210 likes | 227 Views
Learn essential tips and information about digital security to ensure your safety online. Topics include malware, hacking, phishing, password protection, and more.
E N D
WELCOME TO DIGITAL SECURITY 101 Cassie Helsel
PLAYER ONE ANSWER THE FOLLOWING QUESTIONS BY CLICKING ON THE CORRECT RESPONSE. START
I'm online and I receive a friend request from someone that is described as from my school. I don’t remember their name, but their profile picture shows them wearing our school uniform. Should I accept the request? NO YES
WRONG YOU SHOULD NOT ACCEPT FRIEND REQUESTS FROM STRANGERS. EVEN WHEN YOU KNOW THE PERSON, ASK YOUR FRIENDS DIRECTLY ABOUT SENDING A FRIEND REQUEST BEFORE ACCEPTING. NEXT QUESTION
CORRECT YOU SHOULD NOT ACCEPT FRIEND REQUESTS FROM STRANGERS. EVEN WHEN YOU KNOW THE PERSON, ASK YOUR FRIENDS DIRECTLY ABOUT SENDING A FRIEND REQUEST BEFORE ACCEPTING. NEXT QUESTION
PLAYER TWO START
I have a digital picture of myself and someone I met online wants to see it. Is it okay to send it to that person? NO YES
WRONG YOU SHOULD NEVER SEND PICTURES OF YOURSELF TO PEOPLE YOU HAVE JUST MET ONLINE. NEXT QUESTION
CORRECT YOU SHOULD NEVER SEND PICTURES OF YOURSELF TO PEOPLE YOU HAVE JUST MET ONLINE. NEXT QUESTION
PLAYER ONE START
I'm visiting a site from a company or organization that I've heard of before. They want my name and phone number so I can enter a contest. Is it okay to enter? NO YES
WRONG You should never reveal ANY information about yourself to anyone, even companies you've heard of. If they want to get this information from anyone under 13, the law requires that they first get your parents' permission. CLICK HERE
CORRECT You should never reveal ANY information about yourself to anyone, even companies you've heard of. If they want to get this information from anyone under 13, the law requires that they first get your parents' permission. CLICK HERE
DIGITAL SECURITY • Definition: The electronic precautions to guarantee safety. Protection Dangers • Malware • Hacking • Online Stalking • Phishing • Password Protection • Virus Security Programs • Updates and Firewalls • Data Backup
Malware • “Malicious Software” • Software programs designed to do damage or do other unwanted actions on a computer system. Computer Security Programs • Software programs designed to protect your hardware/computer from malware and viruses.
Hacking • Gaining unauthorized access to other computers or accounts. Password Protection • Create strong passwords by using special characters, letters, and numbers. • Example: 3 and 1 can replace letters E and L “3ASI1Y” (EASILY)
Online Stalking • “Cyberstalking” • When someone harasses or threatens a person repeatedly online. • Profile, picture tags, blog posts, etc. Phishing • “Cyberstalking” • When someone harasses or threatens a person repeatedly online. • Profile, picture tags, blog posts, etc.
Updates and Firewalls • Update all devices and apps for better virus protection! • Enable firewall! Data Backup • Copying or archiving files/folders to be restored in the case of data loss. • Example: iCloud
Guided Practice/Active Engagement https://play.kahoot.it/#/?quizId=3309397b-3ed4-48ff-a835-5acf580155b0
Video/Independent Practice http://www.pbs.org/wgbh/nova/labs/video_popup/5/34/ http://www.pbs.org/wgbh/nova/labs/lab/cyber/
Sources cited • https://techterms.com/definition/hacker • https://techterms.com/definition/malware • https://www.techopedia.com/definition/14326/cyberstalking • http://searchsecurity.techtarget.com/definition/phishing • http://www.webopedia.com/TERM/F/firewall.html • http://kb.winzip.com/kb/entry/12/ • http://www.pbs.org/wgbh/nova/labs/lab/cyber/ • And ”Digital Citizenship in Schools” by Mike Ribble