Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
The slide is about safety in the cyber world. The plethora of vulnerability the cyber world has unleashed makes a call for a staunch measure towards cyber safety.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
Studies and analysis the aspects of confidentiality, integrity and availability of information(data) with regard to the organisation. Identify exposure to accidental or intentional , destruction, disclosure , modification or interruption of information that may cause serious financial and or information loss Study of cyber security and incident response and has become necessary because attacks frequently cause the compromise of personal and business data. Heightened incidents concerns about national security and exposure of personally identifiable information. Racing awareness of the possible effects of computer barred attacks is the other reason.
The presentation I created for students to make them aware and how to be more precautious to deal with day to day cyberattacks under Teach for India Volunteers.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
The slide is about safety in the cyber world. The plethora of vulnerability the cyber world has unleashed makes a call for a staunch measure towards cyber safety.
Rivers of Living Waters ministries Curacao's ministry for Woman - Heart to Heart - presentation on the dangers of Internet.
Presentor: N. Everts
Date: March 28, 2009
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
5. Cybersecurity is when
someone protects
networks, electronic
devices and data from
falling into wrong hands.
WHAT IS CYBERSECURITY?
It is also the practice of
ensuring safety, integrity,
and security of one’s
information over the
cyberspace.
WHAT IS CYBERSPACE?
Cyberspace is anything that has
to do with the Internet.
For example: We use the Internet to
communicate and stay connected to
our friends and family. We play
video games, download music, and
watch TV shows and movies after
homework is done. Grownups use it
do things like banking, shopping,
and other important everyday
activities online as well.
6. WHAT IS
CYBERCRIME?
Cybercrime is criminal
activities carried out by
means of computers or
the internet.
The former descriptions were
"computer crime" or "crime by
computer".
The Internet brought other new
terms, like "digital", "electronic",
"virtual" , "IT", "high-tech" and
“technology-enabled" crime.
7. SOME
COMMON
ONLINE
ISSUES
WE
FACE
TODAY
Cyber
Predators
They are people who
search online for
others in order to
use, control, or harm
them in some way.
Identity Theft
It happens to be an
illegal and wrong
method, in which
criminals collect
and use other
people’s private
data; commonly for
financial gains.
Cyber
Bullying
It is the electronic
posting of mean-
spirited messages
about a person, often
done anonymously.
8. Are the actions of
this little girl safe?
Should she have
done something
different?
Do you guys want
to know how to
be safe?
9. MEET ALIA
She is a school going girl just
like the rest of you and loves to
play games and watching
cartoons on the internet.
She will help you understand
the concept of Internet.
10. The Internet is like a busy road with lots of traffic in all directions.
This ‘traffic’ is called Data.
The games, videos, cartoons, movies, emails etc. that you all love to see just like Alia,travels
over the Internet like data.
While the Internet does seems spectacular on the outside, it has many unseen insides.
One must use it very carefully to stay safe!
Everyday Alia goes to school and enjoys the computer classes, just like all other kids. She
has learned that the computer had something very magical inside it called the Internet. It is
the same thing she sees on mobile phones and tablets.
The Internet lets you do a lot of things. It even lets you make friends online. It can get
infected with viruses which can harm your computer or electronic device. So one has to be
very, very careful.
Alia will now teach you how to stay safe, and use the Internet to enjoy it.
11. Before you use the Internet, always ask an adult if the computer has a
firewall and antivirus.
Together, they both protect your computer from many kinds of viruses
that attack our computer and steal our data.
We all like to chat with our friends and keep up with them, don’t we? We
can do so easily via email. If we are using a public network or a computer,
we must always log out once we are done.
If it is also very important to know that we must never click on a lik or an
ad in our email or on the Internet. Always ask an adult before doing so.
To help with your regular studies that Internet and is an amazing resource.
Before you sign up for a website, ask your parents for help and
supervision. In matters such as these, they know best.
You may find free Wifi in public spaces like shops, railway stations,
shopping malls, metros etc. to surf the Internet and use it. Avoid using it
as they can be harmful. Never connect to them, as they are not safe!
CONGRATULATIONS! YOU ARE NOW CYBER / INTERNET SAFE!
12. A LITTLE HISTORY ON
THE CYBER WORLD
FACTS ABOUT
INTERNET SECURITY
13. The first spam email took
place in 1978 when it was
sent over the Arpanet.
The first recorded
cyber crime was
recorded in the year
1820.
The first virus was
installed on an Apple
Computer in 1982.
YOUR DOSE OF HISTORY
ON CYBERCRIME
14. 95% cyber breaches are due
to human error.
There are around 6 million
cybersecurity jobs.
43% of cyber attacks target
businesses.
A cyberattack is attempted
every 39 seconds.
SOME INTERESTING
FACTS
16. UNDERSTAND LIFE ON THE
INTERNET
The Internet has turned our
existence upside down. It has
revolutionized communications, to
the extent that it is now our
preferred medium of everyday
communication. In almost
everything we do, we use the
Internet. Ordering a pizza, buying a
television, sharing a moment with a
friend, sending a picture over
instant messaging.
The Internet has so much control
over almost every aspect of
human life, not only our private
lives but, also various public
services.
There are unforeseen
consequences to sharing our
private and public information and
the results could damage our
presence on the internet.
17. Private
Information
Information about you that can
be used to identify you because
it's unique to you (e.g., your full
name or your address)
Personal / Public
Information
Information about you that
cannot be used to identify you
because it is also true for many
other people (e.g., your hair
color or the city you live in)
26. GRASP
THE
CONCEPT
OF
PASSWORD
SECURITY
WHAT IS A
PASSWORD?
A secret string of letters,
symbols, and numbers
that you can use to restrict
people, who can access
something digital.
WHY DO I NEED A
PASSWORD AT
ALL?
Passwords provide the
first line of defense
against unauthorized
access.
HOW OFTEN
SHOULD I CHANGE
MY PASSWORD?
Ideally, every 6
months.
WHAT SORT OF A
PASSWORD
SHOULD I HAVE?
Preferably, strong.
WHY SHOULD I
HAVE A STRONG
PASSWORD?
It makes it very hard
for bad men and
criminals to access our
data and hurt us.
WHAT ARE THE
DO’s AND DON'Ts
OF A PASSWORD?
Let’s learn about it
further!
27.
28. DO’s
AND
DON’Ts
OF
PASSWORD
MAKING
Never disclose your
usernames and
passwords to
strangers.
Do not use the
‘remember me’
options or save
passwords on a
public computer or
network.
Initially, consult
with your parents
before you create
a password. Once
you get the hang
of it, you can do it
on your own.
Run regular virus
scans on your
devices; say
every week or so.
Never store your
usernames and
passwords on a paper
or in an easily
accessible place.
29. LET’S DO AN ACTIVITY!
Start with a phrase. Think of a quote or
group of words that will be easy to
remember.
Example: I am in grade three.
Write down just the first letter of each word
in the phrase.
Example: I / A / I / G / T
Capitalize some of the letters. Example: I / a / i / g / T
Add one or two memorable numbers. Example: I / a / 3 / i / g / 2 / 6 / T
Memorize it. Repeat your new password in
your head so it sticks.
Therefore, you new password - Ia3ig26T
30. THINGS
YOU
OUGHT
TO
DO
FOR
BETTER
PROTECTION
SOFTWARE
● Your device – computer, laptop, tablet, or
smartphone – should be equipped with
reliable anti-virus software.
BROWSER SECURITY
● Most popular browsers have special settings
that allow blocking potentially harmful
resources.
DOWNLOADS
Always ask your parents or a trusted adult
before you download anything!
32. Name four things about yourself that you should not share online with strangers.
True or false: If you wouldn’t say it to someone’s face, don’t say it on the computer
You just got an email from a stranger that says, “You’ve won!” One thing you
definitely shouldn’t do is:
a. show it to a parent b. open it to see what you’ve won c. delete it d. log off
True or false: It’s OK to send your picture to someone you met online, as long as
they sent you theirs first.
True or false: Online information is always trustworthy.
Which of the following passwords is the safest password?
a.) password b.) abc123 c.) Answ3RM3$1 d.) Fluffy01
Q&A SESSION
33. ANSWERS
1) My full name / My address / My phone number / The identity of my kin /
My plans
1) True, I wouldn’t want to hurt someone else and definately, would not like
someone to hurt me.
1) b. open it to see what you’ve won
1) False, I should never do so. I am not always aware of other’s intentions.
1) False; there is a lot of untrustworthy and incorrect on the Internet.
1) Option c.) Answ3RM3$1