
Lesson 5 - How Can You Be Safe & Secure Online
Presentation
•
Computers
•
6th - 8th Grade
•
Practice Problem
•
Easy
William Jernigan
Used 55+ times
FREE Resource
27 Slides • 31 Questions
1
​How Can You Be Safe and Secure Online?
2
​There are many ways to keep yourself safe on the Internet. The most important thing to do is be knowledgeable. The more you know about staying safe online the better you can achieve it. One important way to be safe online is to have secure passwords. There are many other things you can do as well.
Here are 5 tips to stay safe and secure online.
Always use privacy settings
Think before you post
Never post mean messages or embarrassing photos
Turn off your location
Don't spend all day online
​Internet Safety Tips
3
​Along with these tips staying safe online involves using strong passwords. Here are some key points to remember when creating passwords
Don't use simple passwords! Simple passwords only have lower case letters and numbers. They are easier to remember but might also be easier for someone else to guess.
Use strong passwords. Strong passwords have mixed upper and lower case letters, a special character (like @, S, ! and so on) plus some numbers.
They are best to use for important things like email accounts.
There are some sites on the Internet that can generate passwords for you.
​Always Use Strong Passwords
4
5
​Today, cybercrime causes huge problems for society, personally, financially, and even in national security. In the last few years, hundreds of millions of credit card numbers have been stolen, tens of millions of social security numbers and healthcare records were compromised and aerial drones have been hijacked. This is all done by taking advantage of unintentional decisions made by people using software. People committing these crimes don't fit a single profile or motivation. It could be anyone. Today, countries have a well-armed cyber arm.
​Cybersecurity & Crime
6
​Now let's take a look at how viruses operate. In humans, viruses work by infecting cells, injecting their genetic material, and using those cells to replicate.
They can make people really sick and then spread to other people. A computer virus works a bit similarly. A virus is a program that gets installed, usually unintentionally, and harms a user and their computer. Once a virus is on your computer, it can steal or delete any of your files, control other programs, or even allow someone else to remotely control your computer. Using computer viruses, hackers can take over millions of computers worldwide, and then use them as a digital army, otherwise known as a botnet, to attack and take down Websites.
​Viruses
7
​Another trick used by cybercriminals is to send large amounts of spam email in an attempt to get people into sharing sensitive personal information. This is called a phishing scam. A phishing scam is when you get an email asking you to log into your account, then clicking on the email takes you to a fake Website. If you log in, you've been tricked into giving your password away. Hackers can then use your login credentials to access your real accounts to steal information or maybe even to steal your money.
​Pfishing
8
​Four Steps to Protect Yourself from Phishing
Protect your computer by using security software.
Protect your mobile phone by setting software to update automatically.
Protect your accounts by using multi-factor authentication. Some accounts offer extra security by requiring (two or more credentials to log in).
Protect your data by backing it up.
9
10
​A data breach happens when a cybercriminal successfully gets into a data source and takes sensitive, confidential information. This can be done physically by accessing a computer or network to steal the files or by bypassing network security remotely. Often companies are targeted. Many data breaches have occurred in the last five years, you often hear about them on the news.
​Data Breaches
11
​Protect Yourself Online
​You may think when a computer system gets hacked, the problem was the security design or the software. Most of the time a system gets hacked, it's not because of a security error but, because of a mistake made by a person. There are steps we can all take to protect ourselves. Often, your actions not only impact the security of your own data and computer, but the security of everyone at your school, workplace, and home. The more knowledge you have the better decisions you can make.
12
​Steps to avoid getting hacked:
Use strong passwords
Check for authentic Web addresses
Install system security updates often
Don't install software you don't trust
Being a good digital citizen involves understanding safety and security complete the online matching activity to be sure you have the knowledge you will need to stay safe online.
13
14
15
16
17
18
19
20
21
22
23
24
25
Match
Phishing
Multi-Factor Authentication
Hacker
Virus
Weak Password
Scammers use to collect personal info from unsuspecting users. The false emails often look real.
Requires 2 or more credentials to log in.
A person who uses computers to gain unauthorized access to data
Malicious software loaded onto a user's computer without their knowledge - performs malicious acts
Example: 123abc
Scammers use to collect personal info from unsuspecting users. The false emails often look real.
Requires 2 or more credentials to log in.
A person who uses computers to gain unauthorized access to data
Malicious software loaded onto a user's computer without their knowledge - performs malicious acts
Example: 123abc
26
It is important to have information when downloading on the Internet. When you download music, videos or software you need to have the information to make a good decision. Downloading can have ethical and legal issues. Consider what you learned about copyrights and fair use, it is important to know what the status is of something before downloading. For example consider- When a song is produced and marketed, everyone involved in the process has monetary gains from the sale of that product. That product is protected by copyright law so that it cannot be copied, reproduced or resold without permission. If you did not pay for a song, movie or other media file that has a copyright, then downloading that file is a crime. Also distributing a copyrighted media file, whether via electronic or non-electronic methods, without the express permission of the copyright holder is also illegal.
​Protect Yourself During Downloading
27
​In this section you will learn about one element of Digital Citizenship, digital security.
Digital security refers to electronic precautions to guarantee safety and protect your privacy. These electronic precautions protect your computer from viruses, worms and other bots.
​Digital Security
​Ask yourself:
Why is it important for everyone to have digital security knowledge?
How does it affect them if they don't?
Are there any Cyber security jobs you are interested in?
28
29
Multiple Choice
You receive an email from a Website telling you that you need to log in to your account and change your password. What kind of scam should you be concerned about?
Trolling
DDOS attack
Phishing scam
Malware
30
Multiple Choice
One of the ways people share media is by pirating, or downloading and sharing music and other types of copyright-protected media for free online. What kind of violation is this?
There is no violation
Legal
Ethical
Civil
31
Multiple Choice
What is a data breach?
Someone impersonates you on the internet
A computer is locked down and held for ransom
Another word for a DDoS attack
An incident that exposes confidential, private information.
32
Multiple Choice
Because of how severe cybercrimes can be, what have some governments created in order to protect themselves and their citizens?
Internet surveillance systems
Cyber armies
Citizen action committees
Social media accounts
33
Multiple Choice
Mary uses simple passwords on shopping Websites. If somebody got into her account, what information would they most likely steal?
Daily routine
Credit card information
Shopping history
Address
34
Multiple Choice
Matthew wants to install a program to keep his new laptop and the information on it safe. What kind of software should he install?
Antivirus software
Multiple browsers
Cloud storage
VPN
35
Multiple Choice
What should be included in a password to make it very strong?
Lowercase letters, uppercase letters, and numbers
Lowercase letters and numbers
Uppercase letters and numbers
Lowercase letters, uppercase letters, numbers, and special characters.
36
Multiple Choice
What is multi-factor authentication?
A pop-up warns someone about the content of a Website
A lolgin system that uses two or more credentials, such as a password and a security question.
An anonymous, encrytpted browsing session that allows secure and private browsing.
Hoving 2 accounts on one Website using different passwords.
37
Multiple Choice
Vanessa is concerned about her phone's security. What is an easy way for her to keep her data safe?
Use a protective film over the screen
Automatically updating the phone's software
Buying an antivirus app for her phone
Only access her email on a computer
38
Multiple Choice
A hacker uses spam emails to infect millions of computers with malware so they can be used to overwhelm a Website's servers. What is this "digital army" of computers called?
Botnet
Vlog
Virus
Blockchain
39
Multiple Choice
Protecting your personal information online is called:
Ethical hacking
Cyber safety
Risk mitigation
Cyber identity
40
Multiple Choice
If someone online asks to meet you in person, you should:
GIve them your address
invite a friend to go with you
Tell a parent or guardian
Schedule a time to meet them.
41
Multiple Choice
Daveed is always looking for his phone, because he doesn't remember where he put it down. Why is this a security risk?
Someone could gain access to his personal information
Someone could use up all of his data plan
A classmate could take pictures and send them in texts to others
His parents always tell him the phone is expensive to replace
42
Multiple Choice
The electronic precautions that encourage safety are known as:
Digital Fluency
Digital Communications and Collaboration
Digital Security and Privacy
Digital Literacy
43
Multiple Choice
Matthew wants to install a program to keep his new laptop and the information on it safe. What kind of software should he install?
Mulltiple browsers
Cloud storage
VPN
Antivirus software
44
Multiple Choice
You are ordering a pair of shoes from a popular online retail website. Which piece of data should not be entered to process the order?
Phone number
Shipping address
Social Security Number
Email address
45
Multiple Choice
Your bank account numbers and Social Security Number would be classified as what type of risk when talking about online identity theft?
Medium risk
High risk
No risk
Low risk
46
Multiple Choice
Cyber tricks, scams, and phishing can ask you for:
Reporting information
Factual evidence
Personal information
Advice for a blog
47
Multiple Choice
Mary allows her social media apps to access her phone. This is a security risk because additional private and personal information can be obtained by?
A neighbor
A hacker
A parent or guardian
A contact on your phone
48
Multiple Choice
What is the best way to protect the information on your mobile device especially if it gets lost or stolen?
Turn off the phone locator
Give the phone password to one friend only
Keep the phone locked when not in use
Keep the phone locked only at school
49
Multiple Choice
A data breach is when confidential data is accessed without:
Authorization
Manners
Discussion
Penalty
50
Multiple Choice
You're in a chat room about Irish soccer teams. A person there asks you where you live.
How much information should you give them?
Your city and state
Your GPS coordinates
State and country only
Your street address, including city
51
Multiple Choice
Who is at risk for online identity theft?
Everyone
Anyone over the age of 18
Anyone who has a bank account
Anyone under the age of 18
52
Multiple Choice
What is a data breach?
Someone impersonates you on the internet
A computer is locked down and held for ransom
Another word for a DDoS attack
An incident that exposes confidential, private information
53
Multiple Choice
You have come up with a creative password that is an alternative spelling of a name that is familiar to you. It includes letters, numbers and special characters, and would be very hard for anyone else to guess. Which account should you use this password for?
Bank account
Social media accounts
Online courseware system
One account only
54
Multiple Choice
Most online content, including music, movies, books and images, are:
Useable
Findable
Copyrighted
Free
55
Multiple Choice
Jasmine has a spreadsheet of all her passwords. She create an image she wants to keep the image in a place where she can easily access it. Her parents forbid her from posting it online, even though it would be convenient. Why?
Because passwords must be changed often
Because it does not include the usernames for the accounts
It is not safe to post images of sensitive information
You can't tag your friends because they are not in the image.
56
Multiple Choice
Of the following, what activity is safe to post on social media?
Your phone number
Future vacation plans
Scores from a recent basketball game you played
Birthday party pictures
57
Multiple Choice
You receive an email from a Website telling you that you need to log in to your account and change your password. What kind of scam should you be concerned about?
Malware
Phishing scam
DDOS attack
Trolling
58
Multiple Choice
When a song is produced and marketed, everyone involved has monetary gains from the sale of that product. What kind of law protects the product so that it cannot be copied, reproduced or resold without permission?
Copyright
Trademark
Privacy
Creative Commons
​How Can You Be Safe and Secure Online?
Show answer
Auto Play
Slide 1 / 58
SLIDE
Similar Resources on Wayground
51 questions
KS3 E-Safety 2: Respectful Communication
Lesson
•
7th Grade
51 questions
Catastrophic Events
Lesson
•
7th Grade
55 questions
Poetry Unit Introduction
Lesson
•
7th Grade
53 questions
M NM MD Graphic Organizer
Lesson
•
6th - 8th Grade
54 questions
PULSE 2 UNIT 1 : GRAMMAR
Lesson
•
6th - 8th Grade
53 questions
The immune system and more
Lesson
•
6th - 8th Grade
49 questions
Electricity and Magnetism
Lesson
•
6th - 8th Grade
50 questions
Recipe Math
Lesson
•
7th - 8th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade