UNIT 3 TASK 3 Information System Safety and Cryptography
We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?
In this digital era, we access any social media like Facebook, Instagram, LinkedIn, Gmail, or TikTok to share our daily activities. When we create an account on social media, we need to give our personal information such as email, phone number, address, ID number, and so on. It means that we leave our personal information on the internet, and hackers can use it to steal our personal information for bad purposes that we may never imagine.
Besides that, when we explore the internet to search for any information, any online product, or any application to use freely on the internet, sometimes we find websites that have cookies that are able to track our browsing histories. So we need to be aware and educate our students to have a sense of awareness before allowing cookies to track our browsing history.
When we browse any websites on the internet, we also will leave history like in our google activity that can be hacked by other people when they used our computer or account. So we need to be careful to keep our computers and accounts saved from being hacked.
The last is when we take a picture using our phone. We can activate the geotagging feature on our phones. This feature makes our photos contain information about the geolocation of where the photos have been taken.
You must be logged in to post a comment.
+ There are no commentsAdd yours