Cyber Security For Kids 2.1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

CYBER

SECURITY FOR
KIDS 2

JOAS ANTONIO
ABOUT PDF
• This document was made for parents, teachers, teenagers and children with basic
computer skills or who want to learn more about cybersecurity
• Intended for children from 10 years of age

https://www.linkedin.com/in/joas-antonio-dos-santos
W H AT I S
CYBERSECURITY?
• Cybersecurity is the act of
protecting the internet and its
technologies from unwanted
intruders. Quite simply, those who
work with cybersecurity have a
responsibility to prevent evil
hackers from committing some kind
of improper act against a
company.

https://www.linkedin.com/in/joas-antonio-dos-santos
Availability Integrity Confidentiality
Ensuring that no information is Prevent unauthorized access and
Ensuring that the website or changed by unauthorized persons. ensure your privacy.
application must always be active Example: Ensuring that your friend Example: Prevent your colleague
for you to use. does not change their nickname or
from knowing your account
Example: Ensuring a game server is password for their account in an online
game information in an online game
always up and running

TRIAD OF CYBERSECURITY
H AC K E R V S C H E AT E R
You must have already come across these two words - Hacker and Cheater, but what's the difference?

MALICIOUS HACKER CHEATER


The Hacker is a person with The Cheater or the famous
great computer skills, knowing in cheater, is the one who takes
depth how technology works and advantage of gaps in games
ways to improve, modify and to win a video game match or
create something new. In that even get the best items.
case he uses his abilities for evil.
Being through programs known
There are those malicious as cheats, or taking advantage
hackers like the character shown of game bugs. We can
to the side, villain from the compare it to Marvel's Loki,
Cyberchase series, who use their who uses his powers to
skills to break into computers and overcome himself in various
steal passwords for example. challenges.
https://www.linkedin.com/in/joas-antonio-dos-santos
NETWORK
COMPUTER
SECURITY
• The goal is to protect a computer
network, which are your devices like
computers and cell phones that are
connected and exchanging
information with each other. Ensuring
that no person with bad intentions
does not hack your device.

https://www.linkedin.com/in/joas-antonio-dos-santos
P ROTECT YOUR COMP UTER
1. Use antivirus software: Think of antivirus as a vaccine, it 2. Put a strong password: Passwords are the secret that will
ensures that your computer is not infected by any virus that restrict access to unauthorized people;
destroys your computer or cell phone;

3. Backup or copy of information: It is very important to 4. Safe internet browsing: It is an important point of security,
ensure that you do not end up losing any kind of information because when you search the internet you are exposed to
from your computer. Think of backup as copying keys, so you various threats, so always search on trusted sites and don't
always have a spare key in case you lose one; click on anything you see around, consult someone before
that.

https://www.linkedin.com/in/joas-antonio-dos-santos
COMP UTER VÍRUS
• Computer viruses are like diseases that affect us, without
proper care, we can get sick and contract a virus that can
be weak or strong.

• But unlike the virus that affects us humans, computer


viruses aim to do actions that can harm your computer,
lock your files or even steal money and passwords.

• Some Malicious Hackers create virus to steal game


account passwords or even spy on you without your
awareness

https://www.linkedin.com/in/joas-antonio-dos-santos
COMP UTER VÍRUS
- DEFEND

1. Use antivirus;

2. Do not click on any website or download button;

3. Do not download any apps from unknown websites;

4. If you receive something sent by your friend or family


member, confirm that they sent it;

5. Do not download anything that comes by email, whatsapp


and telegram for example.

https://www.linkedin.com/in/joas-antonio-dos-santos
SAFE BROW SING SECURITY

• Be careful when accessing websites or downloading • Do not click on advertisements that appear on the websites
files on the internet, you could end up being you are browsing, it may end up being a bait to steal your
hacked; information or invade your device.

• Do not write down the passwords


of your game accounts, Netflix,
Amazon Prime, Disney and among
other services in notepad,
• Before entering a password or making a purchase, make
whatsapp conversations or
sure that the site has a closed lock, so you are guaranteed
anywhere else.
that the information you enter will be more "secure"
• Do not access public internet
networks, called wifi, as criminals
can end up stealing your
information and breaking into
your devices.

https://www.linkedin.com/in/joas-antonio-dos-santos
SOCIAL NETWORK SECURITY
• Avoid talking to strangers on social media;
• Avoid posting any kind of photo on your social media, as people with
bad intentions can use it for evil;
• Avoid accessing online chats without knowing the people who are
participating, as you can avoid numerous risks;
• Do not click on links or download files from unknown people, you can
use a site called *Virus Total* to help you analyze the origin of this
file
• Put strong passwords on your account and enable the second access
factor for extra protection

The Dangers Of Social Media (Child Predator Experiment)


https://www.youtube.com/watch?v=6jMhMVEjEQg

The Dangers of Social Media 2


https://www.youtube.com/watch?v=c4sHoDW8QU4

5 Ways to Protect Yourself Online https://www.youtube.com/watch?v=-


ni_PWxrsNo
https://www.linkedin.com/in/joas-antonio-dos-santos
PROTECT YOUR CELL PHONE

• Always put a screen lock on your phone;


• Do not download apps outside official stores like Apple Store or
Play Store;
• Keep your phone and apps up to date;
• Avoid downloading files and applications that you see in tutorials
on the internet, many can end up harming your phone;
• Do not register credit cards in your accounts;
• Make backup copies of your data, especially your conversations
on whatsapp and other social networks;
• Always keep Bluetooth off if you don't use a wireless headset;
• Don't write down passwords on your cell phone;
• See the security options that your cell phone offers, there are
always great options to be activated;

Mobile Security Tips -


https://www.youtube.com/watch?v=ahNb6kA0Lms

https://www.linkedin.com/in/joas-antonio-dos-santos
ONLINE SHOPPING SECURITY
Beware of fraudulent emails
Shop on trusted sites, that arrive in your inbox;
remember that sometimes the
cheap ends up costing more Always make a purchase
using the payment system
Do not save your credit card
offered by the website you
on any shopping site
are buying from, any
problem with the payment,
Check the website reputation communicate directly to the
of the store you are shopping website
for
Use secure wifi networks to shop
Monitor your credit
Create strong passwords on any card statement
shopping site
Do not send credit
card information by
email
P ROTECT YOUR NETWORK COMP UTER
Use a virtual private network
Disable automatic connection (VPN) when accessing the
to unknown or unexpected Wi- Internet on public or unknown
Fi networks. networks.

Make sure network devices like


routers and switches are also Limit access to your
protected with strong passwords network to only trusted
and security updates. and authorized
devices.
C Y B E R B U L LY I N G

• Cyberbullying is bullying with the use of digital technologies.


It can take place on social media, messaging platforms,
gaming platforms and mobile phones. It is repeated
behaviour, aimed at scaring, angering or shaming those who
are targeted. Examples include:
• spreading lies about or posting embarrassing photos or
videos of someone on social media
• sending hurtful, abusive or threatening messages, images
or videos via messaging platforms
• impersonating someone and sending mean messages to
others on their behalf or through fake accounts.

https://www.linkedin.com/in/joas-antonio-dos-santos
H O W T O AV O I D C Y B E R B U L L Y I N G

• Talk about the topic in schools;


• Explain the consequences of Cyberbullying;
• Explain about local government laws on Bullying and Cyberbullying;
• Talk to the country about it;
• Seek psychological support;
• Be careful what you post on social media and the friends you have;
• Ignore the bully, if possible block any unwanted comments;
Stop Cyberbullying: https://www.youtube.com/watch?v=zASfp7_-lhg
How to prevent Cyberbullying:
https://www.youtube.com/watch?v=4g8w7GV3-iA

https://www.linkedin.com/in/joas-antonio-dos-santos
SECURITY DEFINITIONS
• Authentication: The process of verifying a user's
identity before allowing access to systems or
network resources. • Malware: Any malicious software designed to • Strong Password: A complex password that is
cause system damage or steal confidential difficult to guess or hack.
information.
• Security vulnerability: A flaw or weakness in a
• Backup: A backup copy of important data that system or application that could be exploited to
can be used to restore data in the event of a allow unauthorized access or damage the
system failure. • Phishing: A social engineering technique used to system.
steal sensitive information, such as passwords,
through fraudulent emails or fake websites.
• Encryption: The process of transforming data
into an encrypted format to protect it from
unauthorized access. • Security policy: A set of rules and practices that
guide users' actions regarding security.

• Firewall: A software or hardware that protects a


network by controlling incoming and outgoing • Virtual Private Network (VPN): A secure
traffic. connection that allows a user to connect to a
network from a remote location.
SECURITY DEFINITIONS #2
• Spam: Unsolicited emails that often contain advertising or• Social engineering: A technique used to trick users into
phishing. providing confidential information.
• Privacy: The user's right to keep personal and
confidential information private and secure.

• Security Update: A software patch designed to fix a • Patch Management: A process for applying software
security vulnerability or other issue. updates to vulnerable systems to fix known
vulnerabilities. • Ransomware: A type of malware that encrypts user data
and demands payment in exchange for a decryption
key.
• Security Token: A physical device or application that
generates a temporary passcode for two-factor • Admin Password: A password used to access system or
authentication. device administration functions.
• Physical security: The protection against unauthorized
access to physical facilities that contain confidential
information.
• Digital certificate: A digital credential that confirms the • Security monitoring: A security practice that involves
user's identity and is used for data encryption. analyzing logs and tracking suspicious activity on the
network.
• Network security: The protection of a network from
external and internal threats, including malware, denial
• Secure DNS: A technology that protects against spoofed of service attacks, and other threats.
DNS attacks, redirects, and other threats. • Guest network: A separate network that allows guests to
access the Internet without accessing the main network.
B O O K S R E C O M E N DAT I O N S

https://www.linkedin.com/in/joas-antonio-dos-santos

You might also like