curriculum/challenges/english/blocks/learn-how-to-use-modal-verbs/67d55298790e3229a02f4a0b.md
Listen to the audio and answer the question below.
Why is it important to follow the guidelines?
To prevent a data breach and protect sensitive information.
To make data easier to access for all employees.
The goal is not to make sensitive data widely accessible.
To delete encryption keys after each use.
Jessica does not say encryption keys should be deleted.
To avoid updating security protocols in the future.
Security protocols must be updated regularly to stay effective.
1
A data breach happens when sensitive information is accessed by unauthorized people. For example:
A data breach can happen if hackers get access to private information. - If cybercriminals steal information, it's called a data breach.
Companies must act quickly if there is a data breach. - When a data breach happens, businesses need to respond fast to fix it.
Jessica says encrypting data and securing encryption keys is essential to prevent this risk.
{
"setup": {
"background": "company2-center.png",
"characters": [
{
"character": "Jessica",
"position": {
"x": 50,
"y": 15,
"z": 1.2
},
"opacity": 0
}
],
"audio": {
"filename": "B1_14-1.mp3",
"startTime": 1,
"startTimestamp": 42.62,
"finishTimestamp": 48.14
}
},
"commands": [
{
"character": "Jessica",
"opacity": 1,
"startTime": 0
},
{
"character": "Jessica",
"startTime": 1,
"finishTime": 6.52,
"dialogue": {
"text": "Yes, all sensitive data must be encrypted, and you have to ensure that the encryption keys are stored securely.",
"align": "center"
}
},
{
"character": "Jessica",
"opacity": 0,
"startTime": 7.02
}
]
}