Want to create interactive content? It’s easy in Genially!

Get started free

Digital Survival Manual

Iván Alexander Clement Gallegos

Created on October 16, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Blackboard Presentation

Genial Storytale Presentation

Historical Presentation

Psychedelic Presentation

Memories Presentation

Animated Chalkboard Presentation

Chalkboard Presentation

Transcript

Digital survival manual

EMPEZAR

Digital survival Manual

Index

Plagiarism

Introduction

Identity theft

BiblioGRaphy

phishing

Names

Digital survival manual

Introduction

This is your Digital Survival Manual, in it you will find current topics of paramount importance regarding your digital security, tips to stay safe while navigating online and real life cases of this issues. Use your manual to learn about this topics and to get the best of this huge digital world.

digital survival manual

Identity theft

The fraudulent use of someone’s personal information to commit crimes such as fraud or access services in their name.

digital survival manual

Phishing

Type of cyberattack where scammers trick people into providing sensitive information by disguising themselves as trustworthy entities, like a bank or a well-known company, through fake emails, text messages, etc.

Digital survival manual

Plagiarism

Presenting work or ideas from another source as your own, without consent of the original author, by incorporating it into your work without full acknowledgement.

Digital survival manual

Plagiarism

Presenting work or ideas from another source as your own, without consent of the original author, by incorporating it into your work without full acknowledgement.

Digital Survival Manual

bibliography

Crossplag. (n.d.). Most famous cases of plagiarism. https://crossplag.com/most-famous-cases-of-plagiarism/ University of Oxford. (n.d.). Plagiarism. https://www.ox.ac.uk/students/academic/guidance/skills/plaglarism Northern Illinois University. (n.d.). Tips on avoiding plagiarism. https://www.niu.edu/academic-integrity/students/plagiarism/tips-on-avoiding.shtml Phishing.org. (n.d.). What is phishing? https://www.phishing.org/what-is-phishing Town of Hempstead. (n.d.). Famous phishing incidents from history. https://www.hempsteadny.gov/635/Famous-Phishing-Incidents-from-History Cloudflare. (n.d.). How to prevent phishing. https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/ Federal Trade Commission. (n.d.). How to keep your personal information secure. https://www.consumer.ftc.gov/articles/how-keep-your-personal-information-secure Experian. (n.d.). What is identity theft?. https://www.experian.com/blogs/ask-experian/what-is-identity-theft/

Digital Survival Manual

Names

Iván Clement-A01773164 Marco Stanford-A01773165 Leonardo Gallegos-A01773324 Rogelio de León-A01773255

¿Tienes una idea?

¡Que fluya la comunicación!

Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.

  • Genera experiencias con tu contenido.
  • Tiene efecto WOW. Muy WOW.
  • Logra que tu público recuerde el mensaje.
  • Activa y sorprende a tu audiencia.

Real life cases

1.- George Harrison was guilty of plagiarizing the tune of the song “He’s so Fine” (1962, John Mack) for his song “My Sweet Lord” (1970) 2.-Hellen Keller, an American author, published at the short age of 11 a tale called “The Frost King”. However, she was found guilty of plagiarising "Frost Faries" from Margaret Canby. Nevertheless, it is not known if this was done on purpose or accidentally, thus demonstrating the consequences of not being aware of plagiarism.

Real life cases

1.- George Harrison was guilty of plagiarizing the tune of the song “He’s so Fine” (1962, John Mack) for his song “My Sweet Lord” (1970) 2.-Hellen Keller, an American author, published at the short age of 11 a tale called “The Frost King”. However, she was found guilty of plagiarising "Frost Faries" from Margaret Canby. Nevertheless, it is not known if this was done on purpose or accidentally, thus demonstrating the consequences of not being aware of plagiarism.

¿Tienes una idea?

¡Que fluya la comunicación!

Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.

  • Genera experiencias con tu contenido.
  • Tiene efecto WOW. Muy WOW.
  • Logra que tu público recuerde el mensaje.
  • Activa y sorprende a tu audiencia.

Proposals

1. Be cautious with emails and messages: Avoid clicking on suspicious links or attachments, especially from unknown senders 2. Verify the sender’s identity: Check email addresses carefully and contact the sender through a trusted method if unsure 3. Look for signs of phishing: Watch out for misspelled URLs, urgent language, or requests for sensitive information 4. Enable two-factor authentication (2FA): Add an extra layer of security to your accounts to reduce the risk of unauthorized access 5. Keep software updated: Regularly update your browser, antivirus, and operating system to protect against vulnerabilities

Proposals

1. Keep track of the sources you consult during your research 2. Acquire good writing skills and learn how to paraphrase 3. Learn how to make citations correctly 4. Learn what plagiarism is, what it is not, and how to detect it 5. Don’t manipulate or modify any material that was intended for a source so it can fit yours.

Real life cases

Target Data Breach (2013): A phishing attack compromised a third-party vendor, allowing hackers to access Target’s systems over 40 million customers’ credit card details and 70 million personal records were stolen Google Docs Phishing Scam (2017): Attackers sent fake Google Docs invitations, tricking users into giving away their Google login credentials over a million users were affected before Google stopped the attack

¿Tienes una idea?

¡Que fluya la comunicación!

Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.

  • Genera experiencias con tu contenido.
  • Tiene efecto WOW. Muy WOW.
  • Logra que tu público recuerde el mensaje.
  • Activa y sorprende a tu audiencia.

Proposals

1. Keep track of the sources you consult during your research 2. Acquire good writing skills and learn how to paraphrase 3. Learn how to make citations correctly 4. Learn what plagiarism is, what it is not, and how to detect it 5. Don’t manipulate or modify any material that was intended for a source so it can fit yours.

¿Tienes una idea?

¡Que fluya la comunicación!

Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.

  • Genera experiencias con tu contenido.
  • Tiene efecto WOW. Muy WOW.
  • Logra que tu público recuerde el mensaje.
  • Activa y sorprende a tu audiencia.

Proposals

1. Use strong, regularly updated passwords.2. Enable two-factor authentication. 3. Monitor your accounts and financial statements. 4. Avoid sharing personal info on public networks. 5. Shred documents with sensitive data before discarding them.

Real life cases

1. Credit card fraud: Stolen card details are used to make unauthorized purchases.2. Medical identity theft: Someone uses a person's medical information to receive treatments or services.