Want to create interactive content? It’s easy in Genially!
Cybersecurity and privacy's presentation
alenap
Created on May 28, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Cybersecurity's presentation
PRESENTATION
INDEX
2. How to protect yourself
1. The Internet's dangers
The Net
Introduction
The phishing
Cryptography/VPN
The Catfishing
Firewall/Updated and difficult password/Cookies
Malware
Social engineering
Thanks
01
1. The Internet's dangers
The Dark Side of the Web: Navigating the Internet’s Hidden Dangers
The Net is a fantastic place, it is the engine of momentous changes; on the other hand, it exposes us to various dangers...
Cambridge
+INFO
+INFO
Phishing
Phishing is the practice of sending out fraudulent emails that look like an email from trusted sources. The goal is to steal sensitive data such as credit card numbers and login information. It is the most common type of cyber-attack.
Cambridge
+INFO
Catfishing
Catfishing is the act of creating a fake identity online and using it to lure people into a relationship.This type of impersonation is a form of cyberbullying, where the target is harmed as the catfisher plays games with their mind. A cyberbully may attempt to gain trust and persuade their target to reveal sensitive information that can be used as a means of humiliation later.
Cambridge
+INFO
Malware
Malware, short for "malicious software", refers to any intrusive software developed by cybercriminals (often called "hackers") to steal data and damage or destroy computers and computer systems.
Example:
- Viruses
- Worms
- Trojan viruses
- Spyware
- Adware
- Ransomware
Cambridge
+INFO
Social engineering
In computing, social engineering refers to the methods cybercriminals use to get victims to take some sort of questionable action, often involving a breach of security, the sending of money, or giving up confidential information.
Cambridge
+INFO
02
2. How to protct yourself
Surfing Safely: A Guide to Protecting Yourself on the Internet
Introduction
The internet exposes us to potential online threats. It’s essential to understand internet safety rules to protect your data and devices. Some key internet dangers include identity theft, data breaches, malware and viruses, phishing and scam emails, fake websites, online scams, romance scams, inappropriate content, cyberbullying and faulty privacy settings.
There are diffrent ways to defend our personal data, in these slides we will se few of these ways:
Cryptography
Cryptography is a series of methods to make a message incomprehensible to unauthorized people.
VPN
A VPN, or Virtual Private Network, is a service that encrypts your internet traffic and then routes it through your VPN provider’s server before you connect to a website or another online service. This helps disguise your identity and activity on the internet.
Cambridge
+INFO
Firewall
A firewall is a network security system that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules for allowed or blocked the events.
Update and difficult passwords
Updating your passwords regularly and using difficult passwords are important steps in protecting your online security. A difficult password is one that is hard to guess and typically includes a combination of upper and lower case letters, numbers, and special characters. Updating your passwords regularly helps to ensure that even if one of your accounts is compromised, the potential damage is limited.
Cookies
Cookies are files that track the actions on the site where we are browsing. It is good to accept only the essential cookies and not every.
Cambridge
+INFO
THANK YOU!
Team:
- Alessandro Napolano
- Mattia Coppola
- Salvio Esposito
- Simone Iaccarino