-
Your password is the key to your digital life. It protects your personal information, your schoolwork, your social media accounts, your gaming progress, and even your digital money or in‑game items. When your password is weak, reused, or stolen, attackers can easily break in and pretend to be you.
This module helps you understand how passwords work, how attackers break them, and how you can build strong, memorable protection for every account you use.
-
A password is a secret word, phrase, or combination of characters that proves your identity when you log into a device, app, or website. Think of it like the key to your personal locker — only you should have access.
Types of Passwords
Static passwords — stay the same until you change them.
Dynamic passwords — change regularly, like one‑time codes or rotating passphrases.
Key Terms You Should Know
Authentication — proving who you are to access an account.
Credentials — your username/email + password.
Multi‑factor authentication (MFA) — using more than one method to confirm your identity (e.g., password + phone code).
Why Passwords Matter
Your password protects:
personal information
schoolwork and files
social media and gaming accounts
digital money, credits, and items
-
In 2025, over 24 billion passwords were exposed in data leaks — that’s almost three passwords for every person on Earth. Most were weak or reused.
What Can Happen If Your Password Is Weak or Stolen
Someone can log into your accounts and lock you out.
They can message your friends pretending to be you.
Your schoolwork or files can be deleted.
Your private information can be leaked or sold.
Cyberbullies or scammers can use your account to harm others.
Real‑World Example
A popular YouTuber had their account hacked because of a weak password. The attacker used the channel to run scams, damaging the creator’s reputation and upsetting thousands of followers.
-
Strong authentication means using more than just a password. The more layers you add, the harder it is for attackers to break in.
Three Types of Authentication Factors
Something you know — password, PIN, secret answer.
Something you have — phone, security key, authenticator app.
Something you are — fingerprint, face, voice.
Two‑Factor Authentication (2FA)
2FA combines two factors, such as:
password + SMS code
password + authenticator app
password + fingerprint
Why 2FA Is Essential
Even if someone steals your password, they still can’t get in without the second factor.
Platforms like Instagram, Gmail, TikTok, and Fortnite all offer 2FA — and you should turn it on for every important account. -
A strong password doesn’t have to be complicated — it just needs to be long, unique, and hard to guess.
What a Strong Password Looks Like
At least 12–15 characters
Mix of uppercase, lowercase, numbers, and symbols
Not based on personal info
Unique for every account
Common Mistakes to Avoid
Using “123456”, “password”, “qwerty”
Using your name, birthday, or pet’s name
Reusing the same password everywhere
Writing passwords on sticky notes or in your phone’s notes app
Sharing passwords with friends
Entering passwords on untrusted devices
Strategies for Memorable Passwords
Passphrases:
Combine random words: mint‑owl‑thunder‑creek.
Add a number or symbol: mint‑owl‑7thunder‑creek*.Acronyms:
Turn a sentence into initials:
“Last week I fell down thirty stairs” → Lw1fd30$Mnemonic stories:
Create a mental image to remember your password:
Eagle + spoon + mushroom → Eagle‑Spoon‑Mushroom3!
Tips for Young Users
Avoid song lyrics, movie quotes, or famous lines.
Don’t use predictable patterns like “password1”or your name .
Make your passphrase fun and unique — but not about you.
-
Young people have special legal protections online. Knowing them helps you stay safe and make informed choices.
Important Laws
COPPA (Children’s Online Privacy Protection Act): In the U.S., websites and apps must get parental consent before collecting data from children under 13. New rules in 2025 require stricter verification and data deletion practices. https://www.ftc.gov/legal-library/browse/rules/childrens-online-privacy-protection-rule-coppa
GDPR-K (General Data Protection Regulation for Kids): In the EU, children’s data is protected, and parental consent is needed for users under 13–16, depending on the country. https://gdpr-info.eu/art-8-gdpr/
Platform Protections: Many apps (like Instagram Teen Accounts) offer special privacy settings for youth, but studies show these are not always effective—youth should still be cautious and proactive.
Best Practices
Ask a parent or guardian before creating new accounts.
Use privacy settings to limit who can see your information.
Report suspicious or inappropriate content.
-
Mission 1: Build Your “Unbreakable Password”
Goal: Create a strong, memorable password using one of the strategies from the chapter.
Steps
Pick one method:
Passphrase
Acronym
Mnemonic story
Create a password that:
Is 12–15+ characters
Uses upper/lowercase, numbers, symbols
Is NOT based on personal info
Test it using a password strength checker (search “password strength test” — no need to enter your real password; use a modified version).
Mission 2: Spot the Scam — Phishing Detective
Goal: Learn to identify phishing red flags.
Instructions
Below are three short messages. Two are phishing attempts, one is safe. Learners must identify which is which and explain why.
A. “Your game account has been flagged for suspicious activity. Click here immediately to secure it: http://secure-game-support123.com”
B. “Hey, I can’t log into my account. Did you change the password? Can you send me the code you just got?”
C. “Reminder: Your school portal password expires next week. Please update it through the official school website.”
Task
Mark each message as Safe, Suspicious, or Phishing according to what you think.
List at least two red flags for each suspicious one.
Mission 3: Password Reuse Check-Up
Goal: Understand the risk of reused passwords.
Instructions
Learners make a private list (not shared!) of:
5 apps or websites they use often
Whether each one has a unique password or a reused password
Task
For each reused password, they write:
What could happen if one of these sites was hacked?
Mission 4: Privacy Hero Quiz
Goal: Connect legal protections (COPPA, GDPR-K) to real life.
Scenario
“You want to sign up for a new app that asks for your birthday, location, and permission to access your photos.”
Questions
What information should you check before signing up?
When do you need parental/guardian consent?
What privacy settings would you turn on first?
-
Add a short summary or a list of helpful resources here.