
Protecting Your Data in the Online World
Presentation
•
Computers
•
12th Grade
•
Medium
Desrine Thomas
Used 12+ times
FREE Resource
12 Slides • 6 Questions
1
Protecting Your Data Online
Learn how to safeguard your data in the digital world
2
Objectives
Define 3 types of threats to your computer.
Compare two types of viruses.
Discuss strategies to mitigate computer threats.
3
Multiple Choice
Which of the following is a type of threat to unattended computers?
Opportunist Threats
Malware
Phishing
Accidental Damage
4
Threats to Your Data
Types of Threats: Opportunist Threats, Malware, Phishing, Computer Virus, Accidental Damage, Hackers
Opportunist Threats: People finding unattended computers and accessing or damaging information
Computer Viruses: Self-replicating programs that make changes to infected systems
Malware: Examples include Worms, Trojan Horses, and Spyware
5
Self-Replicating Threats
Trivia: Did you know that self-replicating threats are also known as computer viruses? These malicious programs can make changes to infected systems and spread to other devices. Protect yourself by staying vigilant and using reliable antivirus software. Stay safe online!
6
Threats to Your Data
Trojan: a malicious program that pretends to be benign but does unexpected actions
Virus: a code that copies itself and corrupts the system or destroys data
7
Multiple Choice
Which terms refers to Unauthorised access or manipulation of computer systems, networks, or accounts, often with the intent of extracting sensitive information, including social media and email passwords.
Trojan
Virus
Phishing
Hacking
8
Threats to Your Data
Hacking - including of social media and email passwords:
Unauthorised access or manipulation of computer systems, networks, or accounts, often with the intent of extracting sensitive information, including social media and email passwords.
Phishing - bogus emails asking for security information and personal details:
A type of cyber attack where attackers use deceptive emails or messages to trick individuals into divulging sensitive information, such as usernames, passwords, or financial details. by monitoring open ports and using specialist software
9
Multiple Choice
What is defined as a process of attempts to gain access to passwords and financial details through deceptive emails or websites
Opportunist Threats
Malware
Phishing
Computer Virus
10
Threats to Your Data
Malicious software – including ransomware through which criminals hijack files and hold them to ransom:
Software designed to harm or exploit computer systems, often including ransomware, a type of malware that encrypts files on a victim's system, demanding payment for their release.
11
Multiple Choice
Software designed to harm or exploit computer systems, often including ransomware.
Trojan
Virus
Malicious software
Hacking
12
Anna Virus:
Trivia: The Anna virus is known for tricking users into opening malicious emails. It is a type of malware that spreads through deceptive email attachments or links. Once opened, it can cause significant damage to computer systems and compromise sensitive data. Stay vigilant and avoid opening suspicious emails to protect yourself from such threats.
13
Computer Viruses
Did you know? Computer viruses are malicious software programs that can replicate themselves and spread from one computer to another. They can cause damage to files, steal personal information, and even render a computer unusable. Protect your computer by regularly updating your antivirus software and being cautious of suspicious emails or downloads.
14
Open Ended
What are the differences between a Trojan Horse and Ransomware?
15
Protecting Your Data
Protect Yourself and Your Devices
Introduction: In today's interconnected world, where online activities have become integral to daily life, safeguarding personal information is paramount. The prevalence of internet-connected devices exposes individuals to identity theft and fraud. This risk extends to potential exploitation by spammers and the deployment of malicious software, underscoring the need for robust security measures.
Keep Your Device Secure: Ensure the security of your devices by regularly downloading recommended updates, including those for essential software such as internet browsers. Employ antivirus software, antispyware tools, and firewalls to fortify your defenses against potential attacks.
Stay Up-to-Date: Regularly update your system, browser, and critical applications to eliminate software vulnerabilities that hackers might exploit. Leverage automatic updates where available, and stay vigilant, especially in high-speed internet environments.
16
Protecting Your Data
Antivirus Software: Deploy and maintain updated antivirus software to protect against viruses that could compromise data integrity and device performance. Regularly scan for viruses to ensure comprehensive protection.
Antispyware Software: Guard against spyware, which monitors online activities without user consent. Activate spyware protection features in antivirus software or use standalone antispyware programs, keeping them updated to thwart potential threats.
17
Protecting Your Data
Firewalls: Implement firewalls, either built-in or external, to block unauthorized access and protect against random calls from hackers. Proper setup and regular updates are essential for firewall effectiveness, especially for high-speed internet connections.
Use Strong Protection: Enhance personal information security through the use of complex passwords and robust authentication methods. Craft strong, unique passwords for each online account, and explore stronger authentication options like fingerprint recognition or one-time codes.
Protect Your Private Information: Exercise caution while navigating online activities such as checking emails, visiting websites, or shopping. Be wary of phishing attacks and prioritize privacy when sharing information on social media platforms.
18
Open Ended
In groups allocated you are to assign a role to each group member, and divide task evenly in order to create a PowerPoint presentation on a Discussion of 4 Strategies to Mitigate Computer Threats.
Protecting Your Data Online
Learn how to safeguard your data in the digital world
Show answer
Auto Play
Slide 1 / 18
SLIDE
Similar Resources on Wayground
11 questions
Reading tips
Presentation
•
12th Grade
15 questions
digestive system
Presentation
•
12th Grade
13 questions
Exploring the Cloud: Unleashing the Power of Cloud Computing
Presentation
•
12th Grade
13 questions
Data Transmission: From Simplex to Full Duplex
Presentation
•
12th Grade
13 questions
Unlocking the Power of Online Documents
Presentation
•
12th Grade
13 questions
Satire
Presentation
•
12th Grade
12 questions
Geometry - Lesson Area of Circle Sector and Length of Arc
Presentation
•
12th Grade
15 questions
APPLICATION LETTER
Presentation
•
12th Grade
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade