
Protecting Personal Data Online
Presentation
•
Computers
•
7th Grade
•
Practice Problem
•
Easy
E Leigh
Used 15+ times
FREE Resource
19 Slides • 5 Questions
1
Protecting personal data online
other dangers on the internet
In this lesson, we will explore some other dangers we will come across on the Internet.
These are dangers towards our person (including our identity), our devices (like our computers, tablets, phones, etc)
2
Learning Intentions
Explore risks to personal data through threats to our devices
Learn about the different types of threats to our devices
Discover how to protect our devices from these threats
Success Criteria
Answer more of the questions on the Google Form, Protecting Your Data correctly the second time
Able to answer the plenary questions at the end either, "I definitely understand", or "I could explain it to someone else"
3
Dropdown
4
Hacking is often malicious
This means that the person doing the hacking means to cause harm.
individual computers
devices in your home
huge websites and companies
tiny businesses
medium companies
Hacking happens to:
Image by kalhh from Pixabay
5
get access to all your passwords
upload dangerous files to your device, or steal important files from it
copy and delete all files, data and software from the device
steal personal information (bank details, account details for game consoles etc
What harm?
6
Malware
Malware is a word made up of two other words: Malicious + software
We use it to describe several different things. Let's watch a short video that will help us to understand about some types of malware....
Image by Gino Crescoli from Pixabay
7
8
Ransomware
Other types of malware
Spyware
Image by Alan from Pixabay
Image courtesy of Sophos security software
9
Gains access to cause damage
Copies data or slows pc down
Duplicates and attaches itself to programs and files
Some cause lots of harm, some cause less
A computer virus must have human action (like clicking a button or link before it can do any harm)
Virus
A reminder about the types of malware
Installs itself on your device
Steals personal information
Often steals it by keeping a record of everything you type (keylogging)
Some spyware can even take control of your webcam without you knowing
Spyware
10
Spread from one computer to another - but don't need to attach themselves to a file or program
Can copy themselves hundreds of times so spread really quickly and cause harm fast!
Might copy itself to your email account and spread through your email contacts
Worms
A reminder about the types of malware
Harmful software that looks like a normal program so people install it
Usually carry a hidden, destructive function that activates when you start the program
A user must agree to run a program and cannot copy themselves to other computers
They can give control to the trojan owner, install more malware, steal bank data, etc
Trojans
11
A type of trojan horse that stops a victim from using their files until they pay the person who wrote the malware.
Ransomware is malicious, there is usually a deadline to pay, and usually the cost is paid in Bitcoin.
Can't decrypt the files without the key
We can protect our devices with up-to-date security software and regular backups
Ransomware
A reminder about the types of malware
12
Threats
13
Categorize
user must act, slows pc down
locks data, demands money
steals info, can control webcam
spread easily, copy themselves
14
Protecting devices against threats
15
Go to your Google Classroom and complete the Google Form called Protecting your Data
then we'll return to see whether you were right and learn a bit more about protecting our devices from the threats we talked about.
Don't worry if you don't know much yet.
Let's see what you already know!
16
A collection of programs that protect your
computer from viruses and other malware
Managed from a control panel, they typically include an antivirus program, and a firewall. They can include antispam, parental controls, website authentication, password storage, and protection from identity theft. Some also include computer backup, and computer tune-up to help with computer performance.
Internet security suites
17
Scans and monitors files on the computer
Will 'quarantine' (select them and put them aside) and safely remove infected files
Block your system from new infections
Most antivirus programs check portable devices and programs downloaded from the Internet for infections
You are usually told about infections and asked what you want the antivirus to do
Your turn!
Antivirus Programs
Image by Gerd Altmann from Pixabay
18
Firewalls control the flow of data from one computer to another
They can be hardware (on a router for example) or software (a program on the Security Suite) based
Their job is mainly to protect an individual computer or device, or a network, from being accessed by someone who should not have access (who doesn't have permission), especially by the Internet - but not always - it can be directly from another device
Usually a firewall allows NO direct connection between the device or network and the Internet in either direction.
They work to prevent damage to the system, and theft, or access to private or sensitive data by someone who does not have permission - such as through spyware programs.
Firewall Programs
Image by Gerd Altmann from Pixabay
19
Backups
Image by Gerd Altmann from Pixabay
Backups protect you against several problems not solved by other security solutions. Having a secure and reliable backup protects you from:
Computer crashes caused by a virus attack that could means you lose all your data.
Viruses - make sure they can't eat away hours of your work in seconds! Backups are an important part of any cyber security solution.
Hacker attacks - hackers love little more than destroying and stealing your data.
Ransomware - it's important to have another way of getting your data restored if your data is held to ransom.
20
21
Go to your Google Classroom and complete the Google Form called Protecting your Data again - let's see how you get on this time round now you've learnt some more.
Check the lesson notes before you finish the questions and hand it in.
We will come back here to finish the lesson.
Round Two!
22
Poll
I understand what malware means
I really am not sure
I think I understand
I definitely understand
I could explain it to someone else
23
Poll
I understand the threats we learned about today
I'm not sure I understand enough of them
I think I understand most of them
I definitely understand most of them
I could explain most of them to someone else
24
Poll
I understand how to protect my computer and devices from the threats we learned about today
I really am not sure
I think I understand
I definitely understand
I could explain it to someone else
Protecting personal data online
other dangers on the internet
In this lesson, we will explore some other dangers we will come across on the Internet.
These are dangers towards our person (including our identity), our devices (like our computers, tablets, phones, etc)
Show answer
Auto Play
Slide 1 / 24
SLIDE
Similar Resources on Wayground
19 questions
Evaluating Algebraic Expressions
Presentation
•
7th Grade
19 questions
Integers
Presentation
•
7th Grade
19 questions
Unique Triangles
Presentation
•
7th Grade
17 questions
Computer Software
Presentation
•
7th Grade
21 questions
Under the Hood of Computer
Presentation
•
7th Grade
20 questions
7 класс 4 четверть 1 урок
Presentation
•
KG
19 questions
Comparing Box plot Warm-up
Presentation
•
7th Grade
19 questions
Grammar Review
Presentation
•
7th Grade
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade