Prerequisites¶
Passwords_Logins_2_Factor_Authentication
Subgraph¶
graph LR
1["Passwords Logins 2 Factor Authentication"]-->0{"Update On Security"}
2["What is Self Custody"]-->0{"Update On Security"}
0{"Update On Security"}-->3["Security Concerns For Exchanges"]
0{"Update On Security"}-->4["The Blockchain Security Trilemma"]
0{"Update On Security"}-->5["Security Concerns For Self Custody"]
0{"Update On Security"}-->6["How to Increase Self Custody Security"]
click 1 "../Passwords_Logins_2_Factor_Authentication" "Passwords Logins 2 Factor Authentication"
click 2 "../What_is_Self_Custody" "What is Self Custody"
click 3 "../Security_Concerns_For_Exchanges" "Security Concerns For Exchanges"
click 4 "../The_Blockchain_Security_Trilemma" "The Blockchain Security Trilemma"
click 5 "../Security_Concerns_For_Self_Custody" "Security Concerns For Self Custody"
click 6 "../How_to_Increase_Self_Custody_Security" "How to Increase Self Custody Security"
Description¶
Cryptocurrencies are digital or virtual tokens that use cryptography to secure their transactions and to control the creation of new units. Cryptocurrencies are decentralized meaning they are not subject to government or financial institution control. While this freedom offers many advantages it also leaves cryptocurrencies vulnerable to theft. Cryptocurrency exchanges and wallets are frequently hacked and individual investors are often the target of phishing scams. In order to protect your cryptocurrency investments it is important to be mindful of security processes.
Links¶
Links to other educational resources here: