Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Well done!
      You have completed Security Literacy!
      
    
You have completed Security Literacy!
Preview
    
      
  Security is always a tradeoff with convenience. We’ll start this stage with a video about managing risks in different contexts, while keeping our security practical.
Key Terms:
- Context -- Different roles and environments that a person may experience which can affect their trust.
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
                      [MUSIC]
                      0:00
                    
                    
                      Now that we have an understanding of
the sensitive information in our online
                      0:04
                    
                    
                      activity, as well as a developed
framework for possible threats,
                      0:08
                    
                    
                      it's time we explore some common attacks
and how to protect ourselves against them.
                      0:12
                    
                    
                      You don't have to be a security
expert to defend yourself.
                      0:16
                    
                    
                      Simple awareness can go
a long way toward prevention.
                      0:20
                    
                    
                      Security is often a tradeoff
with convenience.
                      0:23
                    
                    
                      Locking your door for example, is an
inconvenience that most of us tolerate for
                      0:26
                    
                    
                      the security it provides.
                      0:30
                    
                    
                      Passwords are another example.
                      0:32
                    
                    
                      If we could be sure that no one could
access our accounts without them,
                      0:34
                    
                    
                      then I'm sure most of us would
be glad to be rid of them.
                      0:37
                    
                    
                      But they are an important
tradeoff to make.
                      0:40
                    
                    
                      Other trade offs may or
may not be as important to us.
                      0:44
                    
                    
                      One way to be absolutely certain that your
email is never hacked is to never create
                      0:47
                    
                    
                      an account in the first place.
                      0:52
                    
                    
                      And for some,
that is an acceptable trade off.
                      0:54
                    
                    
                      But for others, online accounts and
                      0:57
                    
                    
                      services like email are an indispensible
part of our daily lives.
                      0:58
                    
                    
                      The important thing to consider is
what makes the most sense for you.
                      1:03
                    
                    
                      We also take on different
roles in our lives that can
                      1:07
                    
                    
                      augment the importance of these
tradeoffs with convenience.
                      1:10
                    
                    
                      I am much more willing to
tolerate inconveniences for
                      1:13
                    
                    
                      added security when using services
related to work, for example.
                      1:16
                    
                    
                      While on the other hand, I may not go
through additional lengths to protect
                      1:21
                    
                    
                      an anonymous account for a gaming service
that has no access to financial info.
                      1:25
                    
                    
                      Consider the roles in your own life and
the related online activities.
                      1:29
                    
                    
                      And also think back to the threat
modeling you did in a previous video.
                      1:34
                    
                    
                      In which context would you want
to practice the most security?
                      1:38
                    
                    
                      Your work email account which has
contact info of most of your co workers,
                      1:41
                    
                    
                      a personal banking account, your library
account, a free music streaming service.
                      1:47
                    
                    
                      Another decision to consider
is ultimately about trust.
                      1:54
                    
                    
                      At some point, if you want to participate
online in any meaningful way, you'll have
                      1:57
                    
                    
                      to place your trust in the devices,
services, and technologies involved.
                      2:02
                    
                    
                      It's important to make that decision for
                      2:07
                    
                    
                      yourself with as much
information as possible.
                      2:08
                    
                    
                      Consider the devices and
services in your life.
                      2:12
                    
                    
                      With whom are you implicitly
placing your trust?
                      2:15
                    
                    
                      Your personal laptop,
your work email service,
                      2:19
                    
                    
                      your Internet service provider,
or ISP, your cell phone company.
                      2:23
                    
                    
                      Do I trust the person delivering
components to my cell phone manufacturer?
                      2:28
                    
                    
                      Don't get too caught up thinking
about all the little components
                      2:32
                    
                    
                      of these devices and services.
                      2:35
                    
                    
                      You may never get online again.
                      2:37
                    
                    
                      Thinking about your implicit trust
can move it into an explicit trust.
                      2:40
                    
                    
                      This can help you make more informed and
                      2:45
                    
                    
                      intentional decisions about
your privacy and security.
                      2:47
                    
                    
                      Again, the most important part is to
draw the line of trust for yourself.
                      2:51
                    
              
        You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up