Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Preview
Start a free Courses trial
to watch this video
Security is always a tradeoff with convenience. We’ll start this stage with a video about managing risks in different contexts, while keeping our security practical.
Key Terms:
- Context -- Different roles and environments that a person may experience which can affect their trust.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
[MUSIC]
0:00
Now that we have an understanding of
the sensitive information in our online
0:04
activity, as well as a developed
framework for possible threats,
0:08
it's time we explore some common attacks
and how to protect ourselves against them.
0:12
You don't have to be a security
expert to defend yourself.
0:16
Simple awareness can go
a long way toward prevention.
0:20
Security is often a tradeoff
with convenience.
0:23
Locking your door for example, is an
inconvenience that most of us tolerate for
0:26
the security it provides.
0:30
Passwords are another example.
0:32
If we could be sure that no one could
access our accounts without them,
0:34
then I'm sure most of us would
be glad to be rid of them.
0:37
But they are an important
tradeoff to make.
0:40
Other trade offs may or
may not be as important to us.
0:44
One way to be absolutely certain that your
email is never hacked is to never create
0:47
an account in the first place.
0:52
And for some,
that is an acceptable trade off.
0:54
But for others, online accounts and
0:57
services like email are an indispensible
part of our daily lives.
0:58
The important thing to consider is
what makes the most sense for you.
1:03
We also take on different
roles in our lives that can
1:07
augment the importance of these
tradeoffs with convenience.
1:10
I am much more willing to
tolerate inconveniences for
1:13
added security when using services
related to work, for example.
1:16
While on the other hand, I may not go
through additional lengths to protect
1:21
an anonymous account for a gaming service
that has no access to financial info.
1:25
Consider the roles in your own life and
the related online activities.
1:29
And also think back to the threat
modeling you did in a previous video.
1:34
In which context would you want
to practice the most security?
1:38
Your work email account which has
contact info of most of your co workers,
1:41
a personal banking account, your library
account, a free music streaming service.
1:47
Another decision to consider
is ultimately about trust.
1:54
At some point, if you want to participate
online in any meaningful way, you'll have
1:57
to place your trust in the devices,
services, and technologies involved.
2:02
It's important to make that decision for
2:07
yourself with as much
information as possible.
2:08
Consider the devices and
services in your life.
2:12
With whom are you implicitly
placing your trust?
2:15
Your personal laptop,
your work email service,
2:19
your Internet service provider,
or ISP, your cell phone company.
2:23
Do I trust the person delivering
components to my cell phone manufacturer?
2:28
Don't get too caught up thinking
about all the little components
2:32
of these devices and services.
2:35
You may never get online again.
2:37
Thinking about your implicit trust
can move it into an explicit trust.
2:40
This can help you make more informed and
2:45
intentional decisions about
your privacy and security.
2:47
Again, the most important part is to
draw the line of trust for yourself.
2:51
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up