Summary and resources

Completed

You've learned that devices can be the key to vital information on individuals and organizations, and that cybercriminals target them to gain unauthorized access to data. Cybercriminals use various means to compromise devices. If you look after data, you protect people and organizations. You’ve learned how to protect devices through cybersecurity measures that help you to achieve and maintain the confidentiality, integrity, and availability of data.

Now you've completed this module, you should be able to:

  • Describe what your device knows about you.
  • Describe how devices can become cybersecurity threats.
  • Describe how to mitigate against device-related threats.