0% found this document useful (0 votes)
81 views16 pages

Itec100 Lesson 2

This document discusses the importance of protecting personal information both offline and online. It identifies common threats like data breaches, phishing scams, and malware. It provides strategies for securing information offline such as shredding documents and limiting sharing, and online through strong passwords, two-factor authentication, and being wary of phishing attempts. The document stresses developing a personal information security plan with steps like inventorying information and assessing risks.

Uploaded by

Winnie Caruyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views16 pages

Itec100 Lesson 2

This document discusses the importance of protecting personal information both offline and online. It identifies common threats like data breaches, phishing scams, and malware. It provides strategies for securing information offline such as shredding documents and limiting sharing, and online through strong passwords, two-factor authentication, and being wary of phishing attempts. The document stresses developing a personal information security plan with steps like inventorying information and assessing risks.

Uploaded by

Winnie Caruyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Keeping Personal

Information Secure
Offline and Online
ITEC100 - INFORMATION
ASSURANCE AND SECURITY 2
Learning Objectives
• Understand the importance of protecting personal
information.
• Identify common threats to personal information
security.
• Learn strategies for protecting personal
information offline and online.
• Develop a personal information security plan.
Why do we need to secure
our information
online/offline?
ITEC100 - INFORMATION
ASSURANCE AND SECURITY 2
The Importance of
Protecting Personal
Information
ITEC100 - INFORMATION
ASSURANCE AND SECURITY 2
The Importance of Protecting Personal Information
• Privacy: Your personal information is a part of your identity, and safeguarding it
protects your right to privacy.

• Identity Theft Prevention: Identity theft occurs when someone steals your personal
information to commit fraud or other crimes in your name. Protecting your
information reduces the risk of identity theft.

• Digital Footprint Management: Your digital footprint is the trail of information you
leave online. Protecting your personal information helps you control what
information is available about you online.
Threats to Personal
Information Security
ITEC100 - INFORMATION
ASSURANCE AND SECURITY 2
Threats to Personal Information Security
• Data Breaches: Data breaches occur when hackers or unauthorized individuals gain
access to sensitive data stored by companies or organizations.
• Phishing Scams: Phishing scams involve emails, text messages, or websites that
impersonate legitimate entities to trick you into revealing personal information.
• Malware: Malware refers to malicious software designed to steal personal
information or gain unauthorized access to your devices.
• Social Engineering: Social engineering involves manipulating people into divulging
personal information or granting access to their devices.
Threats to Personal Information Security
Protecting Personal
Information Offline
ITEC100 - INFORMATION
ASSURANCE AND SECURITY 2
Protecting Personal Information Offline
• Secure Your Documents: Keep sensitive documents, such as bank statements,
credit card bills, and medical records, in a secure location, such as a locked
cabinet or safe.
• Shred Sensitive Documents: When discarding sensitive documents, shred them
to prevent unauthorized access to your information.
• Limit Information Sharing: Avoid sharing personal information with strangers or
untrustworthy sources.
• Beware of Public Wi-Fi: Avoid accessing sensitive accounts or entering personal
information on public Wi-Fi networks, as they may be less secure.
Protecting Personal
Information Online
ITEC100 - INFORMATION
ASSURANCE AND SECURITY 2
Protecting Personal Information Online
• Create Strong Passwords: Use strong passwords that are unique for each
account, consisting of a combination of upper and lowercase letters, numbers,
and symbols.
• Enable Two-Factor Authentication: Two-factor authentication adds an extra layer
of security by requiring a secondary verification method, such as a code sent to
your phone, in addition to your password.
• Beware of Phishing Attempts: Be cautious of unsolicited emails or text messages
asking for personal information. Verify the sender's legitimacy before
responding.
Protecting Personal Information Online
• Avoid Oversharing on Social Media: Limit the personal information you share
on social media, and adjust privacy settings to control who can access your
information.
• Use Secure Websites: When entering sensitive information, ensure the website's
address starts with "https" and has a padlock icon, indicating a secure
connection.
• Install Security Software: Install and regularly update antivirus and anti-malware
software to protect your devices from malicious attacks.
Developing a Personal
Information Security
Plan
ITEC100 - INFORMATION
ASSURANCE AND SECURITY 2
Developing a Personal Information Security Plan
• Inventory of Personal Information: Identify the types of personal information
you store and where it is stored.
• Risk Assessment: Evaluate the potential risks to your personal information
and prioritize the most critical areas for protection.
• Security Measures: Implement appropriate security measures, such as strong
passwords, two-factor authentication, and security software, to protect your
information.
Developing a Personal Information Security Plan
• Regular Reviews: Regularly review your security plan and update it as
needed to address new threats or changes in your personal information.
• Educate Others: Share your knowledge about personal information security
with family and friends to help them protect their information as well.

You might also like