SlideShare a Scribd company logo
Cybersecurity and Data Privacy Basics
1
Richard Mawa Michael
• Introduction
▫ What is cybersecurity?
• Skill Building
▫ Recognizing a secure website
▫ Making passwords strong and memorable
▫ Recognizing and avoiding online scams
• Tips and Tricks
• Practice
Today’s Agenda
2
3
Introduction
Why do we need to be safe when
we’re online?
• Because we share personal information that we want
to keep private to avoid online attacks from cyber
criminals.
• Fraudsters may try to gain access to our personal
data or information so that they can restrict, steal,
or delete.
4
Cybersecurity:
Personal data should not be
accessed by others. .
Our devices should work properly
and be free from malware.
Introduction (continued)
Cybersecurity is all about the safety of information—our identity, our personal data, and our financial assets—when
we’re online.
For people like you and me, cybersecurity means that 1) your personal data is only accessible to you or others you
authorize, and that 2) our devices—laptops, desktop computers, mobile phones, tablets—work properly and are free
from malware. Malware is malicious software. It can take many shapes—from viruses that infect your favorite
devices to spyware and adware that track your online activities.
Secure Websites
5
Why do we need secure website
for our online activities?
• So that if you enter your personal information, you
want to keep your information safe.
• A secure website always keeps its users accounts
safe as a way of maintaining its reputation.
6
Secure Websites contain https not just http.
HTTPS stand for Hypertext Transfer Protocol
Secure. It's a way to securely send your data from
a browser to a website. It encrypts both data
entered in to a users device and data going from
the website to the browser
7
Insecure websites usually contains the HTTP
layer only as seen below.
Personal Accounts
8
What kinds of online accounts have
you created? Personal where all your
information/data is fully encrypted or
public accounts where all information
about you is publicly displayed.
Why would someone create an
account on a website?
• You create a personal account for communication,
online banking, e-services, learning/research, etc.
9
Secure Websites (continued)
It’s important to keep your account secure
on any website
10
Activity # 1
11
ACTIVITY #1: Secure Websites
Use a Web browser to browse to a website you might use for shopping, banking, social
media, or something else that interests you.
If you don’t have your own computer, follow along with the instructor.
Website visited: ___________________________________________________________
Is the website I visited secure? ______ yes ______ no
How did you determine that the website is secure?
1. ___________________________________________________________________
2. ___________________________________________________________________
Strong Passwords
12
A strong password is one that is hard to guess and keeps
you safe in the Cyberspace.
Strong Passwords (continued)
13
How do you come up with a password? Think of
something unique and strong.
How do you make it strong and secure? Avoid using
common dictionary names, your device names even
don't create your password from your name.
Common Requirements
14
Can usually include:
• Numbers
• Uppercase and lowercase
letters
• Symbols or characters
such as ~ ! # @ $ %
Tips for Strong Passwords
15
Don’t use common words like “password”
Don’t include personal information
Don’t use the same password on multiple accounts and sites
Don’t share with others—keep them private
Tips for strong passwords and phrase passes
16
Make the password longer
Use short phrases that are easier to remember:
“cowshelpmakecheese”
Hard to
remember
Keeping Track of Passwords
17
How do you remember your
passwords?
1. Include your password elsewhere in your Notebook
2. Use Password manager to store your passwords eg
last pass
1. Notebook
18
Store in a safe and
secure place
Instead of writing the actual password, write something that
helps you remember what the password is.
2. Password Software provide applications that you
can install in your devices to store your passwords
safely for example last pass.
19
Use passphrase rather than password.
It is easier to create a passphrase rather than a password because it is
generally in the form of a sentence rather than a word.
20
cowshelpmakecheese
21
Activity # 2
22
23
Using the password requirements in the Sign Up form above, create a
strong password that meets the criteria.
24
Phishing
Online Fraud and Scams.
Social Engineering
Phishing is when a malicious party sends a
fraudulent email disguised as being from a
legitimate, trusted source.
25
Spear phishing.
While phishing and spear phishing both use emails to
reach the victim,spear phishing emails are customized
to a specific person. The attacker researches the
Target's interests before sending the email.
26
Social Engineering is an access attack that attempts to
manipulate individuals into performing actions or
divulging confidential information.
27
Online Fraud and Scams (continued)
28
What are some examples you’ve
experienced?
How can you help to stay safe from
fraudsters? to stay safe avoid responding to urgent problems
from unknown people that requires immediate network
access.
Tips to Recognize Scams
29
Have you heard of the person or organization?
Can you tell who the email message is from?
Does the email have mistakes?
Are they asking for your information?
Are they trying to rush you into a quick action?
Is it too good to be true?
30
Have you heard of the person or organization?
31
Can you tell who the message is from?
32
Are they asking for your information?
33
Does the email have mistakes?
34
Are they trying to rush you into a quick action?
35
Is it too good to be true?
36
Activity # 3
37
What are four things in this email that indicate a scam?
Dos and Don’ts to Avoid Scams
38
Give any personal information
Reply to or engage with the fraudster
Click any links or buttons
Download any files or attachments
Be skeptical
Read emails carefully
Look up information on your own
Don’t
Do
39
Don’t give any personal information.
40
Don’t reply to or engage with the fraudster.
41
Don’t click any links or buttons.
42
Don’t download any files or attachments.
43
Do be skeptical.
44
Do read emails carefully.
45
Do look up information on your own.
46
Activity # 4
47
48
49
50
51
52
Questions
53
Anything you want to ask or clarify
before we end?
Today you . . .
▫ learned about cybersecurity.
▫ built skills to:
● recognize a secure website.
● make passwords strong and memorable.
● recognize and avoid online scams.
▫ discovered useful tips to help you stay safe online.
Congratulations!
54
Thank you for coming!
55

More Related Content

Similar to Masterclass_ Cybersecurity and Data Privacy Basics

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
Expeed Software
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
Lourdes Paloma Gimenez
 
Securing Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safetySecuring Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safety
LeonardMensah5
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
CharithraaAR
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
Kaushal Solanki
 
techalpha07
techalpha07techalpha07
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
vasidharta
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
Bobby Dait
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
FaMulan2
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
NetLockSmith
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 

Similar to Masterclass_ Cybersecurity and Data Privacy Basics (20)

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Securing Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safetySecuring Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safety
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
techalpha07
techalpha07techalpha07
techalpha07
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Online Safety, Security, Ethics and Netiquette.pptx
Online Safety, Security, Ethics  and Netiquette.pptxOnline Safety, Security, Ethics  and Netiquette.pptx
Online Safety, Security, Ethics and Netiquette.pptx
 
Internet security
Internet securityInternet security
Internet security
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

More from Excellence Foundation for South Sudan

The Root Cause Analysis in Quality Improvement
The Root Cause Analysis in Quality ImprovementThe Root Cause Analysis in Quality Improvement
The Root Cause Analysis in Quality Improvement
Excellence Foundation for South Sudan
 
The Focusing Matrix for Quality Improvement
The Focusing Matrix for Quality ImprovementThe Focusing Matrix for Quality Improvement
The Focusing Matrix for Quality Improvement
Excellence Foundation for South Sudan
 
The Driver Diagrams for Quality Improvement
The Driver Diagrams for Quality ImprovementThe Driver Diagrams for Quality Improvement
The Driver Diagrams for Quality Improvement
Excellence Foundation for South Sudan
 
The Model for Quality Improvement Presentation
The Model for Quality Improvement PresentationThe Model for Quality Improvement Presentation
The Model for Quality Improvement Presentation
Excellence Foundation for South Sudan
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
Excellence Foundation for South Sudan
 
Effective Classroom Management Strategies for South Sudanese Teachers
Effective Classroom Management Strategies for South Sudanese TeachersEffective Classroom Management Strategies for South Sudanese Teachers
Effective Classroom Management Strategies for South Sudanese Teachers
Excellence Foundation for South Sudan
 
Emotional Intelligence and Psychological Wellbeing in the Workplace for Teachers
Emotional Intelligence and Psychological Wellbeing in the Workplace for TeachersEmotional Intelligence and Psychological Wellbeing in the Workplace for Teachers
Emotional Intelligence and Psychological Wellbeing in the Workplace for Teachers
Excellence Foundation for South Sudan
 
School Teachers Child Safeguarding Training in South Sudan
School Teachers Child Safeguarding Training in South SudanSchool Teachers Child Safeguarding Training in South Sudan
School Teachers Child Safeguarding Training in South Sudan
Excellence Foundation for South Sudan
 
Writing Your Wells Mountain Initiative Scholarship Essays
Writing Your Wells Mountain Initiative Scholarship EssaysWriting Your Wells Mountain Initiative Scholarship Essays
Writing Your Wells Mountain Initiative Scholarship Essays
Excellence Foundation for South Sudan
 
EXCELLENCE FOUNDATION FOR SOUTH SUDAN (EFSS) ANNUAL IMPACT REPORT 2023
EXCELLENCE FOUNDATION FOR SOUTH SUDAN (EFSS) ANNUAL IMPACT REPORT 2023EXCELLENCE FOUNDATION FOR SOUTH SUDAN (EFSS) ANNUAL IMPACT REPORT 2023
EXCELLENCE FOUNDATION FOR SOUTH SUDAN (EFSS) ANNUAL IMPACT REPORT 2023
Excellence Foundation for South Sudan
 
Spelling Bee South Sudan 2024 Partners Envisioning
Spelling Bee South Sudan 2024 Partners EnvisioningSpelling Bee South Sudan 2024 Partners Envisioning
Spelling Bee South Sudan 2024 Partners Envisioning
Excellence Foundation for South Sudan
 
Building Stunning Websites using Wordpress.com for FREE
Building Stunning Websites using Wordpress.com for FREEBuilding Stunning Websites using Wordpress.com for FREE
Building Stunning Websites using Wordpress.com for FREE
Excellence Foundation for South Sudan
 
Introduction to Website Design & Google Sites
Introduction to Website Design & Google SitesIntroduction to Website Design & Google Sites
Introduction to Website Design & Google Sites
Excellence Foundation for South Sudan
 
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
Excellence Foundation for South Sudan
 
How to Search on Google Like a Pro
How to Search on Google Like a ProHow to Search on Google Like a Pro
How to Search on Google Like a Pro
Excellence Foundation for South Sudan
 
Masterclass: Fitness as an aspect of nutrition_The relationship
Masterclass: Fitness as an aspect of nutrition_The relationshipMasterclass: Fitness as an aspect of nutrition_The relationship
Masterclass: Fitness as an aspect of nutrition_The relationship
Excellence Foundation for South Sudan
 
NUTRITION_Nourishing your way to vitality
NUTRITION_Nourishing your way to vitalityNUTRITION_Nourishing your way to vitality
NUTRITION_Nourishing your way to vitality
Excellence Foundation for South Sudan
 
Artificial Intelligence (AI) Productivity Tools for School and Office
Artificial Intelligence (AI) Productivity Tools for School and OfficeArtificial Intelligence (AI) Productivity Tools for School and Office
Artificial Intelligence (AI) Productivity Tools for School and Office
Excellence Foundation for South Sudan
 
Grant Writing: Fundamentals of Successful Grant Writing
Grant Writing: Fundamentals of Successful Grant WritingGrant Writing: Fundamentals of Successful Grant Writing
Grant Writing: Fundamentals of Successful Grant Writing
Excellence Foundation for South Sudan
 

More from Excellence Foundation for South Sudan (20)

The Root Cause Analysis in Quality Improvement
The Root Cause Analysis in Quality ImprovementThe Root Cause Analysis in Quality Improvement
The Root Cause Analysis in Quality Improvement
 
The Focusing Matrix for Quality Improvement
The Focusing Matrix for Quality ImprovementThe Focusing Matrix for Quality Improvement
The Focusing Matrix for Quality Improvement
 
The Driver Diagrams for Quality Improvement
The Driver Diagrams for Quality ImprovementThe Driver Diagrams for Quality Improvement
The Driver Diagrams for Quality Improvement
 
The Model for Quality Improvement Presentation
The Model for Quality Improvement PresentationThe Model for Quality Improvement Presentation
The Model for Quality Improvement Presentation
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Effective Classroom Management Strategies for South Sudanese Teachers
Effective Classroom Management Strategies for South Sudanese TeachersEffective Classroom Management Strategies for South Sudanese Teachers
Effective Classroom Management Strategies for South Sudanese Teachers
 
Emotional Intelligence and Psychological Wellbeing in the Workplace for Teachers
Emotional Intelligence and Psychological Wellbeing in the Workplace for TeachersEmotional Intelligence and Psychological Wellbeing in the Workplace for Teachers
Emotional Intelligence and Psychological Wellbeing in the Workplace for Teachers
 
School Teachers Child Safeguarding Training in South Sudan
School Teachers Child Safeguarding Training in South SudanSchool Teachers Child Safeguarding Training in South Sudan
School Teachers Child Safeguarding Training in South Sudan
 
Writing Your Wells Mountain Initiative Scholarship Essays
Writing Your Wells Mountain Initiative Scholarship EssaysWriting Your Wells Mountain Initiative Scholarship Essays
Writing Your Wells Mountain Initiative Scholarship Essays
 
EXCELLENCE FOUNDATION FOR SOUTH SUDAN (EFSS) ANNUAL IMPACT REPORT 2023
EXCELLENCE FOUNDATION FOR SOUTH SUDAN (EFSS) ANNUAL IMPACT REPORT 2023EXCELLENCE FOUNDATION FOR SOUTH SUDAN (EFSS) ANNUAL IMPACT REPORT 2023
EXCELLENCE FOUNDATION FOR SOUTH SUDAN (EFSS) ANNUAL IMPACT REPORT 2023
 
Spelling Bee South Sudan 2024 Partners Envisioning
Spelling Bee South Sudan 2024 Partners EnvisioningSpelling Bee South Sudan 2024 Partners Envisioning
Spelling Bee South Sudan 2024 Partners Envisioning
 
Building Stunning Websites using Wordpress.com for FREE
Building Stunning Websites using Wordpress.com for FREEBuilding Stunning Websites using Wordpress.com for FREE
Building Stunning Websites using Wordpress.com for FREE
 
Introduction to Website Design & Google Sites
Introduction to Website Design & Google SitesIntroduction to Website Design & Google Sites
Introduction to Website Design & Google Sites
 
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
A Guide to Applying for the Wells Mountain Initiative Scholarship 2023
 
How to Search on Google Like a Pro
How to Search on Google Like a ProHow to Search on Google Like a Pro
How to Search on Google Like a Pro
 
Masterclass: Fitness as an aspect of nutrition_The relationship
Masterclass: Fitness as an aspect of nutrition_The relationshipMasterclass: Fitness as an aspect of nutrition_The relationship
Masterclass: Fitness as an aspect of nutrition_The relationship
 
NUTRITION_Nourishing your way to vitality
NUTRITION_Nourishing your way to vitalityNUTRITION_Nourishing your way to vitality
NUTRITION_Nourishing your way to vitality
 
Artificial Intelligence (AI) Productivity Tools for School and Office
Artificial Intelligence (AI) Productivity Tools for School and OfficeArtificial Intelligence (AI) Productivity Tools for School and Office
Artificial Intelligence (AI) Productivity Tools for School and Office
 
Grant Writing: Fundamentals of Successful Grant Writing
Grant Writing: Fundamentals of Successful Grant WritingGrant Writing: Fundamentals of Successful Grant Writing
Grant Writing: Fundamentals of Successful Grant Writing
 

Recently uploaded

Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 

Recently uploaded (20)

Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 

Masterclass_ Cybersecurity and Data Privacy Basics

  • 1. Cybersecurity and Data Privacy Basics 1 Richard Mawa Michael
  • 2. • Introduction ▫ What is cybersecurity? • Skill Building ▫ Recognizing a secure website ▫ Making passwords strong and memorable ▫ Recognizing and avoiding online scams • Tips and Tricks • Practice Today’s Agenda 2
  • 3. 3 Introduction Why do we need to be safe when we’re online? • Because we share personal information that we want to keep private to avoid online attacks from cyber criminals. • Fraudsters may try to gain access to our personal data or information so that they can restrict, steal, or delete.
  • 4. 4 Cybersecurity: Personal data should not be accessed by others. . Our devices should work properly and be free from malware. Introduction (continued) Cybersecurity is all about the safety of information—our identity, our personal data, and our financial assets—when we’re online. For people like you and me, cybersecurity means that 1) your personal data is only accessible to you or others you authorize, and that 2) our devices—laptops, desktop computers, mobile phones, tablets—work properly and are free from malware. Malware is malicious software. It can take many shapes—from viruses that infect your favorite devices to spyware and adware that track your online activities.
  • 5. Secure Websites 5 Why do we need secure website for our online activities? • So that if you enter your personal information, you want to keep your information safe. • A secure website always keeps its users accounts safe as a way of maintaining its reputation.
  • 6. 6 Secure Websites contain https not just http. HTTPS stand for Hypertext Transfer Protocol Secure. It's a way to securely send your data from a browser to a website. It encrypts both data entered in to a users device and data going from the website to the browser
  • 7. 7 Insecure websites usually contains the HTTP layer only as seen below.
  • 8. Personal Accounts 8 What kinds of online accounts have you created? Personal where all your information/data is fully encrypted or public accounts where all information about you is publicly displayed. Why would someone create an account on a website? • You create a personal account for communication, online banking, e-services, learning/research, etc.
  • 9. 9 Secure Websites (continued) It’s important to keep your account secure on any website
  • 11. 11 ACTIVITY #1: Secure Websites Use a Web browser to browse to a website you might use for shopping, banking, social media, or something else that interests you. If you don’t have your own computer, follow along with the instructor. Website visited: ___________________________________________________________ Is the website I visited secure? ______ yes ______ no How did you determine that the website is secure? 1. ___________________________________________________________________ 2. ___________________________________________________________________
  • 12. Strong Passwords 12 A strong password is one that is hard to guess and keeps you safe in the Cyberspace.
  • 13. Strong Passwords (continued) 13 How do you come up with a password? Think of something unique and strong. How do you make it strong and secure? Avoid using common dictionary names, your device names even don't create your password from your name.
  • 14. Common Requirements 14 Can usually include: • Numbers • Uppercase and lowercase letters • Symbols or characters such as ~ ! # @ $ %
  • 15. Tips for Strong Passwords 15 Don’t use common words like “password” Don’t include personal information Don’t use the same password on multiple accounts and sites Don’t share with others—keep them private
  • 16. Tips for strong passwords and phrase passes 16 Make the password longer Use short phrases that are easier to remember: “cowshelpmakecheese” Hard to remember
  • 17. Keeping Track of Passwords 17 How do you remember your passwords? 1. Include your password elsewhere in your Notebook 2. Use Password manager to store your passwords eg last pass
  • 18. 1. Notebook 18 Store in a safe and secure place Instead of writing the actual password, write something that helps you remember what the password is.
  • 19. 2. Password Software provide applications that you can install in your devices to store your passwords safely for example last pass. 19
  • 20. Use passphrase rather than password. It is easier to create a passphrase rather than a password because it is generally in the form of a sentence rather than a word. 20 cowshelpmakecheese
  • 22. 22
  • 23. 23 Using the password requirements in the Sign Up form above, create a strong password that meets the criteria.
  • 24. 24 Phishing Online Fraud and Scams. Social Engineering
  • 25. Phishing is when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source. 25
  • 26. Spear phishing. While phishing and spear phishing both use emails to reach the victim,spear phishing emails are customized to a specific person. The attacker researches the Target's interests before sending the email. 26
  • 27. Social Engineering is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information. 27
  • 28. Online Fraud and Scams (continued) 28 What are some examples you’ve experienced? How can you help to stay safe from fraudsters? to stay safe avoid responding to urgent problems from unknown people that requires immediate network access.
  • 29. Tips to Recognize Scams 29 Have you heard of the person or organization? Can you tell who the email message is from? Does the email have mistakes? Are they asking for your information? Are they trying to rush you into a quick action? Is it too good to be true?
  • 30. 30 Have you heard of the person or organization?
  • 31. 31 Can you tell who the message is from?
  • 32. 32 Are they asking for your information?
  • 33. 33 Does the email have mistakes?
  • 34. 34 Are they trying to rush you into a quick action?
  • 35. 35 Is it too good to be true?
  • 37. 37 What are four things in this email that indicate a scam?
  • 38. Dos and Don’ts to Avoid Scams 38 Give any personal information Reply to or engage with the fraudster Click any links or buttons Download any files or attachments Be skeptical Read emails carefully Look up information on your own Don’t Do
  • 39. 39 Don’t give any personal information.
  • 40. 40 Don’t reply to or engage with the fraudster.
  • 41. 41 Don’t click any links or buttons.
  • 42. 42 Don’t download any files or attachments.
  • 44. 44 Do read emails carefully.
  • 45. 45 Do look up information on your own.
  • 47. 47
  • 48. 48
  • 49. 49
  • 50. 50
  • 51. 51
  • 52. 52
  • 53. Questions 53 Anything you want to ask or clarify before we end?
  • 54. Today you . . . ▫ learned about cybersecurity. ▫ built skills to: ● recognize a secure website. ● make passwords strong and memorable. ● recognize and avoid online scams. ▫ discovered useful tips to help you stay safe online. Congratulations! 54
  • 55. Thank you for coming! 55