SlideShare une entreprise Scribd logo
1  sur  15
By Kristian
Examples of personal Information
 Your user name or








password
Your age
Your ID number or social
security number
Your email address
Your home address
Your phone number
what city you live in
What neighborhood you
live in

 You parents names
 Where your parents work
 Names or phone numbers






of
Family members and
friends
What school you go to
Your teachers, names
Credit card numbers
License plate numbers
Tips to identify spam Emails
 It sounds too good to be

 There are lots of

true
 It is advertising
something
 The email sounds
 Interesting but you
weren’ t expecting it.

misspelled words
 It sound really strange
Cuber crime
 A cyber crime is a crime that is committed with the

help of a computer or a communication device and a
network.
Malware
 Malware is a software program that harms your

computer. Adware, spyware, viruses Trojan horses and
worms are all types of malware.
Examples of Malware
 Adware A software program that causes

advertisements to appear on your computer.
 Trojan Horse A nasty program disguised as legitimate
software
 Spyware A software program that secretly tracks what
you do on the Internet and sometimes gets
information about you from your computer.
Malware Continued
 Virus A software program that can wipe out

information on your computer and create major
problems.
 Worm A destructive program that can get into

computers or networks and harm them by deleting,
modifying or sending out the data.
To protect your computer
 Install the most recent anti-spyware and anti-virus

software.
 Keep software up-to-date to stay protected.
 Check with a trusted adult
 A Firewall is a software program that protects your
computer by acting like a security guard and
monitoring and controlling internet traffic.s
Cyber Crime
 A cyber crime is a crime that is committed with the

help of a computer or a communication device and a
network.
Elvirus
 Distributing Malware
 Prevention
 Anti-Virus software, cold shoulder
Ms. Information
 Spreading Misinformation
 Prevention
 Reliable websites, cold shoulder
The Maaster Hacker-Nils
 Hacking and identity theft
 Prevention
 Protecting personal information,firewall
Jax, Cyber bully
 Cyberbullying
 Prevention
 Reporting to authorities, cold shoulder
Sparky,Script Kiddie
 Script kiddy hacking
 Prevention
 Reporting to authorities

Contenu connexe

Similaire à Kristian on cyber safety

Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
Catherine MacAllister
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
Megan Bell
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

Similaire à Kristian on cyber safety (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Pc security and_safety
Pc security and_safetyPc security and_safety
Pc security and_safety
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 

Plus de Pentucket Regional High School (12)

Copyright
CopyrightCopyright
Copyright
 
Search vs.research pptx
Search vs.research pptxSearch vs.research pptx
Search vs.research pptx
 
Zack on cyber safety
Zack on cyber  safetyZack on cyber  safety
Zack on cyber safety
 
Voa
VoaVoa
Voa
 
Albinism powerpoint[1]
Albinism powerpoint[1]Albinism powerpoint[1]
Albinism powerpoint[1]
 
Cystic fibrosis[1]
Cystic fibrosis[1]Cystic fibrosis[1]
Cystic fibrosis[1]
 
Marfan syndrome ppt.
Marfan syndrome ppt.Marfan syndrome ppt.
Marfan syndrome ppt.
 
Fuel efficiency hol presentation q2
Fuel efficiency hol presentation q2Fuel efficiency hol presentation q2
Fuel efficiency hol presentation q2
 
Music hol powerpoint q3
Music hol powerpoint q3Music hol powerpoint q3
Music hol powerpoint q3
 
Loans hol powerpoint q1
Loans hol powerpoint q1Loans hol powerpoint q1
Loans hol powerpoint q1
 
Amandacook8stagesofgenocide
Amandacook8stagesofgenocideAmandacook8stagesofgenocide
Amandacook8stagesofgenocide
 
Ashley cook 8 stages of genocide
Ashley cook 8 stages of genocideAshley cook 8 stages of genocide
Ashley cook 8 stages of genocide
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Kristian on cyber safety

  • 2.
  • 3. Examples of personal Information  Your user name or        password Your age Your ID number or social security number Your email address Your home address Your phone number what city you live in What neighborhood you live in  You parents names  Where your parents work  Names or phone numbers      of Family members and friends What school you go to Your teachers, names Credit card numbers License plate numbers
  • 4. Tips to identify spam Emails  It sounds too good to be  There are lots of true  It is advertising something  The email sounds  Interesting but you weren’ t expecting it. misspelled words  It sound really strange
  • 5. Cuber crime  A cyber crime is a crime that is committed with the help of a computer or a communication device and a network.
  • 6. Malware  Malware is a software program that harms your computer. Adware, spyware, viruses Trojan horses and worms are all types of malware.
  • 7. Examples of Malware  Adware A software program that causes advertisements to appear on your computer.  Trojan Horse A nasty program disguised as legitimate software  Spyware A software program that secretly tracks what you do on the Internet and sometimes gets information about you from your computer.
  • 8. Malware Continued  Virus A software program that can wipe out information on your computer and create major problems.  Worm A destructive program that can get into computers or networks and harm them by deleting, modifying or sending out the data.
  • 9. To protect your computer  Install the most recent anti-spyware and anti-virus software.  Keep software up-to-date to stay protected.  Check with a trusted adult  A Firewall is a software program that protects your computer by acting like a security guard and monitoring and controlling internet traffic.s
  • 10. Cyber Crime  A cyber crime is a crime that is committed with the help of a computer or a communication device and a network.
  • 11. Elvirus  Distributing Malware  Prevention  Anti-Virus software, cold shoulder
  • 12. Ms. Information  Spreading Misinformation  Prevention  Reliable websites, cold shoulder
  • 13. The Maaster Hacker-Nils  Hacking and identity theft  Prevention  Protecting personal information,firewall
  • 14. Jax, Cyber bully  Cyberbullying  Prevention  Reporting to authorities, cold shoulder
  • 15. Sparky,Script Kiddie  Script kiddy hacking  Prevention  Reporting to authorities