1 of 13

Online Security

Digital Footprints &

Understanding the scope of personally identifiable information and operational security

2 of 13

What is your digital footprint?

Have either of the following questions ever crossed your mind?

“what happens when I create a new account online?”

“why does [Sony, Microsoft, Nintendo, Steam] need this information for me to be able to play my games?”

Let’s figure out why these and similar questions are so important and we should be asking them!

3 of 13

What is your digital footprint?

Digital Footprint: The trail you leave behind when you engage in online experiences.

4 of 13

Digital Footprint Map

Let’s map out our digital footprint!

  1. Access the jamboard
    1. Session 1: https://jamboard.google.com/d/18anL6UeWYBmdn2AoK_JubelUpaZoNUQDTJPrYRwsnho/edit?usp=sharing
    2. Session 2: https://jamboard.google.com/d/12evEVJwhrybdVbrf2X31MHZkKD0wxEz5_T2uSXNvUvI/edit?usp=sharing
  2. Add your name to the top of your map

5 of 13

Devices

Think about all the devices that you interact with on a daily basis. Do you use a phone or a tablet? Do you use a desktop computer or a laptop? Draw, type, or find an image representation of your devices on your inventory.

6 of 13

Apps and Programs

Think about each app or program that you use on each device. Do you post to social media? Do you use your computer for school work? Add the apps and programs to your map.

7 of 13

Connect each device with each app and program.

Use lines or arrows to connect each device with a representation of each app, program, or site you access with each device.

8 of 13

Personal Information

Think about the types of personal information you share, store, or have available through each of these apps or programs. Do you share photos? Do you post your location on social media? Add this information to your map.

This is also known as personally identifiable information or PII

9 of 13

Connect personal information with each app and program.

Use lines or arrows to connect each app or program with the type of information found in that location. Add details about what a person might learn about you by looking at this information.

10 of 13

Share & Reflection

Take a look at some other digital footprints.

  • What are your takeaways from seeing the digital footprint?

11 of 13

Share & Reflection

Take a look at some other digital footprints.

  • What are your takeaways from seeing the digital footprint?
    • Go to the jam board and place a sticky note down on something your found interesting from doing this activity.

12 of 13

Ways to Protect Yourself Online

  1. Realize you’re a target
  2. Watch out for social engineering
  3. Remember physical security - turn off your devices when possible
  4. Always think before you click
  5. Strong passwords, password managers, and multi-factor authentication
  6. Keep your software up-to-date
  7. Protect your most sensitive data
  8. Use security software wisely
  9. Back up the data you want to keep
  10. Talk with your family (and friends)

Go H*ck Yourself (Payne, 2022)

13 of 13

Cybersecurity Connection & Questions

What cybersecurity concept did we cover?

Any other questions?