digital / cyber powerpoint presentation with examples
SaimaImam6
23 views
16 slides
Mar 06, 2025
Slide 1 of 16
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
About This Presentation
report
Size: 2.89 MB
Language: en
Added: Mar 06, 2025
Slides: 16 pages
Slide Content
Module 9: Digital/Cyber Literacy
Learning Outcomes: Define digital/cyber literacy and cybersecurity Elaborate on cyber citizenship Determine netiquette and safety use of digital media Identify common computer threats and the corresponding fixing solutions Elucidate cyberbullying and cybercrimes Examine Internet exploration, source citation, research and data gathering protocols and website evaluation Cite how digital/cyberliteracy may be integrated with teaching-learning Draw relevant life lessons and significant values from personal experiences on digital risks and consequences Analyze research abstract on digital/cyber literacy and its implications to the teaching-learning process Produce and evaluate a digital tool that may be utilized in the classroom
Information security Information security Sensitive information, such as personal information, identity and passwords are often associated with personal property and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequences, such as identity and property theft. Common causes of information security breaches include: 1. Phishing. It is a common type of scam, of which the scammers disguise as a trustworthy source in an attempt to obtain private information, such as passwords, credit card information, etc. through the use of fake websites that look identical and legitimate. 2. Internet scams. These are schemes that deceive the users in various ways in an attempt to take advantage of them. 3. Malware. It is a malicious software (particularly spyware) disguised to collect and transmit private information, such as password without the user's consent or knowledge, of which it is impossible to determine whether a file is infected.
Personal safety and threats Personal safety and threats The growth of the Internet gave rise to many important services accessible to anyone with a connection, such as digital communication. While it allows communication with others, it is also being grabbed by malicious users for bad intent. The following are common threats to personal safety. Cyberstalking. It is the use of the Internet or other electronic means to stalk or harass an individual, group or organization through false accusations, defamation, slander and libel, intentional monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass. Cyberbullying. It is the use of electronic means, such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, or overpower an individual or group.
Personal safety and threats 3. Online predation. It is the act of engaging an underage minor into inappropriate sexual relationships through the Internet. The behavior characteristics are categorized into three groups: Manipulative- typically a child molester; B) Opportunist- typically a rapist; and C) Coercive- being a mixture of both rapists and child molesters. 4. Obscene/offensive content. Various websites on the Internet contain material that may deem offensive, distasteful or explicit, which may often not be of the user's liking. Such websites may include the Internet, shock sites, hate speech or otherwise, and inflammatory content. Such content may manifest in many ways, such as pop-up ads and unsuspecting links. 5. Sextortion. It is the use of webcams for flirting and cybersex. Often, this involves a cybercriminal posing as someone else, such as an attractive person initiating communication of a sexual nature with the victim. The video is recorded by the cybercriminal to demand money or other services, threaten to publicly release the video and send to family members and friends of the victim if they do not comply. (https://en.wikipedia.org/ wiki/ Internet_safety )
The realm of Information Technology (IT) security professionals and computer security has become an issue and concern for many people (Honan, 2014). T he context of computer security, refers to anything that has the potential to cause serious harm to a computer system It is something that may or may not happen, but has the potential to cause serious damage and can lead to attacks on computer systems and networks. Cybercrime is now becoming alarming in the life of every individual and the organization as they intend to steal information that they can sell or trade, such as financial details, credit card information, personal details, or any other information using computer networks. Computer Threats and Fixing Solution
Given the numerous ways a computer virus can spread, the following are ways on how to ensure that computer networks can be protected. 1. Install anti-virus software. Ensure that reputable anti-virus software is installed on all computers, including all servers, PCs and laptops. 2. Ensure that the anti-virus software is up-to-date. New computer viruses are being released daily and so it is essential that computers are protected by keeping the anti-virus software-up- to-date. 3. Employ a firewall to protect networks. As computer viruses can spread by means other than email, it is important that unwanted traffic is blocked from entering the network by using a firewall. 4. Filter all email traffic. Example of emails with certain file attachments commonly used by computer viruses to spread themselves, such as EXE, .COM and SCR files. These should be prevented from entering the network. 5. Educate all users to be careful of suspicious e-mails. Ensure that all users know to never open an attachment or to click on a link in an email they are not expecting. 6. Scan Internet downloads. Ensure that all files downloaded from the Internet are scanned against computer viruses from one central point on the network. 7. Do not run programs of unknown origin. It is important to use a trusted source for software requirements to be installed and ensure it can be accounted for.
8. Implement a vulnerability management system. It is important to regularly review network and the applications running on it for new vulnerabilities and a plan on how to manage them, either by patching or upgrading then using tools, such as firewalls or Intrusion Detection Systems that should be put in place. 9. Make regular backups of critical data. There is a need to keep important files on removable media, such as portable drives or tape for back-up in the event that the network is infected with a computer virus. 10. Develop an Information Security Policy. The creation and publication of an Information Security Policy is key to ensuring that information security receives the profile it requires in order to secure the systems and data. 11. Monitor logs and systems. Regular monitoring of network and system logs can assist in the early identification of a computer virus infecting the network or other attacks by criminals. 12. Develop an Incident Response Plan. The incident response plan outlines the roles and responsibilities of people in the event of a computer virus infecting the network or any other type of security breach. 13. Restrict end-user access to the systems. Where possible, end users are prohibited from access to the system so that the virus will also be restricted.
Cyberbullying Cyberbullying, cyberharassment or online bullying is a form of bullying or harassment using electronic means usually among minors in school setting and has become increasingly common, especially among teenagers. Cyberbullying is similar to traditional bullying, it is just that victims may not know the identity of their bully and the reason for bullying them. Cyberbullies may disclose victims' personal data on websites or forums called doxing, or may use impersonation, and create fake accounts, comments or sites for the purpose of publishing material their names.
Cyberbullying Types There are various types of cyberbullying and research has revealed serious profound consequences on victims 1. Internet trolling is a common form of bullying over the Internet in an online community to elicit a reaction, disruption or intentionally provoke and offend others. 2. Cyberstalking is another form of bullying or harassment that uses electronic communication to stalk a victim and pose a credible threat to harass him/her.
Implications of bullying in schools. Schools should initiate various anti-bullying programs and campaigns to protect students from being threatened or victimized by such offense. Implication of Bullying in School
Cybercrime Avast defines cybercrime as any criminal activity carried out using computers or the Internet. Cybercrime uses tools like phishing, viruses, spyware, ransomware and social engineering to break the law. Cybercrime is defined by Techopedia as a crime with the computer as the object of the crime (i.e. hacking, phishing, spamming) or is used as a tool to commit an offense (i.e. child pornography, hate crimes). Cybercriminals may use computer technology to access personal and confidential information or use the Internet for exploitative or malicious purposes. Techopedia cites common types of cybercrime that include unauthorized information theft, identity theft, online predatory crimes, computer access, and the most serious one like Cybercrime encompasses a wide range of activities cyberterrorism. that can be categorized as: (1) crimes that target computer networks or devices, including viruses and denial-of-service (DoS) attacks; and (2) crimes that use computer networks to advance other criminal activities, including cyberstalking, phishing and fraud or identity theft.
The Internet is a global communication network that allows computers to exchange and share information worldwide. It makes possible for people around the world to connect and share ideas across time zones and geographic locations. Exploring the Internet: Researching and Evaluating the Web
Surfing the Web Surfing the Web. The following are the three key factors in surfing the web. 1. Most surfing sessions start with the user-targeted keywords about the subject into a search engine. 2. Good strategies for searching the Web include writing research questions; extracting keywords from the questions and typing them into a search engine using synonyms if the keywords do not bring up desired results; keeping track of keywords and synonyms used; and recording the results of search. 3. Always be cautious about the information shared online and in visiting websites.
Assessing Credibility Different websites accessible on the Web can make the job of researchers very challenging. Carefully evaluate the information searched online. Consider the credibility, or trustworthiness and reliability of the content before taking it. There are and two of website: informational and commercial. Information Websites usually strive to offer credible content to users, while commercial website present inaccurate information in order to see something.