0% found this document useful (0 votes)
66 views23 pages

Cyber Security

Cybersecurity is important to protect personal information and data from threats online. Some common cyber threats include viruses, malware, phishing scams, and hacking which can harm devices and steal data. Phishing involves tricking users into providing login details or personal information by posing as a legitimate entity. Man-in-the-middle attacks can intercept unsecured WiFi communications to access sensitive information. It is important to use strong passwords, be wary of unsolicited messages, and protect accounts and devices with security measures like two-factor authentication.

Uploaded by

nadia dahmane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views23 pages

Cyber Security

Cybersecurity is important to protect personal information and data from threats online. Some common cyber threats include viruses, malware, phishing scams, and hacking which can harm devices and steal data. Phishing involves tricking users into providing login details or personal information by posing as a legitimate entity. Man-in-the-middle attacks can intercept unsecured WiFi communications to access sensitive information. It is important to use strong passwords, be wary of unsolicited messages, and protect accounts and devices with security measures like two-factor authentication.

Uploaded by

nadia dahmane
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

CYBER

SECURITY
Device
Security

CCTV

Computer Fingerprint
Security

Global
Security

Prepared by. Ayoub Anni, lamiae Aithammou,


Nadia dahmane and Lahcen Benchikh Supervised by. Mr Ali Boukhir
Cybersecurity is like a lock for your
computer and other electronic
devices. It helps to protect your
personal information and data from
bad people who might try to steal
or harm it. Just like you lock your
front door to keep your house safe,
cybersecurity helps keep your
devices safe.
Why is cyber security
important ?
Cybersecurity is really important for everyone,
including students. When you use your computer
or other electronic devices, you might not realize
that there are bad guys out there who want to
steal your personal information and data. This
could be things like your name, address, phone
number, or even your passwords. If they get this
information, they could use it to do bad things like
steal your money or pretend to be you online.
That's why it's really important to use good
cybersecurity practices, like strong passwords
and being careful about clicking on links or
downloading things from the internet. By doing
this, you can help keep your information and data
safe from the bad guys.
What are cyber threats?

Cyber threats are online dangers
that can harm their electronic
devices and personal information.
 Cyber threats include viruses,
malware, phishing scams, and
hacking. These threats can come
from many different sources,
such as malicious websites,
emails, or downloads.
 Once a cyber threat gains
access to a student's device, it
can cause damage or steal
personal information.
What are some types of
cyber attacks
?
Phishing
 Phishing is a type of online scam where
a fake person or organization tries to
trick you into giving them important
personal information like your
passwords or credit card numbers.
 They might send you a message that
looks like it's from a real company, and
ask you to click on a link or enter your
login details on a fake website.
 The goal of phishing is to steal your
personal information and use it for bad
things like stealing your money or
identity. It's important to be careful and
check if a message is real before giving
out any personal information.
Man in the middle attack
 Man-in-the-Middle (MITM) attack
when students use public Wi-Fi
networks at coffee shops,
libraries, or other public places. If
the public Wi-Fi network is not
secure, a hacker could potentially
intercept the communication
between the student's device and
the internet. This could allow the
hacker to see what websites the
student is visiting and potentially
steal login credentials or personal
information.
How to protect our data from
cyber attacks ?
Two-factor authentication
Study case 1
“Ahmed is a 16-year-old who loves using
social media. One day,he received a message
from a friend on Instagram, asking him to click What happened to
on a link to enter a giveaway contest. Ahmed
clicked on the link and entered his username Ahmed?
and password, but nothing happened. Later on, What did he learn
ahmed found out that the message was a
scam, and the cybercriminal who sent the from this experience ?
message used his login information to access What would you do if
his account and personal information.
you were in his
place?
Study case 2
 Sara is a high school student who loves shopping online. One day, she received an email
from a popular online brand, offering a 50% discount on all purchases. Excited about the
deal, she clicked on the link in the email and landed on the brand's website.
 Sara filled her shopping cart with items she wanted to buy and proceeded to checkout. She
entered her personal and payment information and hit the submit button. However, her
transaction failed and she received an error message.
 Confused and frustrated Sara decided to abandon her shopping cart and try again later.
However, a few days later, she received a notification from her bank that a large sum of
money had been charged to her credit card .It turned out that Sara had fallen victim to a
man-in-the-middle attack. An attacker had intercepted her communication with the brand's
website and redirected her to a fake website that looked identical to the brand's website. The
attacker had stolen her personal and payment information and used it to make unauthorized
purchases.
What happened to sara? And why
What did she learn from this experience ?
What would you do if you were in his place?

You might also like