounts including applications, social media profiles and other websites. As an extra layer of security, some password managers also utilize a password generator to help you create new passwords.
A password generator is a program or service that automatically creates randomized, strong passwords to ensure that you are using unique passwords for each account. Many password managers feature a built-in password generator.
When using password-management software, you will still need to memorize a single master password to access your information. Make sure that your master password is extremely strong, but also make sure you have it memorized.
Remember, if someone guesses or gains access to the password for your password manager account, they will then have access to all of the other passwords and personal information stored within that account.
There are some steps that you can take to be proactive in managing your online accounts. Included in this lesson are tips for helping to stay safe and secure online, including password management, being cautious engaging with strangers, managing your personal information and security checkups for your online accounts.
With each online account, know how to change your passwords and be sure to change them after any incident where they may have been compromised, either on that account or another on which you have used the same login details. Some web browsers have password-checkup tools to help you know when your email addresses and passwords have been compromised in a data breach.
There are many reasons you might need or want to interact with strangers online. For example, you may want to schedule a business meeting with potential clients, sell a personal item, learn something new from an expert or ask local community members for recommendations. When communicating with someone new online, it is important to look for signs that their account is legitimate. Sometimes, it can be difficult to tell if someone is really who they say they are, especially if you do not know them personally.
Trust your instincts;
Oversharing is the disclosure of an inappropriate amount of detail about one's personal life. While you may want to craft a positive online identity and reputation, oversharing can be a potential security risk, both online and offline.
Within each application or website that you use, find out what information is shared with others (such as location services or third-party applications) and who can see your profile and posts.
There are tools available on most platforms for reporting things like posts, profiles, photos and videos.
Some platforms include a security checkup to help guide you through adding some of the security measures we introduced in this lesson, including login alerts, password protection, and two-factor authentication.
Congrats!
You've finished the lesson
Students will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View PageStudents will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View PageStudents will learn how to keep their online information more secure by using and maintaining strong passwords. Students will learn about the principles of strong password design and the potential problems of password sharing.
View PageStudents will learn about malicious online users who might attempt to use security weaknesses to gather information about them.
View PageStudents will learn what information verification is and why it is important for news consumers to verify the stories they read or view.
View PageStudents will learn about a five-step checklist they can use to verify the origin, source, date, location, and motivation of a news image or video.
View PageStudents will define what a scrape (a copy from an original) is and explain why this can make the verification process more difficult.
View Page