Want to make creations as awesome as this one?

Transcript

PRESENTATION

Cybersecurity's presentation

Introduction
Cryptography/VPN
Firewall/Updated and difficult password/Cookies
2. How to protect yourself
1. The Internet's dangers
The Net

INDEX

Thanks

Social engineering

The Catfishing

The phishing

Malware

01

The Dark Side of the Web: Navigating the Internet’s Hidden Dangers

1. The Internet's dangers

+INFO

+INFO

Cambridge

The Net is a fantastic place, it is the engine of momentous changes; on the other hand, it exposes us to various dangers...

+INFO

Cambridge

Phishing is the practice of sending out fraudulent emails that look like an email from trusted sources. The goal is to steal sensitive data such as credit card numbers and login information. It is the most common type of cyber-attack.

Phishing

+INFO

Catfishing is the act of creating a fake identity online and using it to lure people into a relationship.This type of impersonation is a form of cyberbullying, where the target is harmed as the catfisher plays games with their mind. A cyberbully may attempt to gain trust and persuade their target to reveal sensitive information that can be used as a means of humiliation later.

Catfishing

Cambridge

+INFO

Cambridge

Example:
  • Viruses
  • Worms
  • Trojan viruses
  • Spyware
  • Adware
  • Ransomware
Malware, short for "malicious software", refers to any intrusive software developed by cybercriminals (often called "hackers") to steal data and damage or destroy computers and computer systems.

Malware

VS

Hackers

Hakers

+INFO

Cambridge

Social engineering

In computing, social engineering refers to the methods cybercriminals use to get victims to take some sort of questionable action, often involving a breach of security, the sending of money, or giving up confidential information.

02

Surfing Safely: A Guide to Protecting Yourself on the Internet

2. How to protct yourself

Introduction

The internet exposes us to potential online threats. It’s essential to understand internet safety rules to protect your data and devices. Some key internet dangers include identity theft, data breaches, malware and viruses, phishing and scam emails, fake websites, online scams, romance scams, inappropriate content, cyberbullying and faulty privacy settings.

+INFO

A VPN, or Virtual Private Network, is a service that encrypts your internet traffic and then routes it through your VPN provider’s server before you connect to a website or another online service. This helps disguise your identity and activity on the internet.

VPN

Cryptography is a series of methods to make a message incomprehensible to unauthorized people.

Cryptography

There are diffrent ways to defend our personal data, in these slides we will se few of these ways:

Cambridge

+INFO

Cookies are files that track the actions on the site where we are browsing. It is good to accept only the essential cookies and not every.

Cookies

Updating your passwords regularly and using difficult passwords are important steps in protecting your online security. A difficult password is one that is hard to guess and typically includes a combination of upper and lower case letters, numbers, and special characters. Updating your passwords regularly helps to ensure that even if one of your accounts is compromised, the potential damage is limited.

Update and difficult passwords

A firewall is a network security system that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules for allowed or blocked the events.

Firewall

Cambridge

S.Y 2022/2023
From 3rd DI
  • Alessandro Napolano
  • Mattia Coppola
  • Salvio Esposito
  • Simone Iaccarino
Team:

THANK YOU!