0% found this document useful (0 votes)
36 views22 pages

q4 Lesson 1cybersecurity

Uploaded by

Rosenda Columna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views22 pages

q4 Lesson 1cybersecurity

Uploaded by

Rosenda Columna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Cybersecurity

Welcome to Cybersecurity Basics

● Understand the importance of protecting digital


information.
● Learn key concepts to keep your personal
information safe online.
What is Cybersecurity?
● The practice of protecting computers,
servers, networks, and data.
● Involves measures to prevent cyber
attacks.
Common Types of Cyber Threats
● Malware: Harmful software like viruses and
ransomware.
● Phishing: Tricks to steal sensitive
information.
● Hacking: Unauthorized access to systems.
Common Types of Cyber Threats
● Malware: Harmful software like viruses and
ransomware.
● Phishing: Tricks to steal sensitive
information.
● Hacking: Unauthorized access to systems.
Common Types of Cyber Threats
● Malware: Harmful software like viruses and
ransomware.
● Phishing: Tricks to steal sensitive
information.
● Hacking: Unauthorized access to systems.
Understanding Malware
● Malware stands for "malicious software."
● It includes viruses, worms, trojan horses, and
ransomware.
● Designed to damage or gain unauthorized
access to your devices.
Phishing: Don't Take the Bait!
● A deceptive attempt to steal your personal info.
● Often comes in the form of fake emails or
websites.
● Always verify the source before clicking on
links.
The Reality of Hacking
● Hacking is gaining unauthorized access to data
in a system.
● Hackers may steal, manipulate, or destroy
information.
● It's not just for experts – anyone can be a
target.
Creating Strong Passwords
● Use a mix of letters, numbers, and symbols.
● Avoid common words or easy-to-guess
info.
● Never reuse passwords across different
accounts.
Two-Factor Authentication (2FA)
● Adds an extra layer of security to your
accounts.
● Requires a second form of verification,
like a text code.
● Protects even if your password is
compromised.
Keeping Software Up-to-Date
● Updates often include critical security
patches.
● Regular updates protect against new threats.
● Don't ignore update notifications on your
devices.
Spotting Suspicious Emails and Websites
● Look out for poor spelling or grammar.
● Check the email address or URL for
oddities.
● Be wary of urgent or too-good-to-be-true
offers.
What Not to Share Online
● Personal information like your address or phone
number.
● Sensitive details such as passwords or financial
info.
● Anything you wouldn't want strangers to know.
Think Before You Click
● Verify links before clicking, especially in
unsolicited emails.
● Hover over links to see where they really lead.
● When in doubt, go directly to the official
website.
Using Secure Wi-Fi Networks
● Public Wi-Fi can be risky for private
activities.
● Use a VPN for encryption on public
networks.
● Save sensitive tasks for secure, private Wi-
Fi.
Backing Up Your Data
● Regular backups can save you from data
loss.
● Use external drives or cloud services for
backups.
● Make it a habit to back up your data
periodically.
THANK YOU!

You might also like