Search Header Logo
Cyber Safety

Cyber Safety

Assessment

Presentation

Computers

5th - 10th Grade

Practice Problem

Easy

Created by

Jonath Johnson

Used 171+ times

FREE Resource

10 Slides • 4 Questions

1

Cyber Safety


Slide image

2

Open Ended

Question image

Do you think you are well secured and safe on the internet?

3

Results


4

What is Cyber Safety

Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).

5

Threats to Information Technology

  • What is information technology?​

  • It is the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.​

  • In Information Security threats can be many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.​

  • Some of the most common types of software attacks are viruses, worms, trojan horses and bots​

6

Open Ended

What are the threats to Information Technology?

7

Viruses

  • In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.

  • Frequent pop-up windows​

    • Changes to your homepage​

    • Mass emails being sent from your email account​

    • Frequent crashes​

    • Unknown programs that start up when you turn on your computer

8

Multiple Choice

Can viruses transfer from one pc to another?

1

Yes

2

No

9

How to protect your PC against viruses?

There are many ways to protect your PC from viruses, but the most common one is to install an Anti-virus Software. This software defends the PC against many of the viruses and must be kept running at all times.

Slide image

10

Firewalls

Yes, Firewalls work too. They act as a filtration system for the data attempting to enter your computer or network. Firewalls scan packets for malicious code or attack vectors that have already been identified as established threats.

11

Ethics in Computing

Computer ethics are a set of moral standards that govern the use of computers.  It is society’s views about the use of computers, both hardware and software.  Privacy concerns, intellectual property rights and effects on the society are some of the common issues of computer ethics.​

Slide image

12

Plagiarism or Copyright infringements

  • Plagiarism is using someone else's work or ideas without giving proper credit. ​

  •  Plagiarism is an offense against the author; copyright violation is an offense against the copyright holder.​

  •  The Common Types of Plagiarism- Direct Plagiarism, Self Plagiarism, Mosaic Plagiarism, Accidental Plagiarism.​

13

Open Ended

What is Plagiarism and what are it's types?

14

Slide image

Cyber Safety


Slide image

Show answer

Auto Play

Slide 1 / 14

SLIDE