5 Summary of Week 3
You have taken a closer look at ways of keeping attackers from impersonating you online or infecting your devices with malware.
In the next part of the course, you will delve a little deeper into the technologies that underpin information security, first focusing on how to protect the networks that we depend on for transmitting our digital information and accessing online services.
There is some optional further reading in the next section relating to some basic precautions you should take before you go online.
You can now go to Week 4: Networking and communications.