SlideShare a Scribd company logo
By: Alex Venable
What is Digital Security
Digital Security gives individuals the freedom to
embrace the Digital lifestyle that has been made
today. It gives people the chance to engage in
everyday interactions across all digital devices.
Digital effects all aspects of the digital lifestyle.
My Mind Map
Good & Bad things if we
 did not have Security
 Good: People would get to do things without hassle

 Bad: People could hack into your accounts and get
 you in any kind of trouble.

 Good: We would be able to expand our learning tools
 and programs, to enhance our boundaries to the
 open world.

 Bad: People could talk to little kids inappropriately to
 young children.
Good Things
We could learn things about us and the world around
us freely.

We could discover some new applications or
documents that are just waiting to be discovered in
the world.

People could build off of those things and expand the
knowledge of the world and it’s people.
Bad Things
People could expose government or Top Secret files
or documents that are meant to be secret.

Other countries could find our files and then learn
our plans for things, like war, or new technology that
is being developed.

If other countries were to learn our things they could
come over and start a war, take us over, and then we
would be ruled by some other country.
The Reason why we
    need Security
We need security to protect not only our computers
but ourselves as well because we do not want to get
into something that is not appropriate or that is a lie
and you cannot get out of what ever it is. We need it
to protect the computers because people could hack
into your accounts and get you in serious trouble and
they can send viruses that can ruin your computer.
Bad Things that can
happen in your security
       free life
People could talk to kids inappropriately and they
could use inappropriate language or content in
school or in public.

People could cyber bully you or kids.

People can impersonate some other person who they
are not really are and if you go meet them they could
be potentially dangerous.
The Good Factors of not
    having security
 People can communicate to others in very unique
 ways around the world.

 People could learn about things that might be being
 made or created that might change everybody's lives.
We Need Security for
  our own safety
We all need it if we have an electronic device that can
be dangerous or that can be hacked that can change
peoples lives by getting them into bank trouble or
they could go bankrupt from someone accepting an
expensive vacation or something that could cost you
your house, money, and all of your property.
Stop
Video at 3
    http://www.youtube.co
Minutes
   m/watch?v=2ajy0s9eO-
            w

More Related Content

What's hot

Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
KnepperE
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
Yogesh Prajapati
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspaceJanealW
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Sigurnost na internetu 2015 - 8
Sigurnost na internetu 2015 - 8Sigurnost na internetu 2015 - 8
Sigurnost na internetu 2015 - 8
Darko Rakić
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
Stephen Thomas, CISSP
 
Internet safety
Internet safetyInternet safety
Internet safety
Kori Lee
 
Internet safety
Internet safetyInternet safety
Internet safety
Kori Lee
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
jry749
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 

What's hot (16)

Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Sigurnost na internetu 2015 - 8
Sigurnost na internetu 2015 - 8Sigurnost na internetu 2015 - 8
Sigurnost na internetu 2015 - 8
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Netiquette
NetiquetteNetiquette
Netiquette
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Viewers also liked

Syntra Brussel - Getuigschrift Basiskennis Bedrijfsbeheer
Syntra Brussel - Getuigschrift Basiskennis BedrijfsbeheerSyntra Brussel - Getuigschrift Basiskennis Bedrijfsbeheer
Syntra Brussel - Getuigschrift Basiskennis BedrijfsbeheerWim Bosteels
 
ICT enabled career guidance and job matching solution
ICT enabled career guidance and job matching solutionICT enabled career guidance and job matching solution
ICT enabled career guidance and job matching solution
Janaka Jayalath
 
Exceptional Student Award-2007-2008
Exceptional Student Award-2007-2008Exceptional Student Award-2007-2008
Exceptional Student Award-2007-2008Lora Connor
 
Context2
Context2Context2
Context2
dj_raphael
 
Infografia
InfografiaInfografia
Cypress College President's Honor Roll-2004 thru 2005
Cypress College President's Honor Roll-2004 thru 2005Cypress College President's Honor Roll-2004 thru 2005
Cypress College President's Honor Roll-2004 thru 2005Lora Connor
 
Lightning-Fast Tech Tools: Awesome Results in One Lesson or Less!
Lightning-Fast Tech Tools: Awesome Results in One Lesson or Less!Lightning-Fast Tech Tools: Awesome Results in One Lesson or Less!
Lightning-Fast Tech Tools: Awesome Results in One Lesson or Less!
Wendy Nelson
 
Guaguas urbanas playas de jandía, abandonadas
Guaguas urbanas playas de jandía, abandonadasGuaguas urbanas playas de jandía, abandonadas
Guaguas urbanas playas de jandía, abandonadasFuerteventura Limpia
 
Mobile marketing movie
Mobile marketing movieMobile marketing movie
Mobile marketing movie
bmgrobert
 
Escarlet maciel 2 a mantenimiento de sistema del computador
Escarlet maciel 2 a mantenimiento de sistema del computadorEscarlet maciel 2 a mantenimiento de sistema del computador
Escarlet maciel 2 a mantenimiento de sistema del computador
Nayeli Thu Real Mami
 
Box Cross Fit Guia para organizacion tu Box
Box Cross Fit Guia para organizacion tu BoxBox Cross Fit Guia para organizacion tu Box
Box Cross Fit Guia para organizacion tu Box
JMalo Martinez
 
particionamiento de un disco duro
particionamiento de un disco duroparticionamiento de un disco duro
particionamiento de un disco duro
Edison Chalacan
 
Presentase Promosi Doktoral Pak DR.Asmadi Weri, SH., MH.
Presentase Promosi Doktoral Pak DR.Asmadi Weri, SH., MH.Presentase Promosi Doktoral Pak DR.Asmadi Weri, SH., MH.
Presentase Promosi Doktoral Pak DR.Asmadi Weri, SH., MH.
Mohamad Khaidir
 

Viewers also liked (14)

Syntra Brussel - Getuigschrift Basiskennis Bedrijfsbeheer
Syntra Brussel - Getuigschrift Basiskennis BedrijfsbeheerSyntra Brussel - Getuigschrift Basiskennis Bedrijfsbeheer
Syntra Brussel - Getuigschrift Basiskennis Bedrijfsbeheer
 
ICT enabled career guidance and job matching solution
ICT enabled career guidance and job matching solutionICT enabled career guidance and job matching solution
ICT enabled career guidance and job matching solution
 
Exceptional Student Award-2007-2008
Exceptional Student Award-2007-2008Exceptional Student Award-2007-2008
Exceptional Student Award-2007-2008
 
Context2
Context2Context2
Context2
 
Infografia
InfografiaInfografia
Infografia
 
Cypress College President's Honor Roll-2004 thru 2005
Cypress College President's Honor Roll-2004 thru 2005Cypress College President's Honor Roll-2004 thru 2005
Cypress College President's Honor Roll-2004 thru 2005
 
Lightning-Fast Tech Tools: Awesome Results in One Lesson or Less!
Lightning-Fast Tech Tools: Awesome Results in One Lesson or Less!Lightning-Fast Tech Tools: Awesome Results in One Lesson or Less!
Lightning-Fast Tech Tools: Awesome Results in One Lesson or Less!
 
Guaguas urbanas playas de jandía, abandonadas
Guaguas urbanas playas de jandía, abandonadasGuaguas urbanas playas de jandía, abandonadas
Guaguas urbanas playas de jandía, abandonadas
 
Mobile marketing movie
Mobile marketing movieMobile marketing movie
Mobile marketing movie
 
Escarlet maciel 2 a mantenimiento de sistema del computador
Escarlet maciel 2 a mantenimiento de sistema del computadorEscarlet maciel 2 a mantenimiento de sistema del computador
Escarlet maciel 2 a mantenimiento de sistema del computador
 
Box Cross Fit Guia para organizacion tu Box
Box Cross Fit Guia para organizacion tu BoxBox Cross Fit Guia para organizacion tu Box
Box Cross Fit Guia para organizacion tu Box
 
particionamiento de un disco duro
particionamiento de un disco duroparticionamiento de un disco duro
particionamiento de un disco duro
 
Presentase Promosi Doktoral Pak DR.Asmadi Weri, SH., MH.
Presentase Promosi Doktoral Pak DR.Asmadi Weri, SH., MH.Presentase Promosi Doktoral Pak DR.Asmadi Weri, SH., MH.
Presentase Promosi Doktoral Pak DR.Asmadi Weri, SH., MH.
 
System Admin
System AdminSystem Admin
System Admin
 

Similar to A v cc

Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
takahe2
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynotetakahe2
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
takahe2
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Digi teen
Digi teenDigi teen
Digi teen13aaa
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
jram2113
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Homeland security
Homeland securityHomeland security
Homeland security
Wes Widner
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
HamadRabban
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
ryanpark86
 
Online Safety
Online SafetyOnline Safety
Online Safety
HandsworthY6
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
Alexander Berta
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
The Nine Elements of Technology
The Nine Elements of TechnologyThe Nine Elements of Technology
The Nine Elements of TechnologyYousef93
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 

Similar to A v cc (20)

Digital Citizenship
Digital Citizenship Digital Citizenship
Digital Citizenship
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Hannah dc keynote
Hannah dc keynoteHannah dc keynote
Hannah dc keynote
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Digi teen
Digi teenDigi teen
Digi teen
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Homeland security
Homeland securityHomeland security
Homeland security
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Hamad Rabban.It
Hamad Rabban.ItHamad Rabban.It
Hamad Rabban.It
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Putting your life online
Putting your life onlinePutting your life online
Putting your life online
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
The Nine Elements of Technology
The Nine Elements of TechnologyThe Nine Elements of Technology
The Nine Elements of Technology
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 

A v cc

  • 2. What is Digital Security Digital Security gives individuals the freedom to embrace the Digital lifestyle that has been made today. It gives people the chance to engage in everyday interactions across all digital devices. Digital effects all aspects of the digital lifestyle.
  • 4. Good & Bad things if we did not have Security Good: People would get to do things without hassle Bad: People could hack into your accounts and get you in any kind of trouble. Good: We would be able to expand our learning tools and programs, to enhance our boundaries to the open world. Bad: People could talk to little kids inappropriately to young children.
  • 5. Good Things We could learn things about us and the world around us freely. We could discover some new applications or documents that are just waiting to be discovered in the world. People could build off of those things and expand the knowledge of the world and it’s people.
  • 6. Bad Things People could expose government or Top Secret files or documents that are meant to be secret. Other countries could find our files and then learn our plans for things, like war, or new technology that is being developed. If other countries were to learn our things they could come over and start a war, take us over, and then we would be ruled by some other country.
  • 7. The Reason why we need Security We need security to protect not only our computers but ourselves as well because we do not want to get into something that is not appropriate or that is a lie and you cannot get out of what ever it is. We need it to protect the computers because people could hack into your accounts and get you in serious trouble and they can send viruses that can ruin your computer.
  • 8. Bad Things that can happen in your security free life People could talk to kids inappropriately and they could use inappropriate language or content in school or in public. People could cyber bully you or kids. People can impersonate some other person who they are not really are and if you go meet them they could be potentially dangerous.
  • 9. The Good Factors of not having security People can communicate to others in very unique ways around the world. People could learn about things that might be being made or created that might change everybody's lives.
  • 10. We Need Security for our own safety We all need it if we have an electronic device that can be dangerous or that can be hacked that can change peoples lives by getting them into bank trouble or they could go bankrupt from someone accepting an expensive vacation or something that could cost you your house, money, and all of your property.
  • 11.
  • 12. Stop Video at 3 http://www.youtube.co Minutes m/watch?v=2ajy0s9eO- w