Skip to content

Commit 65b465a

Browse files
committed
review-1
1 parent d001cf3 commit 65b465a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

learn-pr/security/securing-you-basics-beyond/includes/1-introduction.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,17 +3,17 @@ Staying secure online is a challenge. The internet and the devices connected to
33
Think about the internet as a neighborhood where you do common tasks such as email, banking, or shopping. Then think about who your neighbors are. Some of these neighbors are dangerous. They include:
44

55
- Organized crime gangs intent on stealing personal account information.
6-
- Hackers who will use your computer to attack other victims.
6+
- Hackers who use your computer to attack other victims.
77
- Automated downloads that install ransomware to keep you from using your computer until you pay (or until you restore from a backup).
88
- Government-backed hackers who might be on a mission to steal intellectual property or destabilize governments.
99

10-
Most of your online activity probably doesn't directly expose you to crime. But odds are good that you know someone who's been a victim of some kind of computer-related crime, like computer viruses, malware, identity theft, or data breaches. If it hasn't happened to you and if you don't protect yourself, it's just a matter of time before you'll be directly affected. What can you do to keep yourself safe, without having to be a cybersecurity expert?
10+
Most of your online activity probably doesn't directly expose you to crime. But the odds are good that you know someone who was a victim of some kind of computer-related crime, like computer viruses, malware, identity theft, or data breaches. If it hasn't happened to you and if you don't protect yourself, it's just a matter of time before you're directly affected. What can you do to keep yourself safe, without having to be a cybersecurity expert?
1111

12-
Securing your passwords, account information, and other sensitive data might be easier than you think. We'll show you techniques and tools that you can use to protect yourself from the most common threats.
12+
Keeping your passwords, account information, and other sensitive data secure might be easier than you think. We show you techniques and tools that you can use to protect yourself from the most common threats.
1313

1414
## Learning objectives
1515

16-
By the end of this module, you'll be able to:
16+
By the end of this module, you're able to:
1717

1818
- Identify common threats to your online identity and account data.
1919
- Apply techniques to recognize and avoid phishing.

0 commit comments

Comments
 (0)