Search Header Logo
Lesson 5 - How Can You Be Safe & Secure Online

Lesson 5 - How Can You Be Safe & Secure Online

Assessment

Presentation

•

Computers

•

6th - 8th Grade

•

Practice Problem

•

Easy

Created by

William Jernigan

Used 55+ times

FREE Resource

27 Slides • 31 Questions

1

​How Can You Be Safe and Secure Online?

media

2

​There are many ways to keep yourself safe on the Internet. The most important thing to do is be knowledgeable. The more you know about staying safe online the better you can achieve it. One important way to be safe online is to have secure passwords. There are many other things you can do as well.

Here are 5 tips to stay safe and secure online.

  1. Always use privacy settings

  2. Think before you post

  3. Never post mean messages or embarrassing photos

  4. Turn off your location

  5. Don't spend all day online

​Internet Safety Tips

3

​Along with these tips staying safe online involves using strong passwords. Here are some key points to remember when creating passwords

  • Don't use simple passwords! Simple passwords only have lower case letters and numbers. They are easier to remember but might also be easier for someone else to guess.

  • Use strong passwords. Strong passwords have mixed upper and lower case letters, a special character (like @, S, ! and so on) plus some numbers.
    They are best to use for important things like email accounts.

There are some sites on the Internet that can generate passwords for you.

​Always Use Strong Passwords

media

4

5

​Today, cybercrime causes huge problems for society, personally, financially, and even in national security. In the last few years, hundreds of millions of credit card numbers have been stolen, tens of millions of social security numbers and healthcare records were compromised and aerial drones have been hijacked. This is all done by taking advantage of unintentional decisions made by people using software. People committing these crimes don't fit a single profile or motivation. It could be anyone. Today, countries have a well-armed cyber arm.

​Cybersecurity & Crime

media

6

​Now let's take a look at how viruses operate. In humans, viruses work by infecting cells, injecting their genetic material, and using those cells to replicate.

They can make people really sick and then spread to other people. A computer virus works a bit similarly. A virus is a program that gets installed, usually unintentionally, and harms a user and their computer. Once a virus is on your computer, it can steal or delete any of your files, control other programs, or even allow someone else to remotely control your computer. Using computer viruses, hackers can take over millions of computers worldwide, and then use them as a digital army, otherwise known as a botnet, to attack and take down Websites.

​Viruses

media

7

​Another trick used by cybercriminals is to send large amounts of spam email in an attempt to get people into sharing sensitive personal information. This is called a phishing scam. A phishing scam is when you get an email asking you to log into your account, then clicking on the email takes you to a fake Website. If you log in, you've been tricked into giving your password away. Hackers can then use your login credentials to access your real accounts to steal information or maybe even to steal your money.

​Pfishing

8

​Four Steps to Protect Yourself from Phishing

  1. Protect your computer by using security software.

  2. Protect your mobile phone by setting software to update automatically.

  3. Protect your accounts by using multi-factor authentication. Some accounts offer extra security by requiring (two or more credentials to log in).

  4. Protect your data by backing it up.

media

9

10

​A data breach happens when a cybercriminal successfully gets into a data source and takes sensitive, confidential information. This can be done physically by accessing a computer or network to steal the files or by bypassing network security remotely. Often companies are targeted. Many data breaches have occurred in the last five years, you often hear about them on the news.

​Data Breaches

11

​Protect Yourself Online

​You may think when a computer system gets hacked, the problem was the security design or the software. Most of the time a system gets hacked, it's not because of a security error but, because of a mistake made by a person. There are steps we can all take to protect ourselves. Often, your actions not only impact the security of your own data and computer, but the security of everyone at your school, workplace, and home. The more knowledge you have the better decisions you can make.

12

​Steps to avoid getting hacked:

  • Use strong passwords

  • Check for authentic Web addresses

  • Install system security updates often

  • Don't install software you don't trust

Being a good digital citizen involves understanding safety and security complete the online matching activity to be sure you have the knowledge you will need to stay safe online.

13

media

14

media

15

media

16

media

17

media

18

media

19

media

20

media

21

media

22

media

23

media

24

media

25

Match

Match the following

Phishing

Multi-Factor Authentication

Hacker

Virus

Weak Password

Scammers use to collect personal info from unsuspecting users. The false emails often look real.

Requires 2 or more credentials to log in.

A person who uses computers to gain unauthorized access to data

Malicious software loaded onto a user's computer without their knowledge - performs malicious acts

Example: 123abc

26

It is important to have information when downloading on the Internet. When you download music, videos or software you need to have the information to make a good decision. Downloading can have ethical and legal issues. Consider what you learned about copyrights and fair use, it is important to know what the status is of something before downloading. For example consider- When a song is produced and marketed, everyone involved in the process has monetary gains from the sale of that product. That product is protected by copyright law so that it cannot be copied, reproduced or resold without permission. If you did not pay for a song, movie or other media file that has a copyright, then downloading that file is a crime. Also distributing a copyrighted media file, whether via electronic or non-electronic methods, without the express permission of the copyright holder is also illegal.

​Protect Yourself During Downloading

27

​In this section you will learn about one element of Digital Citizenship, digital security.

Digital security refers to electronic precautions to guarantee safety and protect your privacy. These electronic precautions protect your computer from viruses, worms and other bots.

​Digital Security

​Ask yourself:

  • Why is it important for everyone to have digital security knowledge?

  • How does it affect them if they don't?

  • Are there any Cyber security jobs you are interested in?

28

29

Multiple Choice

You receive an email from a Website telling you that you need to log in to your account and change your password. What kind of scam should you be concerned about?

1

Trolling

2

DDOS attack

3

Phishing scam

4

Malware

30

Multiple Choice

One of the ways people share media is by pirating, or downloading and sharing music and other types of copyright-protected media for free online. What kind of violation is this?

1

There is no violation

2

Legal

3

Ethical

4

Civil

31

Multiple Choice

What is a data breach?

1

Someone impersonates you on the internet

2

A computer is locked down and held for ransom

3

Another word for a DDoS attack

4

An incident that exposes confidential, private information.

32

Multiple Choice

Because of how severe cybercrimes can be, what have some governments created in order to protect themselves and their citizens?

1

Internet surveillance systems

2

Cyber armies

3

Citizen action committees

4

Social media accounts

33

Multiple Choice

Mary uses simple passwords on shopping Websites. If somebody got into her account, what information would they most likely steal?

1

Daily routine

2

Credit card information

3

Shopping history

4

Address

34

Multiple Choice

Matthew wants to install a program to keep his new laptop and the information on it safe. What kind of software should he install?

1

Antivirus software

2

Multiple browsers

3

Cloud storage

4

VPN

35

Multiple Choice

What should be included in a password to make it very strong?

1

Lowercase letters, uppercase letters, and numbers

2

Lowercase letters and numbers

3

Uppercase letters and numbers

4

Lowercase letters, uppercase letters, numbers, and special characters.

36

Multiple Choice

What is multi-factor authentication?

1

A pop-up warns someone about the content of a Website

2

A lolgin system that uses two or more credentials, such as a password and a security question.

3

An anonymous, encrytpted browsing session that allows secure and private browsing.

4

Hoving 2 accounts on one Website using different passwords.

37

Multiple Choice

Vanessa is concerned about her phone's security. What is an easy way for her to keep her data safe?

1

Use a protective film over the screen

2

Automatically updating the phone's software

3

Buying an antivirus app for her phone

4

Only access her email on a computer

38

Multiple Choice

A hacker uses spam emails to infect millions of computers with malware so they can be used to overwhelm a Website's servers. What is this "digital army" of computers called?

1

Botnet

2

Vlog

3

Virus

4

Blockchain

39

Multiple Choice

Protecting your personal information online is called:

1

Ethical hacking

2

Cyber safety

3

Risk mitigation

4

Cyber identity

40

Multiple Choice

If someone online asks to meet you in person, you should:

1

GIve them your address

2

invite a friend to go with you

3

Tell a parent or guardian

4

Schedule a time to meet them.

41

Multiple Choice

Daveed is always looking for his phone, because he doesn't remember where he put it down. Why is this a security risk?

1

Someone could gain access to his personal information

2

Someone could use up all of his data plan

3

A classmate could take pictures and send them in texts to others

4

His parents always tell him the phone is expensive to replace

42

Multiple Choice

The electronic precautions that encourage safety are known as:

1

Digital Fluency

2

Digital Communications and Collaboration

3

Digital Security and Privacy

4

Digital Literacy

43

Multiple Choice

Matthew wants to install a program to keep his new laptop and the information on it safe. What kind of software should he install?

1

Mulltiple browsers

2

Cloud storage

3

VPN

4

Antivirus software

44

Multiple Choice

You are ordering a pair of shoes from a popular online retail website. Which piece of data should not be entered to process the order?

1

Phone number

2

Shipping address

3

Social Security Number

4

Email address

45

Multiple Choice

Your bank account numbers and Social Security Number would be classified as what type of risk when talking about online identity theft?

1

Medium risk

2

High risk

3

No risk

4

Low risk

46

Multiple Choice

Cyber tricks, scams, and phishing can ask you for:

1

Reporting information

2

Factual evidence

3

Personal information

4

Advice for a blog

47

Multiple Choice

Mary allows her social media apps to access her phone. This is a security risk because additional private and personal information can be obtained by?

1

A neighbor

2

A hacker

3

A parent or guardian

4

A contact on your phone

48

Multiple Choice

What is the best way to protect the information on your mobile device especially if it gets lost or stolen?

1

Turn off the phone locator

2

Give the phone password to one friend only

3

Keep the phone locked when not in use

4

Keep the phone locked only at school

49

Multiple Choice

A data breach is when confidential data is accessed without:

1

Authorization

2

Manners

3

Discussion

4

Penalty

50

Multiple Choice

You're in a chat room about Irish soccer teams. A person there asks you where you live.

How much information should you give them?

1

Your city and state

2

Your GPS coordinates

3

State and country only

4

Your street address, including city

51

Multiple Choice

Who is at risk for online identity theft?

1

Everyone

2

Anyone over the age of 18

3

Anyone who has a bank account

4

Anyone under the age of 18

52

Multiple Choice

What is a data breach?

1

Someone impersonates you on the internet

2

A computer is locked down and held for ransom

3

Another word for a DDoS attack

4

An incident that exposes confidential, private information

53

Multiple Choice

You have come up with a creative password that is an alternative spelling of a name that is familiar to you. It includes letters, numbers and special characters, and would be very hard for anyone else to guess. Which account should you use this password for?

1

Bank account

2

Social media accounts

3

Online courseware system

4

One account only

54

Multiple Choice

Most online content, including music, movies, books and images, are:

1

Useable

2

Findable

3

Copyrighted

4

Free

55

Multiple Choice

Jasmine has a spreadsheet of all her passwords. She create an image she wants to keep the image in a place where she can easily access it. Her parents forbid her from posting it online, even though it would be convenient. Why?

1

Because passwords must be changed often

2

Because it does not include the usernames for the accounts

3

It is not safe to post images of sensitive information

4

You can't tag your friends because they are not in the image.

56

Multiple Choice

Of the following, what activity is safe to post on social media?

1

Your phone number

2

Future vacation plans

3

Scores from a recent basketball game you played

4

Birthday party pictures

57

Multiple Choice

You receive an email from a Website telling you that you need to log in to your account and change your password. What kind of scam should you be concerned about?

1

Malware

2

Phishing scam

3

DDOS attack

4

Trolling

58

Multiple Choice

When a song is produced and marketed, everyone involved has monetary gains from the sale of that product. What kind of law protects the product so that it cannot be copied, reproduced or resold without permission?

1

Copyright

2

Trademark

3

Privacy

4

Creative Commons

​How Can You Be Safe and Secure Online?

media

Show answer

Auto Play

Slide 1 / 58

SLIDE