By Kristian
Examples of personal Information
 Your user name or








password
Your age
Your ID number or social
security nu...
Tips to identify spam Emails
 It sounds too good to be

 There are lots of

true
 It is advertising
something
 The ema...
Cuber crime
 A cyber crime is a crime that is committed with the

help of a computer or a communication device and a
netw...
Malware
 Malware is a software program that harms your

computer. Adware, spyware, viruses Trojan horses and
worms are al...
Examples of Malware
 Adware A software program that causes

advertisements to appear on your computer.
 Trojan Horse A n...
Malware Continued
 Virus A software program that can wipe out

information on your computer and create major
problems.
 ...
To protect your computer
 Install the most recent anti-spyware and anti-virus

software.
 Keep software up-to-date to st...
Cyber Crime
 A cyber crime is a crime that is committed with the

help of a computer or a communication device and a
netw...
Elvirus
 Distributing Malware
 Prevention
 Anti-Virus software, cold shoulder
Ms. Information
 Spreading Misinformation
 Prevention
 Reliable websites, cold shoulder
The Maaster Hacker-Nils
 Hacking and identity theft
 Prevention
 Protecting personal information,firewall
Jax, Cyber bully
 Cyberbullying
 Prevention
 Reporting to authorities, cold shoulder
Sparky,Script Kiddie
 Script kiddy hacking
 Prevention
 Reporting to authorities
Kristian on cyber safety
Upcoming SlideShare
Loading in …5
×

Kristian on cyber safety

287 views
169 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
287
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Kristian on cyber safety

  1. 1. By Kristian
  2. 2. Examples of personal Information  Your user name or        password Your age Your ID number or social security number Your email address Your home address Your phone number what city you live in What neighborhood you live in  You parents names  Where your parents work  Names or phone numbers      of Family members and friends What school you go to Your teachers, names Credit card numbers License plate numbers
  3. 3. Tips to identify spam Emails  It sounds too good to be  There are lots of true  It is advertising something  The email sounds  Interesting but you weren’ t expecting it. misspelled words  It sound really strange
  4. 4. Cuber crime  A cyber crime is a crime that is committed with the help of a computer or a communication device and a network.
  5. 5. Malware  Malware is a software program that harms your computer. Adware, spyware, viruses Trojan horses and worms are all types of malware.
  6. 6. Examples of Malware  Adware A software program that causes advertisements to appear on your computer.  Trojan Horse A nasty program disguised as legitimate software  Spyware A software program that secretly tracks what you do on the Internet and sometimes gets information about you from your computer.
  7. 7. Malware Continued  Virus A software program that can wipe out information on your computer and create major problems.  Worm A destructive program that can get into computers or networks and harm them by deleting, modifying or sending out the data.
  8. 8. To protect your computer  Install the most recent anti-spyware and anti-virus software.  Keep software up-to-date to stay protected.  Check with a trusted adult  A Firewall is a software program that protects your computer by acting like a security guard and monitoring and controlling internet traffic.s
  9. 9. Cyber Crime  A cyber crime is a crime that is committed with the help of a computer or a communication device and a network.
  10. 10. Elvirus  Distributing Malware  Prevention  Anti-Virus software, cold shoulder
  11. 11. Ms. Information  Spreading Misinformation  Prevention  Reliable websites, cold shoulder
  12. 12. The Maaster Hacker-Nils  Hacking and identity theft  Prevention  Protecting personal information,firewall
  13. 13. Jax, Cyber bully  Cyberbullying  Prevention  Reporting to authorities, cold shoulder
  14. 14. Sparky,Script Kiddie  Script kiddy hacking  Prevention  Reporting to authorities

×