SlideShare una empresa de Scribd logo
1 de 15
Cyber safety
Jake
Examples of Personal Information
Your full name
Your User name or password
Your age
Your ID number or Social
Security Number
Your email address
Your home address
Your phone names
What city you live in
What neighborhood you live
in
 Your parents names
 Where your parents work
 Names or phone numbers
Of Family members and
friends















What school you go to
Your teachers’ names
Credit Card numbers










License plate numbers
Name of team you play for
Your number on your team
Places near your house, like
Stores restaurants , or parks
Places you visit regularly
If you are home alone
When you are going to be
home alone.
Tips for Identifying Spam Emails




It sound too good to be true
Sender NotMCSpammer
Subject: You just won millions!!





It is advertising something
Sender Joe Schmoe
Subject Great Deals Here





The email sounds interesting
It Sender brouhaha
Subject Win a free game console!





There are lots of misspelled words
Sender: Sunsh1n3 Superst@r
Subject Brit3 dats R heer




It sounds really strange
Sender Mango justified
Tips for recognizing Website
Dangers.








Links that download
Files Forms that ask
For personal Information
Advertisements and
Popups Threatening
Hurtful or adults-only
Content.
What is Malware


A destructive program that can get into
computers or networks and harm them by
deleting modifying or sending out the
data


Adware
◦ A software program that causes
Advertisements to appear on your computer.



Trojan Horse
◦ A nasty program disguised as legitimate
Software



Spyware
◦ A software program that secretly tack what you
do on the internet and sometimes gets
information about you from your computer.

Examples of Malware


Virus
◦ A software program that can wipe out
Information on your computer and create
Major problems.



Worm
◦ A destructive program that can get into
Computers or networks and harm them by
deleting modifying or sending out the date.

Malware continued
To protect your computer Install the most
recent ant-spyware and anti-virus
software.
 Keep software up-to-date to stay
Protected.
 Check with a trusted adult
 A Firewall is a software program that
protects your computer by acting like a
security guard and monitoring and
controlling internet traffic.


To protect your computer
A cyber crime is a crime that is committed
 With the help of a computer or a
communication device and a network.


Cyber Crime
Distributing Malware
 Prevention
 Anti-virus Software Cold shoulder


Elvirus




Spreading Misinformation
Prevention
Reliable websites cold shoulder.

Ms. Information
Theand ldentity theft prevention Protecting personal information
Master Hacker-Nils
Hacking
Firewall.
Jax,Cyber bully
Cyberbullying prevention Reporting to authorities cold shoulder.
Script kiddy hacking
 Prevention
 Reporting to authorities.


Sparky Script Kiddie

Más contenido relacionado

Similar a Jake on cybersafety

Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
Megan Bell
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
Jana Baxter
 

Similar a Jake on cybersafety (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Online Safety
Online Safety Online Safety
Online Safety
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Más de Pentucket Regional High School (8)

Albinism powerpoint[1]
Albinism powerpoint[1]Albinism powerpoint[1]
Albinism powerpoint[1]
 
Cystic fibrosis[1]
Cystic fibrosis[1]Cystic fibrosis[1]
Cystic fibrosis[1]
 
Marfan syndrome ppt.
Marfan syndrome ppt.Marfan syndrome ppt.
Marfan syndrome ppt.
 
Fuel efficiency hol presentation q2
Fuel efficiency hol presentation q2Fuel efficiency hol presentation q2
Fuel efficiency hol presentation q2
 
Music hol powerpoint q3
Music hol powerpoint q3Music hol powerpoint q3
Music hol powerpoint q3
 
Loans hol powerpoint q1
Loans hol powerpoint q1Loans hol powerpoint q1
Loans hol powerpoint q1
 
Amandacook8stagesofgenocide
Amandacook8stagesofgenocideAmandacook8stagesofgenocide
Amandacook8stagesofgenocide
 
Ashley cook 8 stages of genocide
Ashley cook 8 stages of genocideAshley cook 8 stages of genocide
Ashley cook 8 stages of genocide
 

Jake on cybersafety

  • 2. Examples of Personal Information Your full name Your User name or password Your age Your ID number or Social Security Number Your email address Your home address Your phone names What city you live in What neighborhood you live in  Your parents names  Where your parents work  Names or phone numbers Of Family members and friends              What school you go to Your teachers’ names Credit Card numbers         License plate numbers Name of team you play for Your number on your team Places near your house, like Stores restaurants , or parks Places you visit regularly If you are home alone When you are going to be home alone.
  • 3. Tips for Identifying Spam Emails    It sound too good to be true Sender NotMCSpammer Subject: You just won millions!!    It is advertising something Sender Joe Schmoe Subject Great Deals Here    The email sounds interesting It Sender brouhaha Subject Win a free game console!    There are lots of misspelled words Sender: Sunsh1n3 Superst@r Subject Brit3 dats R heer   It sounds really strange Sender Mango justified
  • 4. Tips for recognizing Website Dangers.        Links that download Files Forms that ask For personal Information Advertisements and Popups Threatening Hurtful or adults-only Content.
  • 5. What is Malware  A destructive program that can get into computers or networks and harm them by deleting modifying or sending out the data
  • 6.  Adware ◦ A software program that causes Advertisements to appear on your computer.  Trojan Horse ◦ A nasty program disguised as legitimate Software  Spyware ◦ A software program that secretly tack what you do on the internet and sometimes gets information about you from your computer. Examples of Malware
  • 7.  Virus ◦ A software program that can wipe out Information on your computer and create Major problems.  Worm ◦ A destructive program that can get into Computers or networks and harm them by deleting modifying or sending out the date. Malware continued
  • 8. To protect your computer Install the most recent ant-spyware and anti-virus software.  Keep software up-to-date to stay Protected.  Check with a trusted adult  A Firewall is a software program that protects your computer by acting like a security guard and monitoring and controlling internet traffic.  To protect your computer
  • 9. A cyber crime is a crime that is committed  With the help of a computer or a communication device and a network.  Cyber Crime
  • 10.
  • 11. Distributing Malware  Prevention  Anti-virus Software Cold shoulder  Elvirus
  • 13. Theand ldentity theft prevention Protecting personal information Master Hacker-Nils Hacking Firewall.
  • 14. Jax,Cyber bully Cyberbullying prevention Reporting to authorities cold shoulder.
  • 15. Script kiddy hacking  Prevention  Reporting to authorities.  Sparky Script Kiddie