SlideShare a Scribd company logo
1 of 42
Download to read offline
Have you
ever shared
your
password
with
someone
else?
NO YES
Personal privacy and security are just as important
online as they are offline.
Protect yourself with a strong password.
A strong password can secure your personal
information, and help prevent scammers from
stealing your personal info online.
Don’t forget to switch your password up:
● Don’t use the same password for multiple sites.
● Create a few different variations of the same password
for different accounts.
● Make it memorable, but avoid using personal information
like names or birthdays.
A strong password has at least 8 characters
A mix of symbols,
! ;
numbers,
! ; 2 0
and uppercase and lowercase letters.
N T n t
! ; 2 0
Let’s do a practice round together!
A w s m e
B
Taking a common phrase, and making it
password secure:
3 0 !
3
Get creative with your passwords. Fill in symbols,
numbers and letters and get memorizing!
c
Experiment and try a new password together
R y r
W N
@
3 8 0 ^
Now your turn to
create a password!
Do you remember your
password?
You now have the tools
to Be Internet Strong!
Congratulations!
Your password should be
easy for you to remember
but hard for others to
guess. Be creative and
have fun with your
passwords!
End
.
The
Be Internet Awesome 3 Be Internet Strong

More Related Content

Similar to Be Internet Awesome 3 Be Internet Strong

How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A Blog
Toby1
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
Marian Merritt
 
01 Good Passwords
01  Good  Passwords01  Good  Passwords
01 Good Passwords
ryan.hackl
 

Similar to Be Internet Awesome 3 Be Internet Strong (19)

Easy to Remember Secure Passwords - Business Complete Solutions
Easy to Remember Secure Passwords - Business Complete SolutionsEasy to Remember Secure Passwords - Business Complete Solutions
Easy to Remember Secure Passwords - Business Complete Solutions
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A Blog
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
01 Good Passwords
01  Good  Passwords01  Good  Passwords
01 Good Passwords
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
5 tips for an unbreakable password
5 tips for an unbreakable password5 tips for an unbreakable password
5 tips for an unbreakable password
 
Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Package Yourself for Success
Package Yourself for SuccessPackage Yourself for Success
Package Yourself for Success
 
Cybersecurity Password Safety A4 Flash Cards.pdf
Cybersecurity Password Safety  A4 Flash Cards.pdfCybersecurity Password Safety  A4 Flash Cards.pdf
Cybersecurity Password Safety A4 Flash Cards.pdf
 
Parent handbook 2015 - Setup Guide for iOS7
Parent handbook 2015 - Setup Guide for iOS7Parent handbook 2015 - Setup Guide for iOS7
Parent handbook 2015 - Setup Guide for iOS7
 
Password management
Password managementPassword management
Password management
 
Web2.0 Class Safety Guidelines
Web2.0 Class Safety GuidelinesWeb2.0 Class Safety Guidelines
Web2.0 Class Safety Guidelines
 
Staying Safe and Secure with Passwords
Staying Safe and Secure with PasswordsStaying Safe and Secure with Passwords
Staying Safe and Secure with Passwords
 
Passwords are just like your underwear
Passwords are just like your underwearPasswords are just like your underwear
Passwords are just like your underwear
 
Web2.0 Class Guidelines
Web2.0 Class Guidelines Web2.0 Class Guidelines
Web2.0 Class Guidelines
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Password Managers - Lastpass
Password Managers - LastpassPassword Managers - Lastpass
Password Managers - Lastpass
 
Passwords
PasswordsPasswords
Passwords
 
Always Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good PasswordAlways Forget Password? Here is How to Create a Good Password
Always Forget Password? Here is How to Create a Good Password
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 

Be Internet Awesome 3 Be Internet Strong

Editor's Notes

  1. Teacher Instructions: Chat through taking a memorable phrase, like “Be Awesome!,” and disguise it using a combination of letters, symbols and numbers to create a secure password. See example on next slide.
  2. Teacher Instructions: Pass out shape cut outs if you haven’t already. Students should cut out shapes to prep for upcoming activities.
  3. Teacher Instructions: Rearrange and update the shapes with symbols (circles), numbers (hexagons), and letters (squares) to have the class use their cut out shapes (from printable sheet) on their desk to recreate this password.
  4. Teacher Instructions: Have the class create their own individual passwords using their cut out shapes. Have them write in their own letters, numbers, and symbols into the shapes that coincide with each - symbols (circles), numbers (hexagons), and letters (squares).
  5. Teacher Instructions: Have the class try to remember their passwords at the end of the day.
  6. Students can circle two choices. The correct answers are “password” and “123456.” 🍐 This is a Pear Deck Drawing Slide 🍐 To edit the type of question, go back to the "Ask Students a Question" in the Pear Deck sidebar.
  7. At the end of class, be sure to End This Session so students can't be connected anymore. Go to the 3-dot menu on your Pear Deck navigation bar and click, End This Session. By doing so, you are also automatically saving this particular set of answers as one Session. Later, you can log into Pear Deck to view students’ answers, or begin a new Session with different students using the same presentation.