Cybersecurity and privacy's presentation
cirotty
Created on May 28, 2023
More creations to inspire you
HISTORY OF THE CIRCUS
Presentation
LETTERING PRESENTATION
Presentation
SPRING HAS SPRUNG!
Presentation
BIDEN’S CABINET
Presentation
VACCINES & IMMUNITY
Presentation
UNCOVERING REALITY
Presentation
LAS ESPECIES ANIMALES MÁS AMENAZADAS
Presentation
Transcript
PRESENTATION
Cybersecurity's presentation
Introduction
Cryptography/VPN
Firewall/Updated and difficult password/Cookies
2. How to protect yourself
1. The Internet's dangers
The Net
INDEX
Thanks
Social engineering
The Catfishing
The phishing
Malware
01
The Dark Side of the Web: Navigating the Internet’s Hidden Dangers
1. The Internet's dangers
+INFO
+INFO
Cambridge
The Net is a fantastic place, it is the engine of momentous changes; on the other hand, it exposes us to various dangers...
+INFO
Cambridge
Phishing is the practice of sending out fraudulent emails that look like an email from trusted sources. The goal is to steal sensitive data such as credit card numbers and login information. It is the most common type of cyber-attack.
Phishing
+INFO
Catfishing is the act of creating a fake identity online and using it to lure people into a relationship.This type of impersonation is a form of cyberbullying, where the target is harmed as the catfisher plays games with their mind. A cyberbully may attempt to gain trust and persuade their target to reveal sensitive information that can be used as a means of humiliation later.
Catfishing
Cambridge
+INFO
Cambridge
Example:
- Viruses
- Worms
- Trojan viruses
- Spyware
- Adware
- Ransomware
Malware, short for "malicious software", refers to any intrusive software developed by cybercriminals (often called "hackers") to steal data and damage or destroy computers and computer systems.
Malware
VS
Hackers
Hakers
+INFO
Cambridge
Social engineering
In computing, social engineering refers to the methods cybercriminals use to get victims to take some sort of questionable action, often involving a breach of security, the sending of money, or giving up confidential information.
02
Surfing Safely: A Guide to Protecting Yourself on the Internet
2. How to protct yourself
Introduction
The internet exposes us to potential online threats. It’s essential to understand internet safety rules to protect your data and devices. Some key internet dangers include identity theft, data breaches, malware and viruses, phishing and scam emails, fake websites, online scams, romance scams, inappropriate content, cyberbullying and faulty privacy settings.
+INFO
A VPN, or Virtual Private Network, is a service that encrypts your internet traffic and then routes it through your VPN provider’s server before you connect to a website or another online service. This helps disguise your identity and activity on the internet.
VPN
Cryptography is a series of methods to make a message incomprehensible to unauthorized people.
Cryptography
There are diffrent ways to defend our personal data, in these slides we will se few of these ways:
Cambridge
+INFO
Cookies are files that track the actions on the site where we are browsing. It is good to accept only the essential cookies and not every.
Cookies
Updating your passwords regularly and using difficult passwords are important steps in protecting your online security. A difficult password is one that is hard to guess and typically includes a combination of upper and lower case letters, numbers, and special characters. Updating your passwords regularly helps to ensure that even if one of your accounts is compromised, the potential damage is limited.
Update and difficult passwords
A firewall is a network security system that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules for allowed or blocked the events.
Firewall
Cambridge
S.Y 2022/2023
From 3rd DI
- Alessandro Napolano
- Mattia Coppola
- Salvio Esposito
- Simone Iaccarino
Team:
THANK YOU!