Digital survival manual
EMPEZAR
Digital survival Manual
Index
Plagiarism
Introduction
Identity theft
BiblioGRaphy
phishing
Names
Digital survival manual
Introduction
This is your Digital Survival Manual, in it you will find current topics of paramount importance regarding your digital security, tips to stay safe while navigating online and real life cases of this issues. Use your manual to learn about this topics and to get the best of this huge digital world.
digital survival manual
Identity theft
The fraudulent use of someone’s personal information to commit crimes such as fraud or access services in their name.
digital survival manual
Phishing
Type of cyberattack where scammers trick people into providing sensitive information by disguising themselves as trustworthy entities, like a bank or a well-known company, through fake emails, text messages, etc.
Digital survival manual
Plagiarism
Presenting work or ideas from another source as your own, without consent of the original author, by incorporating it into your work without full acknowledgement.
Digital survival manual
Plagiarism
Presenting work or ideas from another source as your own, without consent of the original author, by incorporating it into your work without full acknowledgement.
Digital Survival Manual
bibliography
Crossplag. (n.d.). Most famous cases of plagiarism. https://crossplag.com/most-famous-cases-of-plagiarism/ University of Oxford. (n.d.). Plagiarism. https://www.ox.ac.uk/students/academic/guidance/skills/plaglarism Northern Illinois University. (n.d.). Tips on avoiding plagiarism. https://www.niu.edu/academic-integrity/students/plagiarism/tips-on-avoiding.shtml Phishing.org. (n.d.). What is phishing? https://www.phishing.org/what-is-phishing Town of Hempstead. (n.d.). Famous phishing incidents from history. https://www.hempsteadny.gov/635/Famous-Phishing-Incidents-from-History Cloudflare. (n.d.). How to prevent phishing. https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/ Federal Trade Commission. (n.d.). How to keep your personal information secure. https://www.consumer.ftc.gov/articles/how-keep-your-personal-information-secure Experian. (n.d.). What is identity theft?. https://www.experian.com/blogs/ask-experian/what-is-identity-theft/
Digital Survival Manual
Names
Iván Clement-A01773164 Marco Stanford-A01773165 Leonardo Gallegos-A01773324 Rogelio de León-A01773255
¿Tienes una idea?
¡Que fluya la comunicación!
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.
- Genera experiencias con tu contenido.
- Tiene efecto WOW. Muy WOW.
- Logra que tu público recuerde el mensaje.
- Activa y sorprende a tu audiencia.
Real life cases
1.- George Harrison was guilty of plagiarizing the tune of the song “He’s so Fine” (1962, John Mack) for his song “My Sweet Lord” (1970) 2.-Hellen Keller, an American author, published at the short age of 11 a tale called “The Frost King”. However, she was found guilty of plagiarising "Frost Faries" from Margaret Canby. Nevertheless, it is not known if this was done on purpose or accidentally, thus demonstrating the consequences of not being aware of plagiarism.
Real life cases
1.- George Harrison was guilty of plagiarizing the tune of the song “He’s so Fine” (1962, John Mack) for his song “My Sweet Lord” (1970) 2.-Hellen Keller, an American author, published at the short age of 11 a tale called “The Frost King”. However, she was found guilty of plagiarising "Frost Faries" from Margaret Canby. Nevertheless, it is not known if this was done on purpose or accidentally, thus demonstrating the consequences of not being aware of plagiarism.
¿Tienes una idea?
¡Que fluya la comunicación!
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.
- Genera experiencias con tu contenido.
- Tiene efecto WOW. Muy WOW.
- Logra que tu público recuerde el mensaje.
- Activa y sorprende a tu audiencia.
Proposals
1. Be cautious with emails and messages: Avoid clicking on suspicious links or attachments, especially from unknown senders 2. Verify the sender’s identity: Check email addresses carefully and contact the sender through a trusted method if unsure 3. Look for signs of phishing: Watch out for misspelled URLs, urgent language, or requests for sensitive information 4. Enable two-factor authentication (2FA): Add an extra layer of security to your accounts to reduce the risk of unauthorized access 5. Keep software updated: Regularly update your browser, antivirus, and operating system to protect against vulnerabilities
Proposals
1. Keep track of the sources you consult during your research 2. Acquire good writing skills and learn how to paraphrase 3. Learn how to make citations correctly 4. Learn what plagiarism is, what it is not, and how to detect it 5. Don’t manipulate or modify any material that was intended for a source so it can fit yours.
Real life cases
Target Data Breach (2013): A phishing attack compromised a third-party vendor, allowing hackers to access Target’s systems over 40 million customers’ credit card details and 70 million personal records were stolen Google Docs Phishing Scam (2017): Attackers sent fake Google Docs invitations, tricking users into giving away their Google login credentials over a million users were affected before Google stopped the attack
¿Tienes una idea?
¡Que fluya la comunicación!
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.
- Genera experiencias con tu contenido.
- Tiene efecto WOW. Muy WOW.
- Logra que tu público recuerde el mensaje.
- Activa y sorprende a tu audiencia.
Proposals
1. Keep track of the sources you consult during your research 2. Acquire good writing skills and learn how to paraphrase 3. Learn how to make citations correctly 4. Learn what plagiarism is, what it is not, and how to detect it 5. Don’t manipulate or modify any material that was intended for a source so it can fit yours.
¿Tienes una idea?
¡Que fluya la comunicación!
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.
- Genera experiencias con tu contenido.
- Tiene efecto WOW. Muy WOW.
- Logra que tu público recuerde el mensaje.
- Activa y sorprende a tu audiencia.
Proposals
1. Use strong, regularly updated passwords.2. Enable two-factor authentication. 3. Monitor your accounts and financial statements. 4. Avoid sharing personal info on public networks. 5. Shred documents with sensitive data before discarding them.
Real life cases
1. Credit card fraud: Stolen card details are used to make unauthorized purchases.2. Medical identity theft: Someone uses a person's medical information to receive treatments or services.
Digital Survival Manual
Iván Alexander Clement Gallegos
Created on October 16, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Blackboard Presentation
View
Genial Storytale Presentation
View
Historical Presentation
View
Psychedelic Presentation
View
Memories Presentation
View
Animated Chalkboard Presentation
View
Chalkboard Presentation
Explore all templates
Transcript
Digital survival manual
EMPEZAR
Digital survival Manual
Index
Plagiarism
Introduction
Identity theft
BiblioGRaphy
phishing
Names
Digital survival manual
Introduction
This is your Digital Survival Manual, in it you will find current topics of paramount importance regarding your digital security, tips to stay safe while navigating online and real life cases of this issues. Use your manual to learn about this topics and to get the best of this huge digital world.
digital survival manual
Identity theft
The fraudulent use of someone’s personal information to commit crimes such as fraud or access services in their name.
digital survival manual
Phishing
Type of cyberattack where scammers trick people into providing sensitive information by disguising themselves as trustworthy entities, like a bank or a well-known company, through fake emails, text messages, etc.
Digital survival manual
Plagiarism
Presenting work or ideas from another source as your own, without consent of the original author, by incorporating it into your work without full acknowledgement.
Digital survival manual
Plagiarism
Presenting work or ideas from another source as your own, without consent of the original author, by incorporating it into your work without full acknowledgement.
Digital Survival Manual
bibliography
Crossplag. (n.d.). Most famous cases of plagiarism. https://crossplag.com/most-famous-cases-of-plagiarism/ University of Oxford. (n.d.). Plagiarism. https://www.ox.ac.uk/students/academic/guidance/skills/plaglarism Northern Illinois University. (n.d.). Tips on avoiding plagiarism. https://www.niu.edu/academic-integrity/students/plagiarism/tips-on-avoiding.shtml Phishing.org. (n.d.). What is phishing? https://www.phishing.org/what-is-phishing Town of Hempstead. (n.d.). Famous phishing incidents from history. https://www.hempsteadny.gov/635/Famous-Phishing-Incidents-from-History Cloudflare. (n.d.). How to prevent phishing. https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/ Federal Trade Commission. (n.d.). How to keep your personal information secure. https://www.consumer.ftc.gov/articles/how-keep-your-personal-information-secure Experian. (n.d.). What is identity theft?. https://www.experian.com/blogs/ask-experian/what-is-identity-theft/
Digital Survival Manual
Names
Iván Clement-A01773164 Marco Stanford-A01773165 Leonardo Gallegos-A01773324 Rogelio de León-A01773255
¿Tienes una idea?
¡Que fluya la comunicación!
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.
Real life cases
1.- George Harrison was guilty of plagiarizing the tune of the song “He’s so Fine” (1962, John Mack) for his song “My Sweet Lord” (1970) 2.-Hellen Keller, an American author, published at the short age of 11 a tale called “The Frost King”. However, she was found guilty of plagiarising "Frost Faries" from Margaret Canby. Nevertheless, it is not known if this was done on purpose or accidentally, thus demonstrating the consequences of not being aware of plagiarism.
Real life cases
1.- George Harrison was guilty of plagiarizing the tune of the song “He’s so Fine” (1962, John Mack) for his song “My Sweet Lord” (1970) 2.-Hellen Keller, an American author, published at the short age of 11 a tale called “The Frost King”. However, she was found guilty of plagiarising "Frost Faries" from Margaret Canby. Nevertheless, it is not known if this was done on purpose or accidentally, thus demonstrating the consequences of not being aware of plagiarism.
¿Tienes una idea?
¡Que fluya la comunicación!
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.
Proposals
1. Be cautious with emails and messages: Avoid clicking on suspicious links or attachments, especially from unknown senders 2. Verify the sender’s identity: Check email addresses carefully and contact the sender through a trusted method if unsure 3. Look for signs of phishing: Watch out for misspelled URLs, urgent language, or requests for sensitive information 4. Enable two-factor authentication (2FA): Add an extra layer of security to your accounts to reduce the risk of unauthorized access 5. Keep software updated: Regularly update your browser, antivirus, and operating system to protect against vulnerabilities
Proposals
1. Keep track of the sources you consult during your research 2. Acquire good writing skills and learn how to paraphrase 3. Learn how to make citations correctly 4. Learn what plagiarism is, what it is not, and how to detect it 5. Don’t manipulate or modify any material that was intended for a source so it can fit yours.
Real life cases
Target Data Breach (2013): A phishing attack compromised a third-party vendor, allowing hackers to access Target’s systems over 40 million customers’ credit card details and 70 million personal records were stolen Google Docs Phishing Scam (2017): Attackers sent fake Google Docs invitations, tricking users into giving away their Google login credentials over a million users were affected before Google stopped the attack
¿Tienes una idea?
¡Que fluya la comunicación!
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.
Proposals
1. Keep track of the sources you consult during your research 2. Acquire good writing skills and learn how to paraphrase 3. Learn how to make citations correctly 4. Learn what plagiarism is, what it is not, and how to detect it 5. Don’t manipulate or modify any material that was intended for a source so it can fit yours.
¿Tienes una idea?
¡Que fluya la comunicación!
Con las plantillas de Genially podrás incluir recursos visuales para dejar a tu audiencia con la boca abierta. También destacar alguna frase o dato concreto que se quede grabado a fuego en la memoria de tu público e incluso embeber contenido externo que sorprenda: vídeos, fotos, audios... ¡Lo que tú quieras! ¿Necesitas más motivos para crear contenidos dinámicos? Bien: el 90% de la información que asimilamos nos llega a través de la vista y, además, retenemos un 42% más de información cuando el contenido se mueve.
Proposals
1. Use strong, regularly updated passwords.2. Enable two-factor authentication. 3. Monitor your accounts and financial statements. 4. Avoid sharing personal info on public networks. 5. Shred documents with sensitive data before discarding them.
Real life cases
1. Credit card fraud: Stolen card details are used to make unauthorized purchases.2. Medical identity theft: Someone uses a person's medical information to receive treatments or services.