Want to create interactive content? It’s easy in Genially!

Get started free

Módulo Training Code

Iker Reyes Montero

Created on June 5, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Math Lesson Plan

Primary Unit Plan 2

Animated Chalkboard Learning Unit

Business Learning Unit

Corporate Signature Learning Unit

Code Training Unit

History Unit plan

Transcript

KEVIN RELINQUE E IKER REYES

Computer and Cybersecurity Presentation

start >

>

>

02

01

03

software

hardware

virus and malware

04

06

05

cyber bullying

sex torsion

hacking

07

08

09

phising

digital label

digital identity theft

Hardware and software

>

>

1.

Hardware

internal component

>

>

Keyboard.Mouse .Microphone. Scanner. Digital camera. Monitor. Printer. Loudspeaker or speaker. Headphones.

1.

// peripheral

+info

>

>

2.

// Software

OS:

Search engine:

Browser:

Program:

>

>

How to protect yourself from malware and viruses? Install antivirus/malware software. Perform regularly scheduled scans. Keep your operating system updated etc.

3.

// vIRUS

// MALWARE

In more technical terms, a computer virus is a type of malicious program or code written to modify the operation of a computer. Additionally, it is designed to spread from one computer to another. Viruses insert or attach themselves to a legitimate program or document that supports macros in order to execute its code. Some examples of well-known computer viruses are: Morris Worm. Nimda. ILOVEYOU. SQL Slammer. Stuxnet.

Malware is made up of all types of malicious software, including viruses, and is used by cybercriminals for many reasons, such as: Tricking the victim into providing personal data to steal their identity. An example of malware could be: Stealing consumer credit card or other financial data or spyware, adware, ransomware.

I recently got a virus from installing a game on an unreliable page, and they stole all my data, accounts, passwords, personal data and they had full access to my computer, I had to format the computer and change the passwords on everything to that the problem was finally solved

Cyberbullying is harassment carried out between users of a similar age and equivalent social context, through the use of digital media, from a mobile phone to the Internet or through online video games. To prevent cyberbullying: -Teach them the importance of keeping their privacy protected and never sharing personal information. -Train them and set an example regarding the content that is shared on the Internet. -Make sure that the minor's contacts are friends and acquaintances.

>

>

4.

// Cyber ​​bullying.

>

>

SEXTORSION

5.

Sextortion is a form of sexual abuse that consists of threatening to publish sexually explicit material of the victim unless certain demands are met. The blackmailer demands large sums of money from the victim to not publish the images.

tip >

>

>

// Hacking

6.

Hacking is a process of gaining access to computer systems, personal accounts, digital devices or computer networks. To achieve this, hackers use different techniques such as exploiting vulnerabilities in software, using weak passwords and social engineering to obtain confidential information.

To prevent you from being hacked: Authentication mechanisms. ... Analysis and automation of flows. ... Endpoint protection. ... Network access control. ... Security for web browsing. ... Data traffic intelligence. ... Develop a cybersecurity culture.

>

>

PHISHING

7.

Phishing is a common type of cyber attack that targets people through email, text messages, phone calls, and other forms of communication. The term phishing in English is pronounced the same as the word fishing, literally fishing. A phishing attack aims to trick the recipient into taking the action desired by the attacker, such as revealing financial information, system access credentials, or other sensitive information.

I recently received a message on WhatsApp telling me that I had to like some TikTok videos and they gave me money, and then they gave me the money but then they asked me for money and then they gave me more money but in the end They never gave me the money

>

>

8.

// Digital identity theft

Identity theft or identity theft is the appropriation of a person's identity: impersonating that person, assuming their identity in front of other people in public or private, generally to access certain resources or to obtain credit and other benefits on behalf of that person.For example, there are many famous people who are impersonated by other people to be recognized.

>

>

// DiGITAL ETIQUETTE

9.

Netiquette, netiquette or network labels are a set of rules that regulate the behavior that users must have on the network, to guarantee fun, pleasant browsing and away from problems.These rules regulate all forms of interaction that exist in cyberspace such as email, forums, blogs, websites, chats, social networks and other applications and tools on the Internet.

An etiquette of, for example, Instagram is to respect others and not insult or it can also be not to defame people and not to give wrong information.

+info

Module completed

Thanks for watching ❤️❤️❤️

Hacking example

As I said before in point 3, they hacked me with a virus and they hacked my computer, and stole my information. When that happened I had to change the password of all the applications or websites I was logged into. Since then I have been much more careful about what I settle in.

Measures to avoid them

1 Stay informed about the techniques used for identity theft. 2 Use strong passwords. 3 Sign out. 4 Check the email address. 5 Do not download and open files from suspicious emails.

// What are peripherals

In computing, peripheral is the generic name to designate the auxiliary and independent device or device connected to the motherboard of a computer. Peripherals are considered to be the hardware units or devices through which the computer communicates with the outside world, and also to the systems that store or archive information, serving as auxiliary memory for main memory.

BROWERS

What is a browser?

A web browser is a software, application or program that allows access to the Web, interpreting the information from different types of files and websites so that they can be viewed.

OS

What is an Operative System?

An operating system is a set of programs that allows us to manage the memory, disk, information storage media and the different peripherals or resources of our computer, such as the keyboard, mouse, printer, network card, among others.

TIPS

An example is when someone threatens you that they have intimate photos and that they are going to spread them if you don't give them an amount of money.

Program

What is a program?

A computer program, application or software is a set of sequential instructions, called code, that, through their interpretation by the operating system or hardware, allow a specific action to be carried out on a laptop or desktop computer. A program can be installed on your computer and it can also be installed on the web and you can access it

  • A program can be: Fortnite, Brawl Stars, Canva, Tiktok, Instagram, Minecraft, etc.

// rules of digital etiquette

1 Introduce yourself appropriately. ...2 Respect the privacy of others. 3 Avoid cyberbullying. 4 Follow the rules of the platform on which you interact. 5 Check your sources. 6 Respect other people's time. 7 Don't forget to reply to your messages. 8 Share knowledge

Cyberbullying

Real cases of cyberbullying

Allem Halkic, a 17-year-old Melbourne boy, took his own life in 2009 after experiencing cyberbullying on an online social network. The court that tried the case in 2011 ruled that he had died as a result of an act of violence.

Romina Perrone, a 10-year-old student at a Buenos Aires school, had to suffer when a classmate created a group on Facebook giving reasons to hate her. He had more than five thousand fans and despite the efforts of Romina's mother, Facebook refused to eliminate him.

Lorem ipsum dolor sit

Search engine

what is a search engine

An Internet search engine or search engine is a computer server specialized in searching for information on the web. Search results for a query typically appear in list form and may consist of web pages, images, videos, and other formats.Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod.