Security Awareness: Identifying Personally Identifiable Information

The value of personally identifiable information is so high, that cybercriminals have devised many methods of obtaining this information. Learning basic precautions can help prevent releasing too much information.
Course info
Level
Beginner
Updated
Jan 15, 2018
Duration
1h 2m
Table of contents
Description
Course info
Level
Beginner
Updated
Jan 15, 2018
Duration
1h 2m
Description

Personally identifiable information (PII) may be an infection from malware, data reconstruction from a lost or stolen device, or a phone call or email. In this course, Security Awareness: Identifying Personally Identifiable Information, you'll learn how to protect your PII from cybercriminals. First, you'll obtain the basic knowledge about malicious attacks. Next, you'll delve into identifying the attacks and how to stop from falling victim. Finally, you'll discover how to be more proactive in avoiding this type of attack. When you’re finished with this course, you'll have the necessary skills and knowledge to protect your personally identifiable information.

About the author
About the author

Jason Helmick is an author for Pluralsight. His IT career spans more than 25 years or enterprise consulting on a variety of technologies, with a focus on strategic IT business planning. He’s a highly successful IT author, columnist, lecturer, and instructor, specializing in automation practices for the IT pro.

More from the author
More courses by Jason Helmick
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi. I'm Jason Helmick, an author here at Pluralsight, and welcome to my course on personally identifiable information or PII and how to protect it. You know, the value of your personally identifiable information is so high that cyber criminals have spent a considerable amount of time devising many methods of obtaining this information. It may be an infection from malware, data reconstruction from a lost and stolen device. It could be a phone call or an email message. Taking basic precautions can help prevent releasing too much information, and releasing your personally identifiable information. In this course you will learn to protect your PII with gaining knowledge of malicious attacks, learn how to identify those attacks, and how to stop from falling victim. You'll also learn how to be more proactive in avoiding this type of attack, so join me on this journey to start learning about cyber security and personally identifiable information. Here at Pluralsight we love learning, and we hope that you do too.

The Importance of Privacy
Our lives are busy enough without having to deal with some cyber-criminal trying to steal our Identity. In fact, with everything that's going on in our lives between our jobs and our family and things that we want to do, things that we have to do, the last thing you want to do is spend weeks, months, even years trying to reclaim an Identity that was already yours, so the importance of this pretty much stands out. Here's what we're going to take a look at in this module. We're going to start off with what is personally identifiable information, what the definition of that is, and then drill into something that if you've watched any part of this series on cyber awareness you've already had some exposure to it. We want to talk about the CIA security triad, and this really holds some definitions for us about what we're trying to do to protect our data and why, and then we want to look at what do they want? Of course, after this module with what do they want we're going to taking a look at how to stop them from it, but it helps to understand where we're coming from for all of this, so let's get started with personally identifiable information that's been defined.

Identifying What Is Private
Now you probably care most about the last module where we look at what's going to attack you and how to prevent it; however, it also helps to understand a little bit more about what data you do want to keep private versus what data you don't want to keep private because one of the biggest challenges is the management of all of this. You don't want to work too hard because then you'll stop doing it, so we want to try to make this easy for you in a lot of ways, and that's what we want to start to take a look at here, and then we'll get into all of the things that can go wrong, and how to prevent them. So we want to look at, what do you really need to protect, as far as your data goes, and I want to talk about a concept here, and then locating that data, where is that data going to be at, and I want you to keep in mind that as we get into what can attack you, and how to prevent it, the modes of data. This is, where is your data at the moment, and how is it being used? So let's get started with, what do you really need to protect?

How This Information Can Be Leaked
Now's when the proverbial rubber meets the road, so to speak, so let's not waste any time getting into not only how does that information that you have get leaked in the first place, but how to prevent it from getting leaked. So here's what we're going to do. We're going to take a look at, well first of all, the threats that you face, specifically the threats that you face, and what best practices right up front can you do to solve this problem, but then I want to go into and break this down a little bit more for you. Let's talk about what is good authentication protection? In other words, username and password kind of stuff. Let's take a look at malware, some brief definitions for you on the different types of malware, and I want to show some specific examples of it and then talk about encrypting your data and backing up your data to make sure that you have the best protection and the best resilience if something does go wrong that you can possibly have.