Module 4: Protecting Your Data in Transit
Introduction
What happens to your data after you send a text, fire off an email, access a shared cloud doc, or enter a query in your search engine? How does a text message make it from your phone to a friend’s? How do the edits that you make in a shared cloud doc appear for your collaborators almost instantaneously?
This is the concept of “data in transit,” or “data in motion.” For most people, this concept probably feels like a black box.
Module 4 will demystify the process of “data in transit” by helping you to understand what happens to your data after you hit “send” on a text message or enter a query into your search engine. Even more importantly, you’ll learn about what actions you can take to prevent threat actors from accessing your data while it’s in motion.
Topics
Module 4 covers the following topics:
- Topic 4.0 – How to communicate securely on your mobile device
- Topic 4.1 – Tips to stay safe while surfing the web, Part 1: Web browser settings
- Topic 4.2 – Tips to stay safe while surfing the web, Part 2: Accessing websites securely
- Topic 4.3 – Get the most out of cloud storage & services while minimizing the risk
Topic 4.0 How to Communicate Securely on Your Mobile Device
Follow these best practices for securely communicating on your mobile device and when sending data over email.
Topic 4.1 Tips to Stay Safe while Surfing the Web, Part 1: Web Browser Settings
Implement these best practices to help better mitigate malware risks when using web browsers.
Topic 4.2 Tips to Stay Safe while Surfing the Web, Part 2: Accessing Websites Securely
Follow these steps to help ensure a secure connection to an authentic website.
Topic 4.3 Get the Most out of Cloud Storage and Services while Minimizing the Risk
Become more informed of cloud services while better minimizing security risks.
Project Upskill Glossary
Learn more about the terms and concepts referenced in Project Upskill to help users improve their defense against common cybersecurity threats.