Download presentation
Presentation is loading. Please wait.
Published byWendy Mathews Modified over 8 years ago
3
Introduction to Computing Computer Programming Terrorisom
4
No Background in Cyber Security
5
Student Awareness Maintaining Integrity Smart User
6
Cover Relevant Topics Malware Phishing Points of Vulnerability Protection Options Resource Availability Consequences
7
Avoiding Dangerous Sites Domain Name Clues Intended Use Ethical Use
8
Personal Data Protection Passwords, SSN, Address, DOB Compromising Pictures/Videos Email Attachments & Links from unknown senders Social Engineering Protect Your Computing Devices
9
Produce an MLA Formatted Research Paper on a Cyber Security Related Topic Produce a Class Presentation on a Cyber Security Related Topic
10
Describe what is meant by cybercrime and who perpetrates it? Name and describe the types of viruses from which I need to protect my computer? Explain how you can protect a computer from viruses? Explain how hackers attack computing devices and describe the harm they can cause? Explain the purpose of a firewall and describe how it keeps a computer safe from hackers? Identify 2 methods for password management?
11
Illustrate how a person can surf the Internet anonymously and use biometric authentication devices to protect their data? Describe the management of online annoyances such as spyware and spam? Identify the data that should be backed up and describe the best methods for doing so? Explain what is meant by social engineering and describe how someone can avoid falling prey to phishing? Provide hands-on check for understanding
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.