Page 91 - Cyber Safety C-8
P. 91
For example, a smartwatch can verify identity and unlock a laptop when the user sits down.
Use long, complex and unique passwords. Don’t use your name, birthdate or phone
Enable two-factor authentication on number.
devices. Don’t share passwords with anyone.
Use a trusted password manager. Don’t reuse the same password
Update passwords regularly everywhere.
Don’t fall for fake links and phishing
messages.
21 st
PASSWORD REFLECTION Century #Critical Thinking
Skills
Think and answer the following questions:
What do you want to protect? (e.g., school marks, photos, email)
Who do you want to protect it from? (hackers, strangers, even naughty classmates!)
How likely is it that you need protection? (high if your password is weak)
What will happen if you fail? (identity theft, bullying, data misuse)
How much effort will you put into staying safe? (using MFA, updating passwords)
Do you now understand the importance of strong and secure passwords?
Hackers: Individuals who use technical skills to gain unauthorised access to computers,
networks, or data.
One-Time Password (OTP): A temporary security code that can be used only once to verify
a user’s identity.
Attack Vector: Any technique used by a hacker to gain access to or harm a system.
Advanced Password Protection 89

