SlideShare a Scribd company logo
Cyber Safety Stay Rad
How do you know the true identity of who you are talking to?  Well, put short, you don’t
What should people know about passwords?  People should know that you never share your password with anyone. If you do the person you tell it to will most likely change it.
Should you purchase items online?  If it’s from eBay or Amazon, and you want the item, than yes. If it’s from some unknown website and the offer seems to good to be true, it most likely is.
What is spam?  Spam is pointless emails telling you to forward  this message to x amount of people or something bad will happen, or just something that has no meaning to you. Typical spam message      HELLO SALES, MY NAME IS COLE LORD I AM THE PURCHASSINGMANAGER OF THE STORE INC. WE WILL LIKE TO PURCHASE SOME OF YOUR PRODUCT AS WILL ARE LACK OF STOCK. SO BEFORE WE PROCEED ON THE PRODUCT WILL BE NEEDING FROM YOUR COMPANY WILL LIKE TO KNOW FIRSTLY IF YOU DO SHIP TO NIGERIA AND ALSO ACCEPT CREDIT CARD PAYMENT. AND ALSO DONT FORGET TO INCLUDE YOUR WEBSITE IN YOUR EMAIL. I WILL BE MUCH HAPPY TO SEE YOUR RESPONSE. REGARDS. COLE LORD (PURCHASSING MANAGER)
Who should you give your email address to?  You should your email address to friends and/or trusted website that require you to give it.
What should your password contain?  Usually a good password contains lower and uppercase letters with some numbers. An example of a good password: ExAmpL3
How often should you change it You should change it whenever you feel like it or when someone hacks your emails and gets it.
Who should have your password?  You and only you.
What do you do if you come across inappropriate materials?  Get out of the website and never speak of it again.
 How do you know if the information is true?  If it’s from a trusted news site like FOX, or if it has reliable sources
How do you reference websites you get information from?  Copy down the URL of the website and put it in your reference section
When should you give personal information online?  Whenever you feel like it, as long as you don’t give out to much information like home address and telephone number.
What personal information should you give?  Whatever you’re comfortable with giving.

More Related Content

Similar to d

Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
cassielaut
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
mlegan31
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
Wizer - Cyber Security Awareness
 
Cy Q
Cy QCy Q
Cy Q
hobsy123
 
Successful List Building
Successful List BuildingSuccessful List Building
Successful List Building
Richard Butler
 
Eight tips for more effective email communication
Eight tips for more effective email communicationEight tips for more effective email communication
Eight tips for more effective email communication
mayjune_912
 
IWC - Phishing and Internet Scams
IWC - Phishing and Internet ScamsIWC - Phishing and Internet Scams
IWC - Phishing and Internet Scams
IWC Probate Services
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
kirahlee
 
The 4 dos and 8 donts of getting your emails delivered
The 4 dos and 8 donts of getting your emails deliveredThe 4 dos and 8 donts of getting your emails delivered
The 4 dos and 8 donts of getting your emails delivered
Alesha Drew
 
10things
10things10things
10things
samthedragon
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
Department of Defense
 
Why your email messages send are marked as Spam
Why your email messages send are marked as SpamWhy your email messages send are marked as Spam
Why your email messages send are marked as Spam
Moving Up Mobile
 
Wordcamp Sacramento 2017 Presentation - How to build your email list
Wordcamp Sacramento 2017 Presentation - How to build your email listWordcamp Sacramento 2017 Presentation - How to build your email list
Wordcamp Sacramento 2017 Presentation - How to build your email list
AJ Morris
 
Privacy rules
Privacy rulesPrivacy rules
Privacy rules
GNBCEC
 
8_Ways_Ebook_01 (7)
8_Ways_Ebook_01 (7)8_Ways_Ebook_01 (7)
8_Ways_Ebook_01 (7)
Molly Corless
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
moodledevs
 
4 business communication etiquette
4 business communication etiquette4 business communication etiquette
4 business communication etiquette
Arun E
 
106 190413 Bookclub Successful Copywriting by Robert Ashton Chapter 3-5
106 190413 Bookclub Successful Copywriting by Robert Ashton Chapter 3-5106 190413 Bookclub Successful Copywriting by Robert Ashton Chapter 3-5
106 190413 Bookclub Successful Copywriting by Robert Ashton Chapter 3-5
Lia s. Associates | Branding & Design
 

Similar to d (20)

Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Cy Q
Cy QCy Q
Cy Q
 
Successful List Building
Successful List BuildingSuccessful List Building
Successful List Building
 
Eight tips for more effective email communication
Eight tips for more effective email communicationEight tips for more effective email communication
Eight tips for more effective email communication
 
IWC - Phishing and Internet Scams
IWC - Phishing and Internet ScamsIWC - Phishing and Internet Scams
IWC - Phishing and Internet Scams
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
 
The 4 dos and 8 donts of getting your emails delivered
The 4 dos and 8 donts of getting your emails deliveredThe 4 dos and 8 donts of getting your emails delivered
The 4 dos and 8 donts of getting your emails delivered
 
10things
10things10things
10things
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Why your email messages send are marked as Spam
Why your email messages send are marked as SpamWhy your email messages send are marked as Spam
Why your email messages send are marked as Spam
 
Wordcamp Sacramento 2017 Presentation - How to build your email list
Wordcamp Sacramento 2017 Presentation - How to build your email listWordcamp Sacramento 2017 Presentation - How to build your email list
Wordcamp Sacramento 2017 Presentation - How to build your email list
 
Privacy rules
Privacy rulesPrivacy rules
Privacy rules
 
8_Ways_Ebook_01 (7)
8_Ways_Ebook_01 (7)8_Ways_Ebook_01 (7)
8_Ways_Ebook_01 (7)
 
Email Etiquette
Email EtiquetteEmail Etiquette
Email Etiquette
 
4 business communication etiquette
4 business communication etiquette4 business communication etiquette
4 business communication etiquette
 
106 190413 Bookclub Successful Copywriting by Robert Ashton Chapter 3-5
106 190413 Bookclub Successful Copywriting by Robert Ashton Chapter 3-5106 190413 Bookclub Successful Copywriting by Robert Ashton Chapter 3-5
106 190413 Bookclub Successful Copywriting by Robert Ashton Chapter 3-5
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

d

  • 2. How do you know the true identity of who you are talking to? Well, put short, you don’t
  • 3. What should people know about passwords? People should know that you never share your password with anyone. If you do the person you tell it to will most likely change it.
  • 4. Should you purchase items online? If it’s from eBay or Amazon, and you want the item, than yes. If it’s from some unknown website and the offer seems to good to be true, it most likely is.
  • 5. What is spam? Spam is pointless emails telling you to forward this message to x amount of people or something bad will happen, or just something that has no meaning to you. Typical spam message HELLO SALES, MY NAME IS COLE LORD I AM THE PURCHASSINGMANAGER OF THE STORE INC. WE WILL LIKE TO PURCHASE SOME OF YOUR PRODUCT AS WILL ARE LACK OF STOCK. SO BEFORE WE PROCEED ON THE PRODUCT WILL BE NEEDING FROM YOUR COMPANY WILL LIKE TO KNOW FIRSTLY IF YOU DO SHIP TO NIGERIA AND ALSO ACCEPT CREDIT CARD PAYMENT. AND ALSO DONT FORGET TO INCLUDE YOUR WEBSITE IN YOUR EMAIL. I WILL BE MUCH HAPPY TO SEE YOUR RESPONSE. REGARDS. COLE LORD (PURCHASSING MANAGER)
  • 6. Who should you give your email address to? You should your email address to friends and/or trusted website that require you to give it.
  • 7. What should your password contain? Usually a good password contains lower and uppercase letters with some numbers. An example of a good password: ExAmpL3
  • 8. How often should you change it You should change it whenever you feel like it or when someone hacks your emails and gets it.
  • 9. Who should have your password? You and only you.
  • 10. What do you do if you come across inappropriate materials? Get out of the website and never speak of it again.
  • 11. How do you know if the information is true? If it’s from a trusted news site like FOX, or if it has reliable sources
  • 12. How do you reference websites you get information from? Copy down the URL of the website and put it in your reference section
  • 13. When should you give personal information online? Whenever you feel like it, as long as you don’t give out to much information like home address and telephone number.
  • 14. What personal information should you give? Whatever you’re comfortable with giving.