Protection de la vie privée

Be Cyber Strong

Secure your secrets

Getting real about privacy and security

Online privacy and security issues don’t always have clear right and wrong solutions. Protecting your personal and private information – all the stuff that makes you you – means asking the right questions and finding your own educated answers.


How to build a great password
Keep it to yourself
Tower of Treasure


Learn why privacy matters, and how it relates to online security.

Practice how to create strong passwords.

Review the tools and settings that protect against hackers and other threats.


Download this chapter
Download all the chapters



Protecting people’s data and personal information (also called sensitive information).


Protecting people’s devices and the software on them.

Two-step verification (also called two-factor verification and two-step authentication)

A security process where logging in to a service requires two separate steps or two “factors,” such as a password and a one-time code. For example, you may have to enter your password and then enter a code that was texted to your phone or a code from an app.

Password or passcode

A secret combination used to access something. It may take different forms; for example, you may have a four-digit number-only code that you use for your phone lock and a much more complex password for your email account. In general, you should make your passwords as long and complex as you can while still being able to remember them.


The process of converting information or data into a code that makes it unreadable and inaccessible.


The goal when creating a secure password. For example, a password is complex when it has a mix of numbers, special characters (like “$” or “&”), and both lowercase and uppercase letters.


A person who uses computers to gain unauthorized access to other people’s or organizations’ devices and data.