Transcript
CORY DOCTOROW
Welcome to the final week of the course. Over the past 7 weeks we've explored different information security threats, together with the actions you can take to prevent these threats from causing harm to your digital life. We've looked at some key technologies such as networking and cryptography that underpin the activities we carry out online. We've looked at what can be done in the event of an attack from both a technological and legal standpoint.
Now we'll focus on how to assess the security risks associated with your digital life, so that you can effectively plan to protect yourself from attacks. You'll also have the opportunity to review your information security practises and review on how these might have changed as a result of what you've learned.