SlideShare una empresa de Scribd logo
1 de 15
Joel









Your full name
Your user name or
password
You age
Your ID number or
social security
number
Your email address
Your phone number









What city you live in
What neighborhood
you live in
Your parent’s names
Where your parents
work
Names or phone
numbers of family
members and friends









What school you go to
Your teacher’s name
Credit Card numbers
License plate numbers
Name of team you play
for
Your number on your
team



Places near your house,
like stores, restaurants,
or parks




It sounds too good to be true
Sender: NotMCSpammer
Subject: You just won millions!!
It is advertising something
Sender: Joe Schmoe
Subject: Great Deals Here





Links that download files
Forms that ask for Personal Information
Advertisements and Popups
Threatening, hurtful, or adults-only contents


Malware is a software program that harms
your computer. Adware, spyware, viruses,
Trojan horses, and worms are all types of
malware.


Adware




Trojan Horse




A software program that causes advertisements to
appear on your computer.
A nasty program disguised as legitimate software.

Spyware


A software program that secretly tacks what you do
on the Internet and sometimes gets information
about you from your computer.


Virus




A software program that can wipe out information
on your computer and create major problems.

Worm


A destructive program that can get into computers
or networks and harm them by deleting, modifying,
or sending out the data.






Install the most recent anti-spyware and antivirus software.
Keep software up-to-date to stay protected.
Check with a trusted adult
A firewall is a software program that protects
your computer by acting like a security guard
and monitoring and controlling internet traffic


A cyber crime is a crime that is
committed with the help of a
communication device and a network




Distributing malware
PREVENTION
Anti-Virus Software,
 Cold Shoulder





Spreading Misinformation
PREVENTION
Reliable Websites
 Cold Shoulder





Hacking Identity Theft
PREVENTION
Protecting personal information
 Firewall





Cyber bullying
PREVENTION
Reporting to authorities
 Cold shoulder





Script kiddy hacking
PREVENTION


Reporting to authorities

Más contenido relacionado

Similar a Joel on cyber safety

Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Facebook Privacy options
Facebook Privacy optionsFacebook Privacy options
Facebook Privacy optionsPhil Bradley
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Gamecynthia.warner
 
http___www.facebook.com(2)
http___www.facebook.com(2)http___www.facebook.com(2)
http___www.facebook.com(2)supers arun
 
Online Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalOnline Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalPCM creative
 
Becybersmart
BecybersmartBecybersmart
BecybersmartVelma
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsRay Brannon
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsRay Brannon
 

Similar a Joel on cyber safety (20)

Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Facebook Privacy options
Facebook Privacy optionsFacebook Privacy options
Facebook Privacy options
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online Safety
Online Safety Online Safety
Online Safety
 
Internet Safety Jeopardy Game
Internet Safety Jeopardy GameInternet Safety Jeopardy Game
Internet Safety Jeopardy Game
 
Safetyquizkids
SafetyquizkidsSafetyquizkids
Safetyquizkids
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
http___www.facebook.com(2)
http___www.facebook.com(2)http___www.facebook.com(2)
http___www.facebook.com(2)
 
Online Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalOnline Identity - Defining Personal from Professional
Online Identity - Defining Personal from Professional
 
Becybersmart
BecybersmartBecybersmart
Becybersmart
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
102010a
102010a102010a
102010a
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Week 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threatsWeek 5 protect yourself from cyber threats
Week 5 protect yourself from cyber threats
 
Shelby's i safe ppt
Shelby's i safe pptShelby's i safe ppt
Shelby's i safe ppt
 

Más de Pentucket Regional High School (9)

Copyright
CopyrightCopyright
Copyright
 
Search vs.research pptx
Search vs.research pptxSearch vs.research pptx
Search vs.research pptx
 
Zack on cyber safety
Zack on cyber  safetyZack on cyber  safety
Zack on cyber safety
 
Albinism powerpoint[1]
Albinism powerpoint[1]Albinism powerpoint[1]
Albinism powerpoint[1]
 
Cystic fibrosis[1]
Cystic fibrosis[1]Cystic fibrosis[1]
Cystic fibrosis[1]
 
Marfan syndrome ppt.
Marfan syndrome ppt.Marfan syndrome ppt.
Marfan syndrome ppt.
 
Music hol powerpoint q3
Music hol powerpoint q3Music hol powerpoint q3
Music hol powerpoint q3
 
Amandacook8stagesofgenocide
Amandacook8stagesofgenocideAmandacook8stagesofgenocide
Amandacook8stagesofgenocide
 
Ashley cook 8 stages of genocide
Ashley cook 8 stages of genocideAshley cook 8 stages of genocide
Ashley cook 8 stages of genocide
 

Joel on cyber safety