Cyber Security For Kids 2.1
Cyber Security For Kids 2.1
Cyber Security For Kids 2.1
SECURITY FOR
KIDS 2
JOAS ANTONIO
ABOUT PDF
• This document was made for parents, teachers, teenagers and children with basic
computer skills or who want to learn more about cybersecurity
• Intended for children from 10 years of age
https://www.linkedin.com/in/joas-antonio-dos-santos
W H AT I S
CYBERSECURITY?
• Cybersecurity is the act of
protecting the internet and its
technologies from unwanted
intruders. Quite simply, those who
work with cybersecurity have a
responsibility to prevent evil
hackers from committing some kind
of improper act against a
company.
https://www.linkedin.com/in/joas-antonio-dos-santos
Availability Integrity Confidentiality
Ensuring that no information is Prevent unauthorized access and
Ensuring that the website or changed by unauthorized persons. ensure your privacy.
application must always be active Example: Ensuring that your friend Example: Prevent your colleague
for you to use. does not change their nickname or
from knowing your account
Example: Ensuring a game server is password for their account in an online
game information in an online game
always up and running
TRIAD OF CYBERSECURITY
H AC K E R V S C H E AT E R
You must have already come across these two words - Hacker and Cheater, but what's the difference?
https://www.linkedin.com/in/joas-antonio-dos-santos
P ROTECT YOUR COMP UTER
1. Use antivirus software: Think of antivirus as a vaccine, it 2. Put a strong password: Passwords are the secret that will
ensures that your computer is not infected by any virus that restrict access to unauthorized people;
destroys your computer or cell phone;
3. Backup or copy of information: It is very important to 4. Safe internet browsing: It is an important point of security,
ensure that you do not end up losing any kind of information because when you search the internet you are exposed to
from your computer. Think of backup as copying keys, so you various threats, so always search on trusted sites and don't
always have a spare key in case you lose one; click on anything you see around, consult someone before
that.
https://www.linkedin.com/in/joas-antonio-dos-santos
COMP UTER VÍRUS
• Computer viruses are like diseases that affect us, without
proper care, we can get sick and contract a virus that can
be weak or strong.
https://www.linkedin.com/in/joas-antonio-dos-santos
COMP UTER VÍRUS
- DEFEND
1. Use antivirus;
https://www.linkedin.com/in/joas-antonio-dos-santos
SAFE BROW SING SECURITY
• Be careful when accessing websites or downloading • Do not click on advertisements that appear on the websites
files on the internet, you could end up being you are browsing, it may end up being a bait to steal your
hacked; information or invade your device.
https://www.linkedin.com/in/joas-antonio-dos-santos
SOCIAL NETWORK SECURITY
• Avoid talking to strangers on social media;
• Avoid posting any kind of photo on your social media, as people with
bad intentions can use it for evil;
• Avoid accessing online chats without knowing the people who are
participating, as you can avoid numerous risks;
• Do not click on links or download files from unknown people, you can
use a site called *Virus Total* to help you analyze the origin of this
file
• Put strong passwords on your account and enable the second access
factor for extra protection
https://www.linkedin.com/in/joas-antonio-dos-santos
ONLINE SHOPPING SECURITY
Beware of fraudulent emails
Shop on trusted sites, that arrive in your inbox;
remember that sometimes the
cheap ends up costing more Always make a purchase
using the payment system
Do not save your credit card
offered by the website you
on any shopping site
are buying from, any
problem with the payment,
Check the website reputation communicate directly to the
of the store you are shopping website
for
Use secure wifi networks to shop
Monitor your credit
Create strong passwords on any card statement
shopping site
Do not send credit
card information by
email
P ROTECT YOUR NETWORK COMP UTER
Use a virtual private network
Disable automatic connection (VPN) when accessing the
to unknown or unexpected Wi- Internet on public or unknown
Fi networks. networks.
https://www.linkedin.com/in/joas-antonio-dos-santos
H O W T O AV O I D C Y B E R B U L L Y I N G
https://www.linkedin.com/in/joas-antonio-dos-santos
SECURITY DEFINITIONS
• Authentication: The process of verifying a user's
identity before allowing access to systems or
network resources. • Malware: Any malicious software designed to • Strong Password: A complex password that is
cause system damage or steal confidential difficult to guess or hack.
information.
• Security vulnerability: A flaw or weakness in a
• Backup: A backup copy of important data that system or application that could be exploited to
can be used to restore data in the event of a allow unauthorized access or damage the
system failure. • Phishing: A social engineering technique used to system.
steal sensitive information, such as passwords,
through fraudulent emails or fake websites.
• Encryption: The process of transforming data
into an encrypted format to protect it from
unauthorized access. • Security policy: A set of rules and practices that
guide users' actions regarding security.
• Security Update: A software patch designed to fix a • Patch Management: A process for applying software
security vulnerability or other issue. updates to vulnerable systems to fix known
vulnerabilities. • Ransomware: A type of malware that encrypts user data
and demands payment in exchange for a decryption
key.
• Security Token: A physical device or application that
generates a temporary passcode for two-factor • Admin Password: A password used to access system or
authentication. device administration functions.
• Physical security: The protection against unauthorized
access to physical facilities that contain confidential
information.
• Digital certificate: A digital credential that confirms the • Security monitoring: A security practice that involves
user's identity and is used for data encryption. analyzing logs and tracking suspicious activity on the
network.
• Network security: The protection of a network from
external and internal threats, including malware, denial
• Secure DNS: A technology that protects against spoofed of service attacks, and other threats.
DNS attacks, redirects, and other threats. • Guest network: A separate network that allows guests to
access the Internet without accessing the main network.
B O O K S R E C O M E N DAT I O N S
https://www.linkedin.com/in/joas-antonio-dos-santos