Crash Course Computer Science | Cybersecurity: Crash Course Computer Science #31 | PBS
By Owner - Crash Course Computer Science - Powered By PBSFrom pbs.org
871.2K views
60.8K likes
In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible.
Tags
Protection
Encryption
Firewall
Authentication
Threats
Malware
Passwords
Monitor
Access
Defense
Comments
Leave a Comment
Comments are loading... If you don't see any, be the first to comment!
Related Videos

Crash Course Computer Science | Cryptography: Crash Course Computer Science #33 | PBS
Owner - Crash Course Computer Science - Powered By PBS
Cryptography: Crash Course Computer Science
Crash Course Computer Science
Cybersecurity: Crash Course Computer Science
Crash Course Computer Science

Crash Course Computer Science | Compression: Crash Course Computer Science #21 | PBS
Owner - Crash Course Computer Science - Powered By PBS

Crash Course Computer Science | 3D Graphics: Crash Course Computer Science #27 | PBS
Owner - Crash Course Computer Science - Powered By PBS
Robots: Crash Course Computer Science
Crash Course Computer Science

Crash Course Computer Science | Computer Vision: Crash Course Computer Science #35 | PBS
Owner - Crash Course Computer Science - Powered By PBS
Computer Networks: Crash Course Computer Science
Crash Course Computer Science
Compression: Crash Course Computer Science
Crash Course Computer Science
Computer Vision: Crash Course Computer Science
Crash Course Computer Science
