SlideShare ist ein Scribd-Unternehmen logo
1 von 12
CYBER SECURITY 101
FOR 5TH AND 6TH GRADERS
STEPHEN L. THOMAS
VP, SALES & OPERATIONS @ CYBERBIT
TWITTER – STEPHEN__THOMAS
LINKEDIN – STEPHENT1
AGENDA
• Cyber Security 101
• Secure Passwords
• Social Engineering
• Stop. Think. Connect.
• Cyber Security Jeopardy
WHAT IS CYBER SECURITY?
• Cyber-safety is a common term
used to describe a set of
practices, measures and/or
actions you can take to protect
personal information and your
computer from attacks.
CYBER SECURITY 101 (VIDEO)
HTTPS://YOUTU.BE/SDPXDDDZXFE
CYBER SECURITY VIDEO 101 DISCUSSION
• What is the Internet, and how did connecting computers into
networks introduce the vulnerabilities that criminals take
advantage of today?
• What are some of the ways in which networked computers can
be compromised, and why is it difficult to prevent these kinds
of attacks?
SECURE PASSWORDS (VIDEO)
HTTPS://YOUTU.BE/G9TDMVABQIS
SECURE PASSWORD DISCUSSION
• Why do these tips improve the strength of a password?
• Why do security experts recommend using long passwords —
specifically, passwords that are 10 digits long?
• What is two-step authentication, and how does this enhance user security
and privacy?
• To think about…
• How secure are your passwords?
• Do you think you should come up with more secure passwords?
• Do you currently use the same password on more than one website or device?
• Now that you have learned more about how to protect your own data online, what
changes might they make to their online behavior?
PASSWORD SECURITY
• Which password is most secure?
• Username Password Character set
• ictest1 testing Lowercase letters
• ictest2 break1ng Lowercase letters and numbers
• ictest3 Bre@k1ng Lowercase letters, uppercase letters, numbers
and symbols
SOCIAL ENGINEERING (VIDEO)
HTTPS://YOUTU.BE/HM6L0BEHFGE
BEING PRIVACY SAVVY
• SHARE WITH CARE – WHAT YOU POST CAN LAST A LIFETIME:
Help your children understand that any information they share
online can easily be copied and is almost impossible to take
back. Teach them to consider who might see a post and how it
might be perceived in the future.
• PERSONAL INFORMATION IS LIKE MONEY. VALUE IT. PROTECT
IT.: Information about your kids, such as the games they like to
play and what they search for online, has value ‒ just like
money. Talk to your kids about the value of their information
and how to be selective with the information they provide to
apps and websites.
• POST ONLY ABOUT OTHERS AS YOU WOULD LIKE TO HAVE THEM
POST ABOUT YOU: Remind children and family members about
the golden rule and that it applies online as well. What they do
online can positively or negatively impact other people.
• OWN YOUR ONLINE PRESENCE: Start the conversation about the
public nature of the Internet early. Learn about and teach your
kids how to use privacy and security settings on their favorite
online games, apps and platforms.
• PRIVACY GRADE
STOP. THINK. CONNECT.
• KEEP A CLEAN MACHINE
• KEEP SECURITY SOFTWARE CURRENT
• AUTOMATE SOFTWARE UPDATES
• PROTECT ALL DEVICES THAT CONNECT TO THE INTERNET
• PLUG & SCAN
• PROTECT YOUR PERSONAL INFORMATION
• SECURE YOUR ACCOUNTS
• MAKE PASSWORDS LONG AND STRONG
• UNIQUE ACCOUNT, UNIQUE PASSWORD
• WRITE IT DOWN AND KEEP IT SAFE
• OWN YOUR ONLINE PRESENCE
• CONNECT WITH CARE
• WHEN IN DOUBT THROW IT OUT
• GET SAVVY ABOUT WI‐FI HOTSPOTS
• PROTECT YOUR $$
CYBER SECURITY JEOPARDY
HTTPS://JEOPARDYLABS.COM/PLAY/CYBER-SECURITY

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 

Was ist angesagt? (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Responsible Digital Citizenship
Responsible Digital CitizenshipResponsible Digital Citizenship
Responsible Digital Citizenship
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber crime and its safety
Cyber crime and its safetyCyber crime and its safety
Cyber crime and its safety
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 

Andere mochten auch (11)

Manjoor estate
Manjoor estateManjoor estate
Manjoor estate
 
bioandfactsheet
bioandfactsheetbioandfactsheet
bioandfactsheet
 
Contoh STORY BOARD Clas Mild Cigarette
Contoh STORY BOARD Clas Mild CigaretteContoh STORY BOARD Clas Mild Cigarette
Contoh STORY BOARD Clas Mild Cigarette
 
Funny food
Funny foodFunny food
Funny food
 
Central bank
Central bankCentral bank
Central bank
 
Simon_Schwaighofer_In_Focus_Golden_Drum_Festival
Simon_Schwaighofer_In_Focus_Golden_Drum_FestivalSimon_Schwaighofer_In_Focus_Golden_Drum_Festival
Simon_Schwaighofer_In_Focus_Golden_Drum_Festival
 
тз Dgm mz 75 с прессом обнинск
тз Dgm mz 75 с прессом обнинсктз Dgm mz 75 с прессом обнинск
тз Dgm mz 75 с прессом обнинск
 
A Guide to Radon resistant new Construction
A Guide to Radon resistant new ConstructionA Guide to Radon resistant new Construction
A Guide to Radon resistant new Construction
 
CR parking analysis
CR parking analysisCR parking analysis
CR parking analysis
 
Jackie (2)
Jackie (2)Jackie (2)
Jackie (2)
 
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE News
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE NewsCoastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE News
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE News
 

Ähnlich wie Cyber Security for 5th and 6th Graders

Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 

Ähnlich wie Cyber Security for 5th and 6th Graders (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Cyber Security for 5th and 6th Graders

  • 1. CYBER SECURITY 101 FOR 5TH AND 6TH GRADERS STEPHEN L. THOMAS VP, SALES & OPERATIONS @ CYBERBIT TWITTER – STEPHEN__THOMAS LINKEDIN – STEPHENT1
  • 2. AGENDA • Cyber Security 101 • Secure Passwords • Social Engineering • Stop. Think. Connect. • Cyber Security Jeopardy
  • 3. WHAT IS CYBER SECURITY? • Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks.
  • 4. CYBER SECURITY 101 (VIDEO) HTTPS://YOUTU.BE/SDPXDDDZXFE
  • 5. CYBER SECURITY VIDEO 101 DISCUSSION • What is the Internet, and how did connecting computers into networks introduce the vulnerabilities that criminals take advantage of today? • What are some of the ways in which networked computers can be compromised, and why is it difficult to prevent these kinds of attacks?
  • 7. SECURE PASSWORD DISCUSSION • Why do these tips improve the strength of a password? • Why do security experts recommend using long passwords — specifically, passwords that are 10 digits long? • What is two-step authentication, and how does this enhance user security and privacy? • To think about… • How secure are your passwords? • Do you think you should come up with more secure passwords? • Do you currently use the same password on more than one website or device? • Now that you have learned more about how to protect your own data online, what changes might they make to their online behavior?
  • 8. PASSWORD SECURITY • Which password is most secure? • Username Password Character set • ictest1 testing Lowercase letters • ictest2 break1ng Lowercase letters and numbers • ictest3 Bre@k1ng Lowercase letters, uppercase letters, numbers and symbols
  • 10. BEING PRIVACY SAVVY • SHARE WITH CARE – WHAT YOU POST CAN LAST A LIFETIME: Help your children understand that any information they share online can easily be copied and is almost impossible to take back. Teach them to consider who might see a post and how it might be perceived in the future. • PERSONAL INFORMATION IS LIKE MONEY. VALUE IT. PROTECT IT.: Information about your kids, such as the games they like to play and what they search for online, has value ‒ just like money. Talk to your kids about the value of their information and how to be selective with the information they provide to apps and websites. • POST ONLY ABOUT OTHERS AS YOU WOULD LIKE TO HAVE THEM POST ABOUT YOU: Remind children and family members about the golden rule and that it applies online as well. What they do online can positively or negatively impact other people. • OWN YOUR ONLINE PRESENCE: Start the conversation about the public nature of the Internet early. Learn about and teach your kids how to use privacy and security settings on their favorite online games, apps and platforms. • PRIVACY GRADE
  • 11. STOP. THINK. CONNECT. • KEEP A CLEAN MACHINE • KEEP SECURITY SOFTWARE CURRENT • AUTOMATE SOFTWARE UPDATES • PROTECT ALL DEVICES THAT CONNECT TO THE INTERNET • PLUG & SCAN • PROTECT YOUR PERSONAL INFORMATION • SECURE YOUR ACCOUNTS • MAKE PASSWORDS LONG AND STRONG • UNIQUE ACCOUNT, UNIQUE PASSWORD • WRITE IT DOWN AND KEEP IT SAFE • OWN YOUR ONLINE PRESENCE • CONNECT WITH CARE • WHEN IN DOUBT THROW IT OUT • GET SAVVY ABOUT WI‐FI HOTSPOTS • PROTECT YOUR $$