It Era

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Digital Literacy and

Cyber security awareness


Activity 3 & 4

A reviewer
Presented to
Ms. Baby Ruth M. Par
Living in the IT Era
Philippine Christian University - Dasmariñas

By
Louissa Arwen P. Aguila
BSN 2A

2024, September 24
DIGITAL LITERACY TYPES OF SOFTWARE
1. System software:
 Digital literacy is the ability to access, manage,  Manages computer hardware and provides essential
understand, integrate, communicate, evaluate and services (e.g., operating systems like windows, macos,
create information safely and appropriately through linux).
digital technologies for employment, decent jobs and 2. Application software:
entrepreneurship. It includes competences that are  Specific programs designed for various tasks (e.g.,
variously referred to as computer literacy, ICT literacy, word processors, web browsers, games)
information literacy and media literacy.
SYSTEM SOFTWARE EXAMPLES
WHAT IS DIGITAL LITERACY?
 Digital Literacy refers to the ability to understand 1. MICROSOFT WINDOWS OS
information and perform tasks in digital environments. 2. MacOS
3. Raspberry Pi OS
FUNDAMENTAL IT CONCEPTS 4. Linux OS
 Hardware, Software, Networks, and Data
APPLICATION SOFTWARE EXAMPLES
What is Computer?
 A computer is a programmable device that processes 1. Web browsers
data and performs various tasks by executing 2. Office application
instructions given to it in the form of programs or 3. Graphic & multimedia software
software. 4. Entertainment applications

Hardware NETWORKS
 Refers to the physical components of a computer  A network is a collection of interconnected
system or its infrastructure. These components can devices(computers, servers, routers) that can
be touched and seen. Function: Hardware performs communicateand share data with each other. It
the actual processing, storage, and input/output enable data sharing,remote communication, and
functions in a computing system. access to resources like the internet.

Hardware EXAMPLES TWO TYPES OF NETWORKS


 Central processing unit (cpu) 1. LOCAL AREA NETWORK (LAN)
 Memory (ram) 2. DATA
 Storages devices (keyboard, mouse)
 Utput devices (monitor, printer) WHAT IS INTERNET & WWW
 Networking equipment (routers, switches)  The Internet - is a vast network that connects
computers all over the world. Through the Internet,
PARTS AND ADAPTORS OF A PROCESSING /SYSTEM UNIT people can share information and communicate from
 Software anywhere with an Internet connection. The World
 Comprises programs and instructions that tell Wide Web -also known as the web, WWW or W3 --
hardware what to do. It’s a collection of code refers to all the public websites or pages that users
and data that enable computers to perform can access on their local computers and other devices
specific tasks. It translates user commands into through the internet. These pages and documents are
machine-readable instructions and controls the interconnected by means of hyperlinks that users
operation of hardware click on for information.
 Function: Software translates user commands
into machine-readable instructions and controls
the operation of hardware
GLOBAL CONNECTIVITY TIPS FOR NAVIGATING THE INTERNET LIKE A PRO
 The Internet is a vast network of interconnected KNOW THE LINGO
computers and servers, allowing people around the THINK BEFORE SHARING:
world to exchange data and communicate
instantaneously. The adoption of standardized  Familiarize yourself with terms such as browser,
protocols, such as TCP/IP, enabled seamless website, webpage, search engine, or URL.
communication between different types of  If you’re unsure about a site’s legitimacy, avoid
computers and networks. sharing personal information. Protect your privacy.
 SEARCH EFFICIENTLY:
E-COMMERCE AND ONLINE SERVICES  SECURE YOUR PASSWORDS: Use search engines like
 The Internet facilitated the growth of e-commerce, Google to find what you need. Note: Also be familiar
allowing businesses to sell products and services with Advance search techniques. Use strong, unique
online. Companies like Amazon and eBay became passwords for your online accounts. Consider using a
pioneers in this space. Online services like email, password manager.
instant messaging, and social networking platforms  AVOID FAKE OR FRAUDULENT SITES: Regularly update
changes the way people communicate and connect. your web browser and other software to enhance
security and functionality. Be cautious of websites
INFORMATION ACCESS AND SHARING that contain false information or scams. Stick to
 The Internet democratized access to information, reputable sources.
making vast amounts of knowledge available to  REMEMBER: ONLINE IS FOREVER:
anyone with an internet connection. User generated  BOOKMARK YOUR FAVORITES: Be mindful of what
content, including blogs, forums, and wikis, you post online. Once it’s out there, it can’t be
empowered individuals to contribute to the collective completely erased. Save websites you frequently visit
knowledge base of the web. by creating bookmarks. It makes accessing them
easier.
SOCIAL IMPACT
 The Internet and social media platforms have REFERENCES & RESEARCH
transformed how people interact and form  Merriam-Webster Online
communities, enabling connections, across https://www.merriam-webster.com/
geographical boundaries. It has also played a role in Provides definitions, pronunciations, and word origins.
political movements, activism, facilitating the spread  Educational Resources
of information and mobilization of people. Information Center eric.ed.gov/
Business and Innovation is an online library of education information, of Education
 The Internet has disrupted traditional business Sciences (IES) of the U.S. Department of Education.
models and spawned new ones, such as the gig research and the Institute sponsored by
economy and the sharing  Directory for Open Access Journals doaj.org
economy. It has also fueled innovation in is a community-curated online and provides access to
field like artificial intelligence, cloud highquality, peer-reviewed open-access, indexes directory
computing, and big data analytics. journals that
Challenges and Concerns  Google Scholar
 Alongside its many benefits, the Internet has raised scholar.google.com
concerns about privacy, cybersecurity, online provides a simple way to broadly search for scholarly
harassment, and the spread of disinformation. Issues literature. Search across a wide variety of disciplines and
related to digital divide, net neutrality, and online sources.
censorship remain important policy debates.  IEEE Xplore ieeexplore.ieee.org
Future Directions Specifically focused on engineering, technology, and
 The Internet continues to evolve with emerging computer science, to and IEEE Xplore provides access
technologies like 5G, the Internet of Things (IoT), and conference papers, journals, standards
blockchain. Advances in AI, virtual reality (VR), and
augmented reality (AR) are expected to further
transform online experiences.
 YouTube: A platform for user-generated videos and CYBER SECURITY
content on a wide range of topics.  Refers to the practice of protecting computer systems,
 TikTok: A social media app for short-form videos, networks, and digital data from theft, damage, or
music, and creative content. unauthorized access. It encompasses a wide range of
 Instagram: Allows users to share photos, videos, and technologies, processes, and practices designed to
stories with a focus on visual content. safeguard digital information and asset sand from
 Netflix: A subscription-based streaming service various threats vulnerabilities.
offering a vast library of movies, TV shows, and
documentaries. THREATS COUNTERED BY CYBER SECURITY
 Spotify: A music streaming service with access to a CYBERCRIME
vast library of songs, playlists, and podcasts.  it includes single actors or groups targeting systems
for financial gain or to cause disruption.
ENTERTAINMENT AND MEDIA RESOURCES CYBER-ATTACK
WHAT IS ETIQUETTE?  it often involves politically motivated information
 Etiquette is a set of unwritten rules that guide people gathering.
in certain social situations. These guidelines for “good CYBER-TERRORISM
etiquette” can differ depending on cultural  it is intended to undermine electronic systems to
expectations, as well as where the exchange takes cause panic or fear.
place, and with whom.
WHAT IS NETIQUETTE? CYBER SECURITY THREATS & VULNERABILITY
 Netiquette, a portmanteau of “net” and “etiquette,” MALWARE ATTACK
refers to the socially acceptable rules of online  Attacks use many methods to get malware into a
conduct. Just as etiquette guides our behavior in face- user’s device, most often social engineering. Users
to-face interactions, netiquette governs how we may be asked to take an action, such as clicking a link
interact with others on the internet. or opening an attachment.
PRACTICING NETIQUETTE MALWARE ATTACKS INCLUDE:
 Prioritize real people: Give undivided attention to TROJAN VIRUS
people in physical settings, avoiding distractions from  tricks a user into thinking it is a harmless file. A Trojan
electronic devices. can launch an attack on a system and can establish a
 Know your online environment: Adjust your behavior backdoor, which attackers can use.
based on the online platform or context, maintaining RANSOMWARE
appropriate conduct in different settings.  prevents access to the data of the victim and
 Share expertise responsibly: Share accurate and threatens to delete or publish it unless a ransom is
helpful information online, avoiding the spread of paid.
misinformation. WIPER MALWARE
 Use a friendly tone: Convey respect by using positive  intends to destroy data or systems, by overwriting
language, being polite, offering praise when targeted files or destroying an entire file system.
appropriate, and using phrases like "please" and Wipers are usually intended to send a political
"thank you." message, or hide hacker activities after data
 Avoid using All Capital Letter: it will look like you are exfiltration.
angry or shouting Avoid spamming: Respect others' WORMS
communication preferences by seeking permission  this malware is designed to exploit backdoors and
before sharing information and avoiding mass vulnerabilities to gain unauthorized access to
messaging. operating systems. After installation, the worm can
perform various attacks, including Distributed Denial
of Service (DDoS).

SOCIAL ENGINEERING ATTACKS


 Social engineering attacks work by psychologically
manipulating users into performing actions desirable
to an attacker, or divulging information.
SOCIAL ENGINEERING ATTACKS INCLUDE:  List servs, or payment details for shopping sites --
PHISHING make sure that the website is reputable, legal, and
 attackers send fraudulent correspondence that seems secure.
to come from legitimate sources, usually via email.
Phishing emails may include an email attachment KEY ASPECTS OF CYBER SECURITY AWARENESS: DATA
infected with malware. PRIVACY
SPEAR PHISHING  Explain the significance of protecting personal and
 a variant of phishing in which attackers specifically sensitive information. Encourage individuals to limit
target individuals with security privileges or influence, the amount of personal information shared online
such as system administrators or senior executives. and to review privacy settings on social media
MALVERTISING platforms and other online accounts.
 online advertising controlled by hackers, which
contains malicious code that infects a user’s KEY ASPECTS OF CYBER SECURITY AWARENESS: MOBILE
computer when they click, or even just view the ad. DEVICE SECURITY
Malvertising has been found on many leading online  Mobile devices are susceptible to cyber threats. Users
publications. should be aware of the risks and practice secure
mobile device usage, such as keeping devices updated
KEY ASPECTS OF CYBER SECURITY AWARENESS: SAFE and not connecting to unsecured Wi-Fi networks.
INTERNET BROWSING
 Educate users about safe internet KEY ASPECTS OF CYBER SECURITY AWARENESS: SOCIAL
 browsing practices, including the ENGINEERING AWARENESS:
 importance of HTTPS, avoiding  Teach individuals about engineering techniques,
 untrustworthy websites, and not social including manipulation and deception tactics
 downloading software or files from used by cybercriminals to gain access to information.
 unknown sources. Stress the importance of verifying of people and the
identity organizations online.
KEY ASPECTS OF CYBER SECURITY AWARENESS: SAFE
EMAIL PRACTICES KEY ASPECTS OF CYBER SECURITY AWARENESS:
 Train individuals not to open email attachments or REPORTING INCIDENTS
click on links from unknown or untrusted sources.  Make it clear how to report cybersecurity incidents or
 Verify the authenticity of emails from unfamiliar the suspicious activities within organization. Prompt
senders before taking any action. reporting can help address threats more effectively.

KEY ASPECTS OF CYBER SECURITY AWARENESS: MULTI- KEY ASPECTS OF CYBER SECURITY AWARENESS: REGULAR
FACTOR AUTHENTICATION (MFA) UPDATES AND PATCHING:
 Promote the use of MFA wherever possible.  Emphasize the importance keeping software, of
 MFA adds an extra layer of security by requiring users operating systems, and applications up-to- date with
to provide multiple forms of verification, such as a the latest security patches and updates.
password and a one-time code sent to their mobile
device. KEY ASPECTS OF CYBER SECURITY AWARENESS: BYOD
(BRING YOUR OWN DEVICE) POLICIES
KEY ASPECTS OF CYBER SECURITY AWARENESS: SECURE  Establish clear BYOD policies and educate employees
FILE SHARING on the security measures they should follow when
 Encourage the use of secure file sharing methods and using personal devices for work purposes.
tools, such as encrypted file transfer and secure cloud
storage services. KEY ASPECTS OF CYBER SECURITY AWARENESS: SECURE
FILE SHARING
CYBER SAFETY TIPS PERSONAL INFORMATION  Encourage the use of secure file sharing methods and
 Do not give out details such as your name, age, tools, such as encrypted file transfer and secure cloud
birthday, address or phone number to individual storage services.
Internet users in settings like chat rooms or on social
networking sites such as Twitter and Facebook. When
filling out online forms -such as surveys, email
KEY ASPECTS OF CYBER SECURITY AWARENESS: REGULAR
SECURITY AWARENESS ASSESSMENTS
 Conduct simulated phishing exercises and other
security awareness assessments to gauge the
effectiveness of your training programs and identify
areas that need improvement.

KEY ASPECTS OF CYBER SECURITY AWARENESS: CRISIS


COMMUNICATION
 Prepare individuals for how to respond in case of a
cybersecurity incident, including who to contact and
what steps to take to mitigate damage.

PASSWORD MANAGER SOFTWARE


 is a tool or application designed to securely store,
manage, and organize passwords for various online
accounts and services. Bitwarden is an open-source
password manager that offers both cloud-hosted and
self-hosted options. It provides features like password
generation, secure sharing, and multi-device
synchronization.

TIPS FOR CREATING STRONG PASSWORDS


 A strong password is one that's easy for you to
remember but difficult for others to guess. Let's take
a look at some of the most important things to
consider when creating a password.
 Try to include numbers, symbols, and both uppercase
and lowercase letters. Avoid using words that can be
found in the dictionary. For example, swimming1
would be a weak password. Random passwords are
the strongest. If you're having trouble creating one,
you can use a password generator instead.
 Never use personal information such as your name,
birthday, user name, or email address. This type of
information is often publicly available, which makes it
easier for someone to guess your password. Use a
longer password. Your password should be at least six
characters long, although for extra security it should
be even longer. Don't use the same password for
each account. If someone discovers your password
for one account, all of your other accounts will be
vulnerable.

You might also like