Want to create interactive content? It’s easy in Genially!
Digital Survival Manual
enrique
Created on October 22, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Psychedelic Presentation
View
Chalkboard Presentation
View
Witchcraft Presentation
View
Sketchbook Presentation
View
Genial Storytale Presentation
View
Vaporwave presentation
View
Animated Sketch Presentation
Transcript
Empezar
Digital survival guide
Santiago Alejandro Sánchez Flores - A01820239 Enrique Álvarez González - A01739224 Due date: October 28th, 2024 Team 3
Elio (Fireblock)
Superheroes
Pedrita Sánchez (Byte Guardian)
Fireblock
Life story
Elio was a young software engineer who specialized in cybersecurity. He grew up learning from his father, a computer scientist. From a young age, Elio was aware of the dangers of the internet. He had seen his family and friends suffer from identity theft, hacking, and data breaches, which fueled her passion for building stronger, more secure systems.
OpenAI. (2023). DALL-E (Version 3) [Image generation model]. https://openai.com/dall-e/
Digital powers
Destroying malware
MAnipulating code
While trying to neutralize the virus, Elio was attacked by the virus, who tried to control his mind, but she was prepared, and absorbed it so it couldn’t escape nowhere. As a side effect he gained these abilities.
checking safety
The logo represents a shield. It sepresents security. The suit is equipped with several tools that increase the eficciency of data manipulation, allowing ofr faster task completing by the user.
Suit & logo
Byte Guardian
“Byte Guardian”
In a world increasingly reliant on technology, a brilliant but reclusive programmer named Pedrita Sánchez discovers a malicious AI intelligence that threatens to corrupt digital infrastructure worldwide.,
PIXLR.(2024) (Version 2024) [Artificial intelligence system]. https://pixlr.com/image-generator/
+ info
Byte Guardian
Topic: Digital Security Subtopics:Strong Passwords Topic: Digital security Subtopics: Phishing Topic: Ethics in the use of information Subtopics: Identity theft Topic: Collaborative tools Subtopics: Google Apps for Education Topic: Intellectual property Subtopics: Trademarks
- Cita siempre al autor/a
Strong Passwords
A strong password is an important element of online security. It works to protect personal information from everyone's access. A strong password aims to be unique, and difficult to predict. Common patterns like "123456" or "000000" are an example of things you shouldn't choose as your password. Data filtration is a common thing on the internet, it may have happened to you and you may have not noticed yet. A filtration happens when the passwords aren't secure enough, and are successfully guessed. If you don’t know how to create a strong password, it is recommended to use something like a password manager, a tool that can auto-generate secure passwords, at the same time that it keeps them written on your device. A historical example of a massive password leak happened to Linkedin in 2012, millions of users got their accounts hacked, and their information stolen. The consequences were an immense increase of data sales on the dark web, and damage to the company’s reputation
Phishing
Phishing refers to the action of using different methods to trick individuals into revealing sensitive information such as passwords or credit card numbers. It commonly occurs through spam emails, text messages, or websites. The term comes from the relation to fishing, where attackers use "bait" to lead victims into providing their personal data. Phishing attacks can take many forms, including massive email phishing , individually targeting someone, text messages, and phone calls. The unawareness about these attacks often causes them to be successful, with people not knowing what they are getting into. The methods that are used have changed to look for unknown and undetectable ways to steal someone's information One famous example of phishing occurred during the US presidential election of 2016, when Russian hackers sent a fake email to people associated with Hillary Clinton's political campaign. Many of their email accounts had their information successfully stolen by this attack. The best things you can do to avoid phishing are:
Identity theft
Identity theft is the illegal act of obtaining and utilizing another person's personal information (usually for financial gain or fraudulent purposes) such as credit card numbers, social security numbers, or other sensitive data. People can impersonate victims through this frequent behavior, which can seriously harm their financial situation, reputation, and safety. Identity theft victims may find it difficult to undo the harm, which can include more serious crimes done in their name as well as unauthorized transactions. There are different forms of identity theft, including financial identity theft, where criminals use stolen information to make purchases or open new accounts; criminal identity theft, where a criminal provides someone else’s identity when arrested; and medical identity theft, where healthcare services are illegally obtained in someone else's name. The consequences for victims can vary from including financial loss, damage to credit scores, and even legal challenges. While identity theft is a criminal offense, victims often suffer long and complex processes to resolve the problems caused.
Example:
Google Apps for Education
Google Apps for Education, now known as Google Workspace for Education, is cloud-based productivity tools designed specifically for educational institutions, basically, for students. It includes applications such as Google Docs, Google Sheets, Google Drive, and Google Classroom, making collaborative learning and efficient communication among students and educators both cause students need to organize and planificate while teachers use apps and Tools to make their assignments creative and more interesting. With features like shared documents and classroom management, educators can create an interactive learning environment..
Trademarks
Trademarks are signs, such as words or images that distinguish one product from another. They could be words, symbols, sounds or colors which serve to distinguish the goods or services of one source from others. They are used for preventing confusion in trade. Trademarks are important because they establish an company’s identity, build customer trust by helping prevent others from copying or mimicking your distinctive features and can also be a valuable source of income if managed properly. Businesses need to trademark to be the only one who can claim exclusive rights in its employment.
APA References:
7 Common types of plagiarism, with examples. (2022, June 2). 7 Common Types of Plagiarism, With Examples | GrammarlyBlog. https://www.grammarly.com/blog/plagiarism/types-of-plagiarism/ Froehlich, A., & Brush, K. (2023, April 28). Team collaboration tools. Unified Communications.https://www.techtarget.com/searchunifiedcommunications/definition/team-collaboration-tools Johnson, R. (2020). Learning Management Systems: A key to educational success.https://scholar.google.com.mx/scholar_urlurl=https://www.tandfonline.com/doi/pdf/10.1080/1743727X.2020.1737002&hl=de&sa=X&ei=qCYTZ5bHGse16rQPpMzOmQE&scisig=AFWwaeYbtvXQUAk61Wgf0jNoxti_&oi=scholarr Smith, J. (2021). The impact of Google Workspace on modern education. Educational Technology Journal. Retrieved from https://scholar.google.com.mx/scholar_url?url=https://citeseerx.ist.psu.edu/document%3Frepid%3Drep1%26type%3Dpdf%26doi%3D5e810822e65ce06c7932644d3da0bc17640206bc&hl=de&sa=X&ei=6iATZ7_aNO616rQPmaPX-A0&scisig=AFWwaeZAnQERn__p-Sx6QnPTMAnu&oi=scholarr Tupa, S. (2017). What is Plagiarism? Plagiarism.org. https://www.plagiarism.org/article/what-is-plagiarismWalter, K. (2023, October 19). Identity Theft: Definition, Prevention & Recovery. IDnow. https://www.idnow.io/glossary/identity-theft/ What is Identity Theft? | Office of the Attorney General. (n.d.). https://www.texasattorneygeneral.gov/consumer-protection/identity-theft/what-identity-theft What is plagiarism? (2021, June 30). Poorvu Center for Teaching and Learning.https://poorvucenter.yale.edu/undergraduates/using-sources/understanding-and-avoiding-plagiarism/what-plagiarism
¿Tienes una idea?
Usa este espacio para añadir una interactividad genial. Incluye texto, imágenes, vídeos, tablas, PDFs… ¡incluso preguntas interactivas! Tip premium: Obten información de cómo interacciona tu audiencia:
- Visita las preferencias de Analytics;
- Activa el seguimiento de usuarios;
- ¡Que fluya la comunicación!