QTS_Unit3_Question 1

  1. We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?

Unit 3 has provided me with useful knowledge about data security. After Unit 3, I strongly believe it is nearly impossible for us to keep our identity confidential in this world, especially when we have to use the Internet everyday.

Everyday when we check our emails, our facebook, or other social networks, we send our personal information and data to the social networks that we are using.

Whenever we use Google Maps, we are sending our location, our addresses to Google Database. They can trace where we are and which location we frequently visit.

When we shop online, we are also sending the shopping website information about our personal interest, our shopping habits, etc.

As we cannot stop using the Internet, we have to be literate in data security. In classroom, I strongly believe that students should be taught about these issues. This is to protect themselves from being attacked from cybercriminals.

I have found 10 interesting and useful tips to avoid leaving traces on the Internet. However, I believe we can hardly follow all of these tips because Google and Facebook have become a indispensable part of our life.


+ There are no comments

Add yours