week 2
Individual Report Task: Explaining the Tools Used to Protect Personal Identity
Task Overview
In this task, you will research and write a short report on the tools and methods used to protect personal identity online. With increasing cyber threats such as identity theft and data breaches, it is essential to understand how to keep personal information secure.
Your report should be 200–300 words and cover different security measures and tools that help protect personal identity.
Title Page
Include your name, date, and a title (e.g., Explaining the Tools Used to Protect Personal Identity).
1. Outline the Security Tool or Practice
Describe different tools and best practices that help secure personal identity.
Suggested areas to cover:
• Encryption
• Firewalls and VPNs
• Public WiFi Security Concerns
• Two-Factor Authentication (2FA) and Biometrics
• Password Managers
2. Explain How This Helps Protect Personal Identity
For each tool or practice, explain how it improves security and protects identity from cyber threats.
For example:
• Encryption (e.g., End-to-End Encryption in Messaging Apps like Signal or WhatsApp)
• Converts personal data into unreadable code, protecting it from hackers.
• Helps prevent identity theft when communicating online.
• Firewalls and VPNs (e.g., NordVPN, ExpressVPN)
• A firewall acts as a security barrier, blocking malicious traffic.
• A VPN (Virtual Private Network) hides your real IP address and encrypts internet traffic, improving privacy.
• Public WiFi Security Concerns
• Hackers can set up fake WiFi hotspots to steal personal data.
• Avoid logging into sensitive accounts (e.g., banking) on public WiFi without a VPN.
• Two-Factor Authentication (2FA) and Biometrics (e.g., Google Authenticator, Face ID, Fingerprint Scanners)
• 2FA adds an extra layer of security by requiring a second verification step (e.g., a code sent to your phone).
• Biometrics use unique physical traits (e.g., fingerprints, facial recognition) to prevent unauthorised access.
• Password Managers (e.g., Bitwarden, 1Password, LastPass)
• Securely stores and generates strong passwords to reduce the risk of hacking.
• Prevents password reuse, which is a major security risk.
3. Recommended Use and Effectiveness
Discuss why people should use these tools and how effective they are in protecting personal identity.
• Why are these tools necessary?
• What are their benefits and potential limitations?
Example:
“Although VPNs improve privacy, they do not fully prevent identity theft. Users should combine them with strong passwords and 2FA for maximum security.”
4. Additional Resources and Further Reading
Provide useful links for learning more about personal identity protection.
Example:
• Guide to VPNs and Online Privacy – https://www.eff.org/issues/privacy
• NCSC Password Guidance (UK) – https://www.ncsc.gov.uk/collection/passwords
Submission and Marking Criteria
Your report should be 200–300 words and must be clearly structured, well-researched, and easy to understand.
âÅâ︠Accuracy of Research – Are the tools described correctly?
âÅâ︠Technical Understanding – Are their uses and benefits clearly explained?
âÅâ︠Presentation and Clarity – Is the report well-organised and readable?
Final Note
This task will help you understand the importance of online security and how different tools can protect personal identity. Take your time to research and provide clear explanations.
Last Updated
2025-05-12 10:28:12
English and Maths
English
Maths
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Files that support this week
Week 1←
PrevWeek 2←
PrevWeek 3←
Prev→
Next