Page 91 - Cyber Safety C-8
P. 91

For example, a smartwatch can verify identity and unlock a laptop when the user sits down.










                        Use long, complex and unique passwords.               Don’t use your name, birthdate or phone
                        Enable two-factor authentication on                 number.
                      devices.                                                Don’t share passwords with anyone.
                        Use a trusted password manager.                       Don’t reuse the same password
                        Update passwords regularly                          everywhere.
                                                                              Don’t fall for fake links and phishing
                                                                            messages.







                                                                                             21 st
                                           PASSWORD REFLECTION                              Century   #Critical Thinking
                                                                                             Skills

                 Think and answer the following questions:
                    What do you want to protect? (e.g., school marks, photos, email)

                    Who do you want to protect it from? (hackers, strangers, even naughty classmates!)
                    How likely is it that you need protection? (high if your password is weak)
                    What will happen if you fail? (identity theft, bullying, data misuse)

                    How much effort will you put into staying safe? (using MFA, updating passwords)
                 Do you now understand the importance of strong and secure passwords?













                        Hackers: Individuals who use technical skills to gain unauthorised access to computers,
                        networks, or data.

                        One-Time Password (OTP): A temporary security code that can be used only once to verify
                        a user’s identity.


                        Attack Vector: Any technique used by a hacker to gain access to or harm a system.









                                                                                      Advanced Password Protection  89
   86   87   88   89   90   91   92   93   94   95   96