Transcript
CORY DOCTOROW
Hello and welcome to Week 2. Last week we looked at online activities and security threats. We saw that many of these threats depend on attackers being able to impersonate us online. For this to happen, the attacker needs to access our online identities.
So this week we're looking at passwords. Many online services use passwords. From social networks to payment systems, passwords are how we identify ourselves and interact with the services that we use. So you'll learn the ways in which attackers will try to discover your password so they can impersonate you online. And you'll learn how you can improve the security of your passwords, and online identification methods that use different techniques and password managers.
But before we get started, a note of caution-- there will be discussions during the course, and just as you should never disclose your PIN, please also take care never to share any of your passwords. If you need an example, make one up.