1 / 21

WELCOME TO DIGITAL SECURITY 101

Learn essential tips and information about digital security to ensure your safety online. Topics include malware, hacking, phishing, password protection, and more.

scolbert
Download Presentation

WELCOME TO DIGITAL SECURITY 101

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WELCOME TO DIGITAL SECURITY 101 Cassie Helsel

  2. PLAYER ONE ANSWER THE FOLLOWING QUESTIONS BY CLICKING ON THE CORRECT RESPONSE. START

  3. I'm online and I receive a friend request from someone that is described as from my school. I don’t remember their name, but their profile picture shows them wearing our school uniform. Should I accept the request? NO YES

  4. WRONG YOU SHOULD NOT ACCEPT FRIEND REQUESTS FROM STRANGERS. EVEN WHEN YOU KNOW THE PERSON, ASK YOUR FRIENDS DIRECTLY ABOUT SENDING A FRIEND REQUEST BEFORE ACCEPTING. NEXT QUESTION

  5. CORRECT YOU SHOULD NOT ACCEPT FRIEND REQUESTS FROM STRANGERS. EVEN WHEN YOU KNOW THE PERSON, ASK YOUR FRIENDS DIRECTLY ABOUT SENDING A FRIEND REQUEST BEFORE ACCEPTING. NEXT QUESTION

  6. PLAYER TWO START

  7. I have a digital picture of myself and someone I met online wants to see it. Is it okay to send it to that person? NO YES

  8. WRONG YOU SHOULD NEVER SEND PICTURES OF YOURSELF TO PEOPLE YOU HAVE JUST MET ONLINE. NEXT QUESTION

  9. CORRECT YOU SHOULD NEVER SEND PICTURES OF YOURSELF TO PEOPLE YOU HAVE JUST MET ONLINE. NEXT QUESTION

  10. PLAYER ONE START

  11. I'm visiting a site from a company or organization that I've heard of before. They want my name and phone number so I can enter a contest. Is it okay to enter? NO YES

  12. WRONG You should never reveal ANY information about yourself to anyone, even companies you've heard of. If they want to get this information from anyone under 13, the law requires that they first get your parents' permission. CLICK HERE

  13. CORRECT You should never reveal ANY information about yourself to anyone, even companies you've heard of. If they want to get this information from anyone under 13, the law requires that they first get your parents' permission. CLICK HERE

  14. DIGITAL SECURITY • Definition: The electronic precautions to guarantee safety. Protection Dangers • Malware • Hacking • Online Stalking • Phishing • Password Protection • Virus Security Programs • Updates and Firewalls • Data Backup

  15. Malware • “Malicious Software” • Software programs designed to do damage or do other unwanted actions on a computer system. Computer Security Programs • Software programs designed to protect your hardware/computer from malware and viruses.

  16. Hacking • Gaining unauthorized access to other computers or accounts. Password Protection • Create strong passwords by using special characters, letters, and numbers. • Example: 3 and 1 can replace letters E and L “3ASI1Y” (EASILY)

  17. Online Stalking • “Cyberstalking” • When someone harasses or threatens a person repeatedly online. • Profile, picture tags, blog posts, etc. Phishing • “Cyberstalking” • When someone harasses or threatens a person repeatedly online. • Profile, picture tags, blog posts, etc.

  18. Updates and Firewalls • Update all devices and apps for better virus protection! • Enable firewall! Data Backup • Copying or archiving files/folders to be restored in the case of data loss. • Example: iCloud

  19. Guided Practice/Active Engagement https://play.kahoot.it/#/?quizId=3309397b-3ed4-48ff-a835-5acf580155b0

  20. Video/Independent Practice http://www.pbs.org/wgbh/nova/labs/video_popup/5/34/ http://www.pbs.org/wgbh/nova/labs/lab/cyber/

  21. Sources cited • https://techterms.com/definition/hacker • https://techterms.com/definition/malware • https://www.techopedia.com/definition/14326/cyberstalking • http://searchsecurity.techtarget.com/definition/phishing • http://www.webopedia.com/TERM/F/firewall.html • http://kb.winzip.com/kb/entry/12/ • http://www.pbs.org/wgbh/nova/labs/lab/cyber/ • And ”Digital Citizenship in Schools” by Mike Ribble

More Related