A global network that connects millions of computers and allows them to communicate.
the Internet
Your name, address, and birthdate are examples of this.
personal data
This process turns plain data into unreadable code.
encryption
A fake email that tricks you into giving personal info is an example of this.
phishing
How to make a strong password?
uses uppercase, numbers, and symbols
Which part of the internet is this: undersea cables, routers, and servers.
physical parts of the Internet
These small text files track your behavior on websites.
cookies
This secure version of HTTP adds a padlock icon in the browser.
HTTPS
After clicking a suspicious link, your device may get infected with this.
virus or malware
These updates fix bugs and patch security holes.
software updates
This protocol breaks data into packets so they can travel across networks.
TCP/IP?
When a website stores your browsing history and preferences, it may be a risk to this.
privacy
After receiving a security alert, you should update this and check your activity
your password (or account)
The Australian government records these to help track online scams.
scam statistics
You can reduce your online risks by managing this digital trail.
digital footprint
When you send an email from Australia to the US, your data travels through these systems
global routers and undersea cables
Comparing these documents for two different apps can show which one better protects your data.
privacy policies
This method of security requires your password plus a second code from another device
two-factor authentication
This type of malware locks your files and demands money to unlock them.
ransomware
A tool that creates and stores strong, unique passwords for each website.
password manager
This type of design connects a modem, router, and devices with specific protocols
network setup
These government guidelines help organizations handle data ethically in Australia.
Australian Privacy Principles (APPs)
These three tools work together to protect your network from threats.
firewalls, authentication, and encryption
A cybercriminal tricks someone into giving personal info by pretending to be a trusted source.
social engineering
Adjusting this on your social media limits who can see your posts and personal info
privacy settings