Want to create interactive content? It’s easy in Genially!

Get started free

Cybersecurity and privacy's presentation

alenap

Created on May 28, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

Cybersecurity's presentation

PRESENTATION

INDEX

2. How to protect yourself
1. The Internet's dangers
The Net
Introduction

The phishing

Cryptography/VPN

The Catfishing

Firewall/Updated and difficult password/Cookies

Malware

Social engineering

Thanks

01

1. The Internet's dangers

The Dark Side of the Web: Navigating the Internet’s Hidden Dangers

The Net is a fantastic place, it is the engine of momentous changes; on the other hand, it exposes us to various dangers...

Cambridge

+INFO

+INFO

Phishing

Phishing is the practice of sending out fraudulent emails that look like an email from trusted sources. The goal is to steal sensitive data such as credit card numbers and login information. It is the most common type of cyber-attack.

Cambridge

+INFO

Catfishing

Catfishing is the act of creating a fake identity online and using it to lure people into a relationship.This type of impersonation is a form of cyberbullying, where the target is harmed as the catfisher plays games with their mind. A cyberbully may attempt to gain trust and persuade their target to reveal sensitive information that can be used as a means of humiliation later.

Cambridge

+INFO

Malware

Malware, short for "malicious software", refers to any intrusive software developed by cybercriminals (often called "hackers") to steal data and damage or destroy computers and computer systems.
Example:
  • Viruses
  • Worms
  • Trojan viruses
  • Spyware
  • Adware
  • Ransomware

Cambridge

+INFO

Social engineering

In computing, social engineering refers to the methods cybercriminals use to get victims to take some sort of questionable action, often involving a breach of security, the sending of money, or giving up confidential information.

Cambridge

+INFO

02

2. How to protct yourself

Surfing Safely: A Guide to Protecting Yourself on the Internet

Introduction

The internet exposes us to potential online threats. It’s essential to understand internet safety rules to protect your data and devices. Some key internet dangers include identity theft, data breaches, malware and viruses, phishing and scam emails, fake websites, online scams, romance scams, inappropriate content, cyberbullying and faulty privacy settings.
There are diffrent ways to defend our personal data, in these slides we will se few of these ways:

Cryptography

Cryptography is a series of methods to make a message incomprehensible to unauthorized people.

VPN

A VPN, or Virtual Private Network, is a service that encrypts your internet traffic and then routes it through your VPN provider’s server before you connect to a website or another online service. This helps disguise your identity and activity on the internet.

Cambridge

+INFO

Firewall

A firewall is a network security system that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules for allowed or blocked the events.

Update and difficult passwords

Updating your passwords regularly and using difficult passwords are important steps in protecting your online security. A difficult password is one that is hard to guess and typically includes a combination of upper and lower case letters, numbers, and special characters. Updating your passwords regularly helps to ensure that even if one of your accounts is compromised, the potential damage is limited.

Cookies

Cookies are files that track the actions on the site where we are browsing. It is good to accept only the essential cookies and not every.

Cambridge

+INFO

THANK YOU!

Team:
  • Alessandro Napolano
  • Mattia Coppola
  • Salvio Esposito
  • Simone Iaccarino
From 3rd DI
S.Y 2022/2023