The ticking number above is an estimate of the amount of data that's flowed through the Internet since you started reading this article.
The monthly volume of Internet traffic is on the order of billions of gigabytes. To put this number into perspective, every word ever spoken can fit into five billion gigabytes!
What types of data flow through the Internet? One type is numerical such as a city’s temperature. Another type is categorical such as a movie genre. An extremely useful type of data is personally identifiable information (PII). PII refers to any data that can help identify you, such as your address or name.
Organizations use PII to improve users' online experiences.
For example, an e-commerce website like Amazon stores PII (my shopping history) so that it can make better item recommendations. As you can see below, Amazon learned from my prior purchases that I love tea and pens and decided to recommend more kinds of teas and pens.
Screenshot of Amazon recommendations section, includes photos of a box of Hibiscus tea box and a box of Uni-ball pens.
Let's look at another example: Google Discover, a personalized dashboard for mobile phones. It's an application that helps plan my daily commute and surprisingly, it even knows where I parked my family’s car!
Screenshot from Google Discover. Includes a map with a marker near a road and the text "You parked here - updated 12min ago - based on your location history"
Because parking locations and other forms of PII can be very sensitive, we want companies to keep our PII private and prevent it from falling into the wrong hands.
So then, how do companies keep PII private if it flows through a public, open Internet? How do attackers steal PII and how do companies defend against it?
We'll answer these questions in this unit about online data security.
First, we’ll cover PII in more detail and see the different ways it's collected. Then, we’ll see the different ways attackers steal PII via phishing, rogue access points, or computer malware.
We’ll then show how cryptography can help keep PII private with encryption and also prevent PII from falling into the wrong hands with authentication. We’ll see how encryption sends “locked” PII over the public Internet and unlocks it only if someone presents the correct key. We’ll also see how authentication verifies someone’s identity before sending over PII.
Finally, we’ll see how the Internet incorporates these cryptographic techniques into the TLS and HTTPS protocols.
Want to join the conversation?
- why do pepole like stealing your acount?
is it beacuse they want to steal your money?(5 votes)
- There are a number of reasons that malicious actors might want to access your account(s). In the case of a bank account, the hacker could potentially steal your money or utilize banking services on your behalf without your permission.
In the case of a social media account, the malicious actor could seek to impersonate you, or obtain information about you/your friends/your family through the social media account that is not usually exposed to the public.
In the case of an account that holds highly sensitive data (e.g., a social security number), the attacker might want to use that information in tandem with other data they have gathered about you to steal your identity.
Regardless of the malicious actor's motives, it is always worth keeping security in mind when interacting with the Internet in any capacity.(8 votes)
- Do attackers work for any secret organisations?(6 votes)
- yes they could there are terrorist groups that work from computers, groups of hackers, that kind of thing usually is targeted toward the government though.(4 votes)
- At7:00PM how is it already dark I thought it gets dark at like10:00.(5 votes)
- where can i learn about trading and investing(2 votes)
- Financial Literacy is on Khan Academy, but for free tutoring sessions on finance you can look into schoolhouse.world?ref=u-3rvjjcld4t(0 votes)
- Why do we need a password?(2 votes)