Search Header Logo
Protecting Your Data in the Online World

Protecting Your Data in the Online World

Assessment

Presentation

Computers

12th Grade

Medium

Created by

Desrine Thomas

Used 12+ times

FREE Resource

12 Slides • 6 Questions

1

Protecting Your Data Online

Learn how to safeguard your data in the digital world

media

2

Objectives

  • Define 3 types of threats to your computer.

  • Compare two types of viruses.

  • Discuss strategies to mitigate computer threats.

media

3

Multiple Choice

Question image

Which of the following is a type of threat to unattended computers?

1
  • Opportunist Threats

2

Malware

3

Phishing

4

Accidental Damage

4

Threats to Your Data

  • Types of Threats: Opportunist Threats, Malware, Phishing, Computer Virus, Accidental Damage, Hackers

  • Opportunist Threats: People finding unattended computers and accessing or damaging information

  • Computer Viruses: Self-replicating programs that make changes to infected systems

  • Malware: Examples include Worms, Trojan Horses, and Spyware

media

5

Self-Replicating Threats

Trivia: Did you know that self-replicating threats are also known as computer viruses? These malicious programs can make changes to infected systems and spread to other devices. Protect yourself by staying vigilant and using reliable antivirus software. Stay safe online!

media

6

Threats to Your Data

  • Trojan: a malicious program that pretends to be benign but does unexpected actions

  • Virus: a code that copies itself and corrupts the system or destroys data

media

7

Multiple Choice

Question image

Which terms refers to Unauthorised access or manipulation of computer systems, networks, or accounts, often with the intent of extracting sensitive information, including social media and email passwords.

1

Trojan

2

Virus

3

Phishing

4

Hacking

8

Threats to Your Data

  • Hacking - including of social media and email passwords:

    • Unauthorised access or manipulation of computer systems, networks, or accounts, often with the intent of extracting sensitive information, including social media and email passwords.

  • Phishing - bogus emails asking for security information and personal details:

    • A type of cyber attack where attackers use deceptive emails or messages to trick individuals into divulging sensitive information, such as usernames, passwords, or financial details. by monitoring open ports and using specialist software

9

Multiple Choice

Question image
  • What is defined as a process of attempts to gain access to passwords and financial details through deceptive emails or websites

1

Opportunist Threats

2

Malware

3

Phishing

4

Computer Virus

10

Threats to Your Data

  • Malicious software – including ransomware through which criminals hijack files and hold them to ransom:

    • Software designed to harm or exploit computer systems, often including ransomware, a type of malware that encrypts files on a victim's system, demanding payment for their release.

media

11

Multiple Choice

Question image

Software designed to harm or exploit computer systems, often including ransomware.

1

Trojan

2

Virus

3
  • Malicious software

4

Hacking

12

Anna Virus:

Trivia: The Anna virus is known for tricking users into opening malicious emails. It is a type of malware that spreads through deceptive email attachments or links. Once opened, it can cause significant damage to computer systems and compromise sensitive data. Stay vigilant and avoid opening suspicious emails to protect yourself from such threats.

media

13

Computer Viruses

Did you know? Computer viruses are malicious software programs that can replicate themselves and spread from one computer to another. They can cause damage to files, steal personal information, and even render a computer unusable. Protect your computer by regularly updating your antivirus software and being cautious of suspicious emails or downloads.

media

14

Open Ended

Question image
  • What are the differences between a Trojan Horse and Ransomware?

15

Protecting Your Data

Protect Yourself and Your Devices

Introduction: In today's interconnected world, where online activities have become integral to daily life, safeguarding personal information is paramount. The prevalence of internet-connected devices exposes individuals to identity theft and fraud. This risk extends to potential exploitation by spammers and the deployment of malicious software, underscoring the need for robust security measures.

Keep Your Device Secure: Ensure the security of your devices by regularly downloading recommended updates, including those for essential software such as internet browsers. Employ antivirus software, antispyware tools, and firewalls to fortify your defenses against potential attacks.

Stay Up-to-Date: Regularly update your system, browser, and critical applications to eliminate software vulnerabilities that hackers might exploit. Leverage automatic updates where available, and stay vigilant, especially in high-speed internet environments.

16

Protecting Your Data

Antivirus Software: Deploy and maintain updated antivirus software to protect against viruses that could compromise data integrity and device performance. Regularly scan for viruses to ensure comprehensive protection.

Antispyware Software: Guard against spyware, which monitors online activities without user consent. Activate spyware protection features in antivirus software or use standalone antispyware programs, keeping them updated to thwart potential threats.

media

17

Protecting Your Data

  • Firewalls: Implement firewalls, either built-in or external, to block unauthorized access and protect against random calls from hackers. Proper setup and regular updates are essential for firewall effectiveness, especially for high-speed internet connections.

    Use Strong Protection: Enhance personal information security through the use of complex passwords and robust authentication methods. Craft strong, unique passwords for each online account, and explore stronger authentication options like fingerprint recognition or one-time codes.

    Protect Your Private Information: Exercise caution while navigating online activities such as checking emails, visiting websites, or shopping. Be wary of phishing attacks and prioritize privacy when sharing information on social media platforms.

18

Open Ended

Question image
  • In groups allocated you are to assign a role to each group member, and divide task evenly in order to create a PowerPoint presentation on a Discussion of 4 Strategies to Mitigate Computer Threats.

Protecting Your Data Online

Learn how to safeguard your data in the digital world

media

Show answer

Auto Play

Slide 1 / 18

SLIDE