SlideShare a Scribd company logo
CYBER SECURITY 101
FOR 5TH AND 6TH GRADERS
STEPHEN L. THOMAS
VP, SALES & OPERATIONS @ CYBERBIT
TWITTER – STEPHEN__THOMAS
LINKEDIN – STEPHENT1
AGENDA
• Cyber Security 101
• Secure Passwords
• Social Engineering
• Stop. Think. Connect.
• Cyber Security Jeopardy
WHAT IS CYBER SECURITY?
• Cyber-safety is a common term
used to describe a set of
practices, measures and/or
actions you can take to protect
personal information and your
computer from attacks.
CYBER SECURITY 101 (VIDEO)
HTTPS://YOUTU.BE/SDPXDDDZXFE
CYBER SECURITY VIDEO 101 DISCUSSION
• What is the Internet, and how did connecting computers into
networks introduce the vulnerabilities that criminals take
advantage of today?
• What are some of the ways in which networked computers can
be compromised, and why is it difficult to prevent these kinds
of attacks?
SECURE PASSWORDS (VIDEO)
HTTPS://YOUTU.BE/G9TDMVABQIS
SECURE PASSWORD DISCUSSION
• Why do these tips improve the strength of a password?
• Why do security experts recommend using long passwords —
specifically, passwords that are 10 digits long?
• What is two-step authentication, and how does this enhance user security
and privacy?
• To think about…
• How secure are your passwords?
• Do you think you should come up with more secure passwords?
• Do you currently use the same password on more than one website or device?
• Now that you have learned more about how to protect your own data online, what
changes might they make to their online behavior?
PASSWORD SECURITY
• Which password is most secure?
• Username Password Character set
• ictest1 testing Lowercase letters
• ictest2 break1ng Lowercase letters and numbers
• ictest3 Bre@k1ng Lowercase letters, uppercase letters, numbers
and symbols
SOCIAL ENGINEERING (VIDEO)
HTTPS://YOUTU.BE/HM6L0BEHFGE
BEING PRIVACY SAVVY
• SHARE WITH CARE – WHAT YOU POST CAN LAST A LIFETIME:
Help your children understand that any information they share
online can easily be copied and is almost impossible to take
back. Teach them to consider who might see a post and how it
might be perceived in the future.
• PERSONAL INFORMATION IS LIKE MONEY. VALUE IT. PROTECT
IT.: Information about your kids, such as the games they like to
play and what they search for online, has value ‒ just like
money. Talk to your kids about the value of their information
and how to be selective with the information they provide to
apps and websites.
• POST ONLY ABOUT OTHERS AS YOU WOULD LIKE TO HAVE THEM
POST ABOUT YOU: Remind children and family members about
the golden rule and that it applies online as well. What they do
online can positively or negatively impact other people.
• OWN YOUR ONLINE PRESENCE: Start the conversation about the
public nature of the Internet early. Learn about and teach your
kids how to use privacy and security settings on their favorite
online games, apps and platforms.
• PRIVACY GRADE
STOP. THINK. CONNECT.
• KEEP A CLEAN MACHINE
• KEEP SECURITY SOFTWARE CURRENT
• AUTOMATE SOFTWARE UPDATES
• PROTECT ALL DEVICES THAT CONNECT TO THE INTERNET
• PLUG & SCAN
• PROTECT YOUR PERSONAL INFORMATION
• SECURE YOUR ACCOUNTS
• MAKE PASSWORDS LONG AND STRONG
• UNIQUE ACCOUNT, UNIQUE PASSWORD
• WRITE IT DOWN AND KEEP IT SAFE
• OWN YOUR ONLINE PRESENCE
• CONNECT WITH CARE
• WHEN IN DOUBT THROW IT OUT
• GET SAVVY ABOUT WI‐FI HOTSPOTS
• PROTECT YOUR $$
CYBER SECURITY JEOPARDY
HTTPS://JEOPARDYLABS.COM/PLAY/CYBER-SECURITY

More Related Content

What's hot

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
preetpatel72
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Aayushi Singh
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Internet safety
Internet safetyInternet safety
Internet safety
Dan Tomlinson
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 

What's hot (20)

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 

Viewers also liked

Manjoor estate
Manjoor estateManjoor estate
Manjoor estate
Andrés Valencia
 
Contoh STORY BOARD Clas Mild Cigarette
Contoh STORY BOARD Clas Mild CigaretteContoh STORY BOARD Clas Mild Cigarette
Contoh STORY BOARD Clas Mild CigaretteDwikorahardo Histiajid
 
Funny food
Funny foodFunny food
Central bank
Central bankCentral bank
Central bank
Sateesh Hotchandani
 
Simon_Schwaighofer_In_Focus_Golden_Drum_Festival
Simon_Schwaighofer_In_Focus_Golden_Drum_FestivalSimon_Schwaighofer_In_Focus_Golden_Drum_Festival
Simon_Schwaighofer_In_Focus_Golden_Drum_FestivalSimon Schwaighofer
 
A Guide to Radon resistant new Construction
A Guide to Radon resistant new ConstructionA Guide to Radon resistant new Construction
A Guide to Radon resistant new Construction
A-Z Solutions, Inc, 11377 Miller Ave NE Hartville, Ohio 44632
 
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE News
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE NewsCoastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE News
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE NewsStanley White
 

Viewers also liked (11)

Manjoor estate
Manjoor estateManjoor estate
Manjoor estate
 
bioandfactsheet
bioandfactsheetbioandfactsheet
bioandfactsheet
 
Contoh STORY BOARD Clas Mild Cigarette
Contoh STORY BOARD Clas Mild CigaretteContoh STORY BOARD Clas Mild Cigarette
Contoh STORY BOARD Clas Mild Cigarette
 
Funny food
Funny foodFunny food
Funny food
 
Central bank
Central bankCentral bank
Central bank
 
Simon_Schwaighofer_In_Focus_Golden_Drum_Festival
Simon_Schwaighofer_In_Focus_Golden_Drum_FestivalSimon_Schwaighofer_In_Focus_Golden_Drum_Festival
Simon_Schwaighofer_In_Focus_Golden_Drum_Festival
 
тз Dgm mz 75 с прессом обнинск
тз Dgm mz 75 с прессом обнинсктз Dgm mz 75 с прессом обнинск
тз Dgm mz 75 с прессом обнинск
 
A Guide to Radon resistant new Construction
A Guide to Radon resistant new ConstructionA Guide to Radon resistant new Construction
A Guide to Radon resistant new Construction
 
CR parking analysis
CR parking analysisCR parking analysis
CR parking analysis
 
Jackie (2)
Jackie (2)Jackie (2)
Jackie (2)
 
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE News
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE NewsCoastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE News
Coastal Engineering Expert Honored with Moffatt-Nichol Award _ ASCE News
 

Similar to Cyber Security for 5th and 6th Graders

Cyber security
Cyber securityCyber security
Cyber security
Sannith Reddy
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
- Mark - Fullbright
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
TechSoup
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
oudesign
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
SheryldeVilla2
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
Hannah Jane del Castillo
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
hmooodes115
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
Deepak Khari
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
imen Tekaya Bouaziz
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
FatimaAmin26
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
saththiyans1
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
211 Check
 
Common ethical issues
Common ethical issuesCommon ethical issues
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
LineshiDharamraj1
 

Similar to Cyber Security for 5th and 6th Graders (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Internet Safety - Parents
Internet Safety - ParentsInternet Safety - Parents
Internet Safety - Parents
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak Cyber Security Tips for students_Deepak
Cyber Security Tips for students_Deepak
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Webinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentationWebinar_Cybersecurity is a shared responsibility presentation
Webinar_Cybersecurity is a shared responsibility presentation
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 

Recently uploaded

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Cyber Security for 5th and 6th Graders

  • 1. CYBER SECURITY 101 FOR 5TH AND 6TH GRADERS STEPHEN L. THOMAS VP, SALES & OPERATIONS @ CYBERBIT TWITTER – STEPHEN__THOMAS LINKEDIN – STEPHENT1
  • 2. AGENDA • Cyber Security 101 • Secure Passwords • Social Engineering • Stop. Think. Connect. • Cyber Security Jeopardy
  • 3. WHAT IS CYBER SECURITY? • Cyber-safety is a common term used to describe a set of practices, measures and/or actions you can take to protect personal information and your computer from attacks.
  • 4. CYBER SECURITY 101 (VIDEO) HTTPS://YOUTU.BE/SDPXDDDZXFE
  • 5. CYBER SECURITY VIDEO 101 DISCUSSION • What is the Internet, and how did connecting computers into networks introduce the vulnerabilities that criminals take advantage of today? • What are some of the ways in which networked computers can be compromised, and why is it difficult to prevent these kinds of attacks?
  • 7. SECURE PASSWORD DISCUSSION • Why do these tips improve the strength of a password? • Why do security experts recommend using long passwords — specifically, passwords that are 10 digits long? • What is two-step authentication, and how does this enhance user security and privacy? • To think about… • How secure are your passwords? • Do you think you should come up with more secure passwords? • Do you currently use the same password on more than one website or device? • Now that you have learned more about how to protect your own data online, what changes might they make to their online behavior?
  • 8. PASSWORD SECURITY • Which password is most secure? • Username Password Character set • ictest1 testing Lowercase letters • ictest2 break1ng Lowercase letters and numbers • ictest3 Bre@k1ng Lowercase letters, uppercase letters, numbers and symbols
  • 10. BEING PRIVACY SAVVY • SHARE WITH CARE – WHAT YOU POST CAN LAST A LIFETIME: Help your children understand that any information they share online can easily be copied and is almost impossible to take back. Teach them to consider who might see a post and how it might be perceived in the future. • PERSONAL INFORMATION IS LIKE MONEY. VALUE IT. PROTECT IT.: Information about your kids, such as the games they like to play and what they search for online, has value ‒ just like money. Talk to your kids about the value of their information and how to be selective with the information they provide to apps and websites. • POST ONLY ABOUT OTHERS AS YOU WOULD LIKE TO HAVE THEM POST ABOUT YOU: Remind children and family members about the golden rule and that it applies online as well. What they do online can positively or negatively impact other people. • OWN YOUR ONLINE PRESENCE: Start the conversation about the public nature of the Internet early. Learn about and teach your kids how to use privacy and security settings on their favorite online games, apps and platforms. • PRIVACY GRADE
  • 11. STOP. THINK. CONNECT. • KEEP A CLEAN MACHINE • KEEP SECURITY SOFTWARE CURRENT • AUTOMATE SOFTWARE UPDATES • PROTECT ALL DEVICES THAT CONNECT TO THE INTERNET • PLUG & SCAN • PROTECT YOUR PERSONAL INFORMATION • SECURE YOUR ACCOUNTS • MAKE PASSWORDS LONG AND STRONG • UNIQUE ACCOUNT, UNIQUE PASSWORD • WRITE IT DOWN AND KEEP IT SAFE • OWN YOUR ONLINE PRESENCE • CONNECT WITH CARE • WHEN IN DOUBT THROW IT OUT • GET SAVVY ABOUT WI‐FI HOTSPOTS • PROTECT YOUR $$