Search Header Logo
Protecting Personal Data Online

Protecting Personal Data Online

Assessment

Presentation

Computers

7th Grade

Practice Problem

Easy

Created by

E Leigh

Used 15+ times

FREE Resource

19 Slides • 5 Questions

1

Protecting personal data online

other dangers on the internet

In this lesson, we will explore some other dangers we will come across on the Internet.

These are dangers towards our person (including our identity), our devices (like our computers, tablets, phones, etc)

2

Learning Intentions

  • Explore risks to personal data through threats to our devices

  • Learn about the different types of threats to our devices

  • Discover how to protect our devices from these threats

Success Criteria

  • Answer more of the questions on the Google Form, Protecting Your Data correctly the second time

  • Able to answer the plenary questions at the end either, "I definitely understand", or "I could explain it to someone else"

3

Dropdown

In online safety, hacking is ...​ ​

4

Hacking is often malicious

This means that the person doing the hacking means to cause harm.

  • individual computers

  • devices in your home

  • huge websites and companies

  • tiny businesses

  • medium companies

Hacking happens to:

media

​Image by kalhh from Pixabay

5

  • get access to all your passwords

  • upload dangerous files to your device, or steal important files from it

  • copy and delete all files, data and software from the device

  • steal personal information (bank details, account details for game consoles etc

What harm?

media

6

Malware

Malware is a word made up of two other words: Malicious + software

We use it to describe several different things. Let's watch a short video that will help us to understand about some types of malware....

​Image by Gino Crescoli from Pixabay

media

7

8

Ransomware

Other types of malware

Spyware

Image by Alan from Pixabay

media
media

Image courtesy of Sophos security software

media

9

  • Gains access to cause damage

  • Copies data or slows pc down

  • Duplicates and attaches itself to programs and files

  • Some cause lots of harm, some cause less

  • A computer virus must have human action (like clicking a button or link before it can do any harm)

Virus

A reminder about the types of malware

  • Installs itself on your device

  • Steals personal information

  • Often steals it by keeping a record of everything you type (keylogging)

  • Some spyware can even take control of your webcam without you knowing

Spyware

media
media

10

  • Spread from one computer to another - but don't need to attach themselves to a file or program

  • Can copy themselves hundreds of times so spread really quickly and cause harm fast!

  • Might copy itself to your email account and spread through your email contacts

Worms

A reminder about the types of malware

  • Harmful software that looks like a normal program so people install it

  • Usually carry a hidden, destructive function that activates when you start the program

  • A user must agree to run a program and cannot copy themselves to other computers

  • They can give control to the trojan owner, install more malware, steal bank data, etc

Trojans

media
media

11

  • A type of trojan horse that stops a victim from using their files until they pay the person who wrote the malware.

  • Ransomware is malicious, there is usually a deadline to pay, and usually the cost is paid in Bitcoin.

  • Can't decrypt the files without the key

  • We can protect our devices with up-to-date security software and regular backups

Ransomware

A reminder about the types of malware

media

12

Threats

13

Categorize

Options (4)

user must act, slows pc down

locks data, demands money

steals info, can control webcam

spread easily, copy themselves

Organize these options into the right categories

Virus
Ransomware
Spyware
Worm

14

Protecting devices against threats

15

Go to your Google Classroom and complete the Google Form called Protecting your Data
then we'll return to see whether you were right and learn a bit more about protecting our devices from the threats we talked about.

Don't worry if you don't know much yet.

Let's see what you already know!

media

16

media

A collection of programs that protect your
computer from viruses and other malware


Managed from a control panel, they typically include an antivirus program, and a firewall. They can include antispam, parental controls, website authentication, password storage, and protection from identity theft. Some also include computer backup, and computer tune-up to help with computer performance.

Internet security suites

17

  • Scans and monitors files on the computer

  • Will 'quarantine' (select them and put them aside) and safely remove infected files

  • Block your system from new infections

  • Most antivirus programs check portable devices and programs downloaded from the Internet for infections

  • You are usually told about infections and asked what you want the antivirus to do


Your turn!

Antivirus Programs

media

​Image by Gerd Altmann from Pixabay

media

18

  • Firewalls control the flow of data from one computer to another

  • They can be hardware (on a router for example) or software (a program on the Security Suite) based

  • Their job is mainly to protect an individual computer or device, or a network, from being accessed by someone who should not have access (who doesn't have permission), especially by the Internet - but not always - it can be directly from another device

  • Usually a firewall allows NO direct connection between the device or network and the Internet in either direction.

  • They work to prevent damage to the system, and theft, or access to private or sensitive data by someone who does not have permission - such as through spyware programs.

Firewall Programs

​Image by Gerd Altmann from Pixabay

media

19

Backups

​Image by Gerd Altmann from Pixabay

​Backups protect you against several problems not solved by other security solutions. Having a secure and reliable backup protects you from:

  • Computer crashes caused by a virus attack that could means you lose all your data.

  • Viruses - make sure they can't eat away hours of your work in seconds! Backups are an important part of any cyber security solution.

  • Hacker attacks - hackers love little more than destroying and stealing your data.

  • Ransomware - it's important to have another way of getting your data restored if your data is held to ransom.

20

21

Go to your Google Classroom and complete the Google Form called Protecting your Data again - let's see how you get on this time round now you've learnt some more.

Check the lesson notes before you finish the questions and hand it in.

We will come back here to finish the lesson.

Round Two!

media

22

Poll

I understand what malware means

I really am not sure

I think I understand

I definitely understand

I could explain it to someone else

23

Poll

I understand the threats we learned about today

I'm not sure I understand enough of them

I think I understand most of them

I definitely understand most of them

I could explain most of them to someone else

24

Poll

I understand how to protect my computer and devices from the threats we learned about today

I really am not sure

I think I understand

I definitely understand

I could explain it to someone else

Protecting personal data online

other dangers on the internet

In this lesson, we will explore some other dangers we will come across on the Internet.

These are dangers towards our person (including our identity), our devices (like our computers, tablets, phones, etc)

Show answer

Auto Play

Slide 1 / 24

SLIDE