cheatsheet_lesson5

Privacy and Security Fundamentals - Cheat Sheet

Understanding Your Digital Footprint

  • Active Footprint: Information you deliberately share (social media, comments, reviews)
  • Passive Footprint: Information collected without direct action (browsing history, location data)

Essential Privacy Practices

Managing Your Digital Footprint

  • Search your name regularly to see what’s public
  • Review privacy settings on all platforms quarterly
  • Be selective about sharing personal information
  • Use privacy-focused service alternatives when possible
  • Only provide information that’s absolutely necessary

Browser Privacy Techniques

  • Use private browsing for sensitive searches
  • Clear cookies and browsing history weekly
  • Install privacy extensions (Privacy Badger, uBlock Origin)
  • Consider privacy-focused browsers (Firefox, Brave, Tor)
  • Disable third-party cookies in browser settings

Social Media Privacy

  • Audit your connections regularly
  • Limit personal information in profiles
  • Use platform privacy tools and checkups
  • Remove location data before sharing images
  • Consider separate accounts for different life aspects

Essential Security Practices

Password Management

  • Create strong, unique passwords (12+ characters, mixed types)
  • Use a password manager (Bitwarden, LastPass, 1Password)
  • Enable two-factor authentication (2FA) on important accounts
  • Use passkeys when available
  • Check haveibeenpwned.com regularly for breaches

Network Security

  • Use VPNs on public Wi-Fi
  • Secure home network with strong password and WPA3
  • Turn off Bluetooth when not in use
  • Check for HTTPS before entering sensitive information
  • Consider using a secure DNS service

Device Security

  • Keep software and operating systems updated
  • Use antivirus/anti-malware protection
  • Enable device encryption
  • Back up important data (3-2-1 rule: 3 copies, 2 types, 1 off-site)
  • Properly wipe data before selling or recycling devices

Scam Recognition Red Flags

  • Urgency (“Act now!” or “Limited time only!”)
  • Threats or dire consequences for inaction
  • Requests for unusual payment methods
  • Poor grammar or spelling
  • Offers that seem too good to be true
  • Unsolicited communications about accounts
  • Requests for personal information or credentials

Common Scam Types

  • Phishing: Fake emails appearing to be from legitimate companies
  • Smishing: Phishing via SMS text messages
  • Vishing: Voice phishing via phone calls
  • Tech Support Scams: Fake alerts about computer problems
  • Romance Scams: Building relationships to extract money
  • Investment Scams: Promises of unrealistic returns
  • Impersonation Scams: Pretending to be government agencies

If You Suspect a Scam

  1. Don’t click links or download attachments
  2. Contact the purported sender through official channels
  3. Never provide personal information in response to unsolicited requests
  4. Report suspicious communications to relevant platforms
  5. If victimized, change passwords and notify financial institutions immediately