Internet / Cyber Security

INTERNET
SECURITY
YOUR
TEACHER
SRIJAN
MUKHOPADHYA
Y
- Hey there!
I am extremely happy to be here with you guys
today.
- I look forward to an amazing session with all of
you!
- Let’s have a great time!
TOPICS
OF
DISCUSSION
WHAT IS
CYBERSECURITY?
FACTS ABOUT
CYBERSECURITY
CYBER
SAFETY AND
LIFE ON THE
INTERNET
IT’S FUN
TIME!
WHAT IS
CYBERCRIME?
A LITTLE
HISTORY ON
THE CYBER
WORLD
WHAT IS
CYBERSECURITY?
WHAT IS
CYBERCRIME?
Cybersecurity is when
someone protects
networks, electronic
devices and data from
falling into wrong hands.
WHAT IS CYBERSECURITY?
It is also the practice of
ensuring safety, integrity,
and security of one’s
information over the
cyberspace.
WHAT IS CYBERSPACE?
Cyberspace is anything that has
to do with the Internet.
For example: We use the Internet to
communicate and stay connected to
our friends and family. We play
video games, download music, and
watch TV shows and movies after
homework is done. Grownups use it
do things like banking, shopping,
and other important everyday
activities online as well.
WHAT IS
CYBERCRIME?
Cybercrime is criminal
activities carried out by
means of computers or
the internet.
The former descriptions were
"computer crime" or "crime by
computer".
The Internet brought other new
terms, like "digital", "electronic",
"virtual" , "IT", "high-tech" and
“technology-enabled" crime.
SOME
COMMON
ONLINE
ISSUES
WE
FACE
TODAY
Cyber
Predators
They are people who
search online for
others in order to
use, control, or harm
them in some way.
Identity Theft
It happens to be an
illegal and wrong
method, in which
criminals collect
and use other
people’s private
data; commonly for
financial gains.
Cyber
Bullying
It is the electronic
posting of mean-
spirited messages
about a person, often
done anonymously.
Are the actions of
this little girl safe?
Should she have
done something
different?
Do you guys want
to know how to
be safe?
MEET ALIA
She is a school going girl just
like the rest of you and loves to
play games and watching
cartoons on the internet.
She will help you understand
the concept of Internet.
The Internet is like a busy road with lots of traffic in all directions.
This ‘traffic’ is called Data.
The games, videos, cartoons, movies, emails etc. that you all love to see just like Alia,travels
over the Internet like data.
While the Internet does seems spectacular on the outside, it has many unseen insides.
One must use it very carefully to stay safe!
Everyday Alia goes to school and enjoys the computer classes, just like all other kids. She
has learned that the computer had something very magical inside it called the Internet. It is
the same thing she sees on mobile phones and tablets.
The Internet lets you do a lot of things. It even lets you make friends online. It can get
infected with viruses which can harm your computer or electronic device. So one has to be
very, very careful.
Alia will now teach you how to stay safe, and use the Internet to enjoy it.
Before you use the Internet, always ask an adult if the computer has a
firewall and antivirus.
Together, they both protect your computer from many kinds of viruses
that attack our computer and steal our data.
We all like to chat with our friends and keep up with them, don’t we? We
can do so easily via email. If we are using a public network or a computer,
we must always log out once we are done.
If it is also very important to know that we must never click on a lik or an
ad in our email or on the Internet. Always ask an adult before doing so.
To help with your regular studies that Internet and is an amazing resource.
Before you sign up for a website, ask your parents for help and
supervision. In matters such as these, they know best.
You may find free Wifi in public spaces like shops, railway stations,
shopping malls, metros etc. to surf the Internet and use it. Avoid using it
as they can be harmful. Never connect to them, as they are not safe!
CONGRATULATIONS! YOU ARE NOW CYBER / INTERNET SAFE!
A LITTLE HISTORY ON
THE CYBER WORLD
FACTS ABOUT
INTERNET SECURITY
The first spam email took
place in 1978 when it was
sent over the Arpanet.
The first recorded
cyber crime was
recorded in the year
1820.
The first virus was
installed on an Apple
Computer in 1982.
YOUR DOSE OF HISTORY
ON CYBERCRIME
95% cyber breaches are due
to human error.
There are around 6 million
cybersecurity jobs.
43% of cyber attacks target
businesses.
A cyberattack is attempted
every 39 seconds.
SOME INTERESTING
FACTS
CYBER SAFETY AND
LIFE ON THE INTERNET
UNDERSTAND LIFE ON THE
INTERNET
The Internet has turned our
existence upside down. It has
revolutionized communications, to
the extent that it is now our
preferred medium of everyday
communication. In almost
everything we do, we use the
Internet. Ordering a pizza, buying a
television, sharing a moment with a
friend, sending a picture over
instant messaging.
The Internet has so much control
over almost every aspect of
human life, not only our private
lives but, also various public
services.
There are unforeseen
consequences to sharing our
private and public information and
the results could damage our
presence on the internet.
Private
Information
Information about you that can
be used to identify you because
it's unique to you (e.g., your full
name or your address)
Personal / Public
Information
Information about you that
cannot be used to identify you
because it is also true for many
other people (e.g., your hair
color or the city you live in)
Internet / Cyber Security
Internet / Cyber Security
YAPPY
-
THE
DON’T
OF
THE
CYBERWORLD
Y
You don't give Your full
name out.
P
Don’t hand over your
Phone Number
A
You don't give out your
Address
P
Do not share your
Password
Y
You don't tell
others about Your
PRINCIPLES
OF
LIFE
ON
THE
INTERNET
Do not
install apps
without
permission.
01
When it comes to
passwords, sharing
is not caring.
Avoid using names
in your passwords
for better security.
Only add people
you fully know of
on social media.
Never upload
pictures or posts
regarding others,
without their
permission.
03
02 04
WHOA!
Let’s have a chat on security now...
Internet / Cyber Security
Internet / Cyber Security
PASSWORD
SECURITY
GRASP
THE
CONCEPT
OF
PASSWORD
SECURITY
WHAT IS A
PASSWORD?
A secret string of letters,
symbols, and numbers
that you can use to restrict
people, who can access
something digital.
WHY DO I NEED A
PASSWORD AT
ALL?
Passwords provide the
first line of defense
against unauthorized
access.
HOW OFTEN
SHOULD I CHANGE
MY PASSWORD?
Ideally, every 6
months.
WHAT SORT OF A
PASSWORD
SHOULD I HAVE?
Preferably, strong.
WHY SHOULD I
HAVE A STRONG
PASSWORD?
It makes it very hard
for bad men and
criminals to access our
data and hurt us.
WHAT ARE THE
DO’s AND DON'Ts
OF A PASSWORD?
Let’s learn about it
further!
Internet / Cyber Security
DO’s
AND
DON’Ts
OF
PASSWORD
MAKING
Never disclose your
usernames and
passwords to
strangers.
Do not use the
‘remember me’
options or save
passwords on a
public computer or
network.
Initially, consult
with your parents
before you create
a password. Once
you get the hang
of it, you can do it
on your own.
Run regular virus
scans on your
devices; say
every week or so.
Never store your
usernames and
passwords on a paper
or in an easily
accessible place.
LET’S DO AN ACTIVITY!
Start with a phrase. Think of a quote or
group of words that will be easy to
remember.
Example: I am in grade three.
Write down just the first letter of each word
in the phrase.
Example: I / A / I / G / T
Capitalize some of the letters. Example: I / a / i / g / T
Add one or two memorable numbers. Example: I / a / 3 / i / g / 2 / 6 / T
Memorize it. Repeat your new password in
your head so it sticks.
Therefore, you new password - Ia3ig26T
THINGS
YOU
OUGHT
TO
DO
FOR
BETTER
PROTECTION
SOFTWARE
● Your device – computer, laptop, tablet, or
smartphone – should be equipped with
reliable anti-virus software.
BROWSER SECURITY
● Most popular browsers have special settings
that allow blocking potentially harmful
resources.
DOWNLOADS
Always ask your parents or a trusted adult
before you download anything!
IT'S FUN TIME!
LET’S ENJOY A
LITTLE
Name four things about yourself that you should not share online with strangers.
True or false: If you wouldn’t say it to someone’s face, don’t say it on the computer
You just got an email from a stranger that says, “You’ve won!” One thing you
definitely shouldn’t do is:
a. show it to a parent b. open it to see what you’ve won c. delete it d. log off
True or false: It’s OK to send your picture to someone you met online, as long as
they sent you theirs first.
True or false: Online information is always trustworthy.
Which of the following passwords is the safest password?
a.) password b.) abc123 c.) Answ3RM3$1 d.) Fluffy01
Q&A SESSION
ANSWERS
1) My full name / My address / My phone number / The identity of my kin /
My plans
1) True, I wouldn’t want to hurt someone else and definately, would not like
someone to hurt me.
1) b. open it to see what you’ve won
1) False, I should never do so. I am not always aware of other’s intentions.
1) False; there is a lot of untrustworthy and incorrect on the Internet.
1) Option c.) Answ3RM3$1
ENCRYPTION - DECRYPTION
omecturp
asofterw
coed
akeybdro
etrenint
tcegyoholn
ntuarvsii
ailflwre
asr powder
Computer
Software
Code
Keyboard
Internet
Technology
Antivirus
Firewall
Passwords
A COOL WORD SEARCH!
THANK
YOU!
1 de 36

Recomendados

Cyber Security For Kids by Shounak Ray Chaudhuri por
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
6.8K vistas18 diapositivas
Cyber Security for 5th and 6th Graders por
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
4.3K vistas12 diapositivas
Cyber security for children por
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
5.3K vistas18 diapositivas
Cyber Safety por
Cyber SafetyCyber Safety
Cyber SafetyNiti Arora
9.7K vistas25 diapositivas
Cyber safety por
Cyber safetyCyber safety
Cyber safetysmartins7
669 vistas7 diapositivas
Cyber safety por
Cyber safetyCyber safety
Cyber safetyYash Jain
923 vistas25 diapositivas

Más contenido relacionado

La actualidad más candente

cyber crime por
cyber crimecyber crime
cyber crimeSaba MuShtaq
2.3K vistas12 diapositivas
Internet Safety Presentation por
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
18.9K vistas26 diapositivas
Cyber Safety por
Cyber SafetyCyber Safety
Cyber SafetyAayushi Singh
69.9K vistas24 diapositivas
Internet Safety por
Internet SafetyInternet Safety
Internet Safetyharriscountypubliclibrary
1.5K vistas32 diapositivas
Cyber safety por
Cyber safetyCyber safety
Cyber safetyBunmi Omololu-Afilaka
10.7K vistas30 diapositivas
Internet Safety por
Internet SafetyInternet Safety
Internet SafetyNaheelah Irving
1.5K vistas25 diapositivas

La actualidad más candente(20)

Internet Safety Presentation por Pamela Moeai
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai18.9K vistas
General Awareness On Cyber Security por Dominic Rajesh
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh12.2K vistas
Internet safety ppt por mcmullan
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan8.3K vistas
Cyber crime and security por Sharath Raj
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj2.5K vistas
cyber security presentation.pptx por kishore golla
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla11.7K vistas
Cyber security for kids por Chris Burrows
Cyber security for kidsCyber security for kids
Cyber security for kids
Chris Burrows816 vistas
presentation on social media por Aman Jain
presentation on social mediapresentation on social media
presentation on social media
Aman Jain909 vistas

Similar a Internet / Cyber Security

Digital literacy por
Digital literacyDigital literacy
Digital literacyAmanda lee
276 vistas16 diapositivas
Parent GuideBook Internet Safety (1) por
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
68 vistas2 diapositivas
Dangers Of Internet - Parents Beware por
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
2.3K vistas72 diapositivas
Lesson 2 rules of netiquette por
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
600 vistas40 diapositivas
Internet Safety Gwen por
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwenguest3d3a205b
78 vistas6 diapositivas
Internet Safety Gwen por
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwenguest3d3a205b
295 vistas6 diapositivas

Similar a Internet / Cyber Security(20)

Digital literacy por Amanda lee
Digital literacyDigital literacy
Digital literacy
Amanda lee276 vistas
Parent GuideBook Internet Safety (1) por Matt Forney
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney68 vistas
Dangers Of Internet - Parents Beware por Nurizcka
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
Nurizcka2.3K vistas
How to stay safe online.docx por Nikki Neko
How to stay safe online.docxHow to stay safe online.docx
How to stay safe online.docx
Nikki Neko16 vistas
Empowerment Technologies - Module 2 por Jesus Rances
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances15.2K vistas
Using the Internet Safely por Joanne Hewitt
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
Joanne Hewitt267 vistas
Kidsmart Seminar por tholman77
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77642 vistas
Girl Scouts Online Safety Training por Sarah Granger
Girl Scouts Online Safety TrainingGirl Scouts Online Safety Training
Girl Scouts Online Safety Training
Sarah Granger428 vistas
Internet Safety for Your Child por cpitchford
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford1.8K vistas
East Lothian June Internet Safety Talks Slideshare por Ollie Bray
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray668 vistas
Digital Citizenship por takahe2
Digital CitizenshipDigital Citizenship
Digital Citizenship
takahe2278 vistas
Hannah dc keynote por takahe2
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
takahe271 vistas
Digital Citizenship por takahe2
Digital Citizenship Digital Citizenship
Digital Citizenship
takahe295 vistas

Último

The Research Portal of Catalonia: Growing more (information) & more (services) por
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
73 vistas25 diapositivas
Unit 1_Lecture 2_Physical Design of IoT.pdf por
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdfStephenTec
11 vistas36 diapositivas
Info Session November 2023.pdf por
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdfAleksandraKoprivica4
10 vistas15 diapositivas
Voice Logger - Telephony Integration Solution at Aegis por
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at AegisNirmal Sharma
17 vistas1 diapositiva
6g - REPORT.pdf por
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdfLiveplex
9 vistas23 diapositivas
Attacking IoT Devices from a Web Perspective - Linux Day por
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 vistas68 diapositivas

Último(20)

Unit 1_Lecture 2_Physical Design of IoT.pdf por StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec11 vistas
Voice Logger - Telephony Integration Solution at Aegis por Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma17 vistas
6g - REPORT.pdf por Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex9 vistas
Attacking IoT Devices from a Web Perspective - Linux Day por Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 vistas
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2216 vistas
Web Dev - 1 PPT.pdf por gdsczhcet
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet55 vistas
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! por sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 vistas
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 vistas
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi120 vistas
DALI Basics Course 2023 por Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg14 vistas
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
HTTP headers that make your website go faster - devs.gent November 2023 por Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn19 vistas
Spesifikasi Lengkap ASUS Vivobook Go 14 por Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang35 vistas
The details of description: Techniques, tips, and tangents on alternative tex... por BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada121 vistas
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker26 vistas
Report 2030 Digital Decade por Massimo Talia
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
Massimo Talia14 vistas

Internet / Cyber Security

  • 2. YOUR TEACHER SRIJAN MUKHOPADHYA Y - Hey there! I am extremely happy to be here with you guys today. - I look forward to an amazing session with all of you! - Let’s have a great time!
  • 3. TOPICS OF DISCUSSION WHAT IS CYBERSECURITY? FACTS ABOUT CYBERSECURITY CYBER SAFETY AND LIFE ON THE INTERNET IT’S FUN TIME! WHAT IS CYBERCRIME? A LITTLE HISTORY ON THE CYBER WORLD
  • 5. Cybersecurity is when someone protects networks, electronic devices and data from falling into wrong hands. WHAT IS CYBERSECURITY? It is also the practice of ensuring safety, integrity, and security of one’s information over the cyberspace. WHAT IS CYBERSPACE? Cyberspace is anything that has to do with the Internet. For example: We use the Internet to communicate and stay connected to our friends and family. We play video games, download music, and watch TV shows and movies after homework is done. Grownups use it do things like banking, shopping, and other important everyday activities online as well.
  • 6. WHAT IS CYBERCRIME? Cybercrime is criminal activities carried out by means of computers or the internet. The former descriptions were "computer crime" or "crime by computer". The Internet brought other new terms, like "digital", "electronic", "virtual" , "IT", "high-tech" and “technology-enabled" crime.
  • 7. SOME COMMON ONLINE ISSUES WE FACE TODAY Cyber Predators They are people who search online for others in order to use, control, or harm them in some way. Identity Theft It happens to be an illegal and wrong method, in which criminals collect and use other people’s private data; commonly for financial gains. Cyber Bullying It is the electronic posting of mean- spirited messages about a person, often done anonymously.
  • 8. Are the actions of this little girl safe? Should she have done something different? Do you guys want to know how to be safe?
  • 9. MEET ALIA She is a school going girl just like the rest of you and loves to play games and watching cartoons on the internet. She will help you understand the concept of Internet.
  • 10. The Internet is like a busy road with lots of traffic in all directions. This ‘traffic’ is called Data. The games, videos, cartoons, movies, emails etc. that you all love to see just like Alia,travels over the Internet like data. While the Internet does seems spectacular on the outside, it has many unseen insides. One must use it very carefully to stay safe! Everyday Alia goes to school and enjoys the computer classes, just like all other kids. She has learned that the computer had something very magical inside it called the Internet. It is the same thing she sees on mobile phones and tablets. The Internet lets you do a lot of things. It even lets you make friends online. It can get infected with viruses which can harm your computer or electronic device. So one has to be very, very careful. Alia will now teach you how to stay safe, and use the Internet to enjoy it.
  • 11. Before you use the Internet, always ask an adult if the computer has a firewall and antivirus. Together, they both protect your computer from many kinds of viruses that attack our computer and steal our data. We all like to chat with our friends and keep up with them, don’t we? We can do so easily via email. If we are using a public network or a computer, we must always log out once we are done. If it is also very important to know that we must never click on a lik or an ad in our email or on the Internet. Always ask an adult before doing so. To help with your regular studies that Internet and is an amazing resource. Before you sign up for a website, ask your parents for help and supervision. In matters such as these, they know best. You may find free Wifi in public spaces like shops, railway stations, shopping malls, metros etc. to surf the Internet and use it. Avoid using it as they can be harmful. Never connect to them, as they are not safe! CONGRATULATIONS! YOU ARE NOW CYBER / INTERNET SAFE!
  • 12. A LITTLE HISTORY ON THE CYBER WORLD FACTS ABOUT INTERNET SECURITY
  • 13. The first spam email took place in 1978 when it was sent over the Arpanet. The first recorded cyber crime was recorded in the year 1820. The first virus was installed on an Apple Computer in 1982. YOUR DOSE OF HISTORY ON CYBERCRIME
  • 14. 95% cyber breaches are due to human error. There are around 6 million cybersecurity jobs. 43% of cyber attacks target businesses. A cyberattack is attempted every 39 seconds. SOME INTERESTING FACTS
  • 15. CYBER SAFETY AND LIFE ON THE INTERNET
  • 16. UNDERSTAND LIFE ON THE INTERNET The Internet has turned our existence upside down. It has revolutionized communications, to the extent that it is now our preferred medium of everyday communication. In almost everything we do, we use the Internet. Ordering a pizza, buying a television, sharing a moment with a friend, sending a picture over instant messaging. The Internet has so much control over almost every aspect of human life, not only our private lives but, also various public services. There are unforeseen consequences to sharing our private and public information and the results could damage our presence on the internet.
  • 17. Private Information Information about you that can be used to identify you because it's unique to you (e.g., your full name or your address) Personal / Public Information Information about you that cannot be used to identify you because it is also true for many other people (e.g., your hair color or the city you live in)
  • 20. YAPPY - THE DON’T OF THE CYBERWORLD Y You don't give Your full name out. P Don’t hand over your Phone Number A You don't give out your Address P Do not share your Password Y You don't tell others about Your
  • 21. PRINCIPLES OF LIFE ON THE INTERNET Do not install apps without permission. 01 When it comes to passwords, sharing is not caring. Avoid using names in your passwords for better security. Only add people you fully know of on social media. Never upload pictures or posts regarding others, without their permission. 03 02 04
  • 22. WHOA! Let’s have a chat on security now...
  • 26. GRASP THE CONCEPT OF PASSWORD SECURITY WHAT IS A PASSWORD? A secret string of letters, symbols, and numbers that you can use to restrict people, who can access something digital. WHY DO I NEED A PASSWORD AT ALL? Passwords provide the first line of defense against unauthorized access. HOW OFTEN SHOULD I CHANGE MY PASSWORD? Ideally, every 6 months. WHAT SORT OF A PASSWORD SHOULD I HAVE? Preferably, strong. WHY SHOULD I HAVE A STRONG PASSWORD? It makes it very hard for bad men and criminals to access our data and hurt us. WHAT ARE THE DO’s AND DON'Ts OF A PASSWORD? Let’s learn about it further!
  • 28. DO’s AND DON’Ts OF PASSWORD MAKING Never disclose your usernames and passwords to strangers. Do not use the ‘remember me’ options or save passwords on a public computer or network. Initially, consult with your parents before you create a password. Once you get the hang of it, you can do it on your own. Run regular virus scans on your devices; say every week or so. Never store your usernames and passwords on a paper or in an easily accessible place.
  • 29. LET’S DO AN ACTIVITY! Start with a phrase. Think of a quote or group of words that will be easy to remember. Example: I am in grade three. Write down just the first letter of each word in the phrase. Example: I / A / I / G / T Capitalize some of the letters. Example: I / a / i / g / T Add one or two memorable numbers. Example: I / a / 3 / i / g / 2 / 6 / T Memorize it. Repeat your new password in your head so it sticks. Therefore, you new password - Ia3ig26T
  • 30. THINGS YOU OUGHT TO DO FOR BETTER PROTECTION SOFTWARE ● Your device – computer, laptop, tablet, or smartphone – should be equipped with reliable anti-virus software. BROWSER SECURITY ● Most popular browsers have special settings that allow blocking potentially harmful resources. DOWNLOADS Always ask your parents or a trusted adult before you download anything!
  • 31. IT'S FUN TIME! LET’S ENJOY A LITTLE
  • 32. Name four things about yourself that you should not share online with strangers. True or false: If you wouldn’t say it to someone’s face, don’t say it on the computer You just got an email from a stranger that says, “You’ve won!” One thing you definitely shouldn’t do is: a. show it to a parent b. open it to see what you’ve won c. delete it d. log off True or false: It’s OK to send your picture to someone you met online, as long as they sent you theirs first. True or false: Online information is always trustworthy. Which of the following passwords is the safest password? a.) password b.) abc123 c.) Answ3RM3$1 d.) Fluffy01 Q&A SESSION
  • 33. ANSWERS 1) My full name / My address / My phone number / The identity of my kin / My plans 1) True, I wouldn’t want to hurt someone else and definately, would not like someone to hurt me. 1) b. open it to see what you’ve won 1) False, I should never do so. I am not always aware of other’s intentions. 1) False; there is a lot of untrustworthy and incorrect on the Internet. 1) Option c.) Answ3RM3$1
  • 34. ENCRYPTION - DECRYPTION omecturp asofterw coed akeybdro etrenint tcegyoholn ntuarvsii ailflwre asr powder Computer Software Code Keyboard Internet Technology Antivirus Firewall Passwords
  • 35. A COOL WORD SEARCH!