SlideShare a Scribd company logo
1 of 12
Written by:
Hannah Brock
Nicolaus Lopez
Rachel Roberson
Natalie Quinchia
Alissa Ovalle
Digital Footprints
&
Cyber Security
Presented by:
____________________
Digital Footprint
“Every day most of us contribute to an evolving
public presentation of who we are that anyone can
see and that we cannot erase. We might think we
are at home on our laptops, cell phones or iPads
communicating with just a few people on our
friends list. But in reality we are in a huge
auditorium speaking into a public address system
to a world that can record and distribute
everything we say.”
What is a Digital Footprint
● Digital footprint is the presence that you leave behind
online
● It is a trail of data that is associated with your online
name
● Your digital footprint is PERMANENT
● Digital Footprint
How to Leave a Positive Footprint
Make your password strong- and DO NOT share it with
anyone
Always remember to logout when you are finished online
Know what information about you is available for the
public to see
Check privacy setting and adjust them from the default
Most importantly… T.H.I.N.K. before you post or search
5 Ways to Make a Positive Digital Footprint
What is Cyber Security?
Cyber Security 101
Protection of your computer and network against:
Unauthorized attacks
Unwanted data
It matters to everyone
http://www.forbes.com/sites/larrymagid/2014/10/01/why-cyber-security-matters-to-everyone/
It is how all personal and private information stored on the web is
able to stay private and secure
Personal information is stored, accessed, and processed all
throughout the web
Doctors
Government
Bank
Amazon
According to the National Institute of Standards and Technology,
the U.S. will need 700,000 new cyber security professionals by
2015.
Why is Cyber Security Important?
● What is the financial impact? Can you
guess how much money cybercrime
has cost us?
● "The world isn’t run by weapons anymore, or energy, or
money. It’s run by little ones and zeros, little bits of data...
There’s a war out there... and it’s not about who’s got the
most bullets. It’s about who controls the information.”
(Federation of American Scientists)
Phishing
What is Phishing?
http://security.fsu.edu/content/down
load/298639/2091991/oneclick.m
p4
How to spot a Phish:
- AVOID attachments and links
in suspicious e-mails
Questions?
Comments?

More Related Content

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Ready-Cyber-Security-and-your-Digital-Footprint.pptx

  • 1. Written by: Hannah Brock Nicolaus Lopez Rachel Roberson Natalie Quinchia Alissa Ovalle Digital Footprints & Cyber Security Presented by: ____________________
  • 2. Digital Footprint “Every day most of us contribute to an evolving public presentation of who we are that anyone can see and that we cannot erase. We might think we are at home on our laptops, cell phones or iPads communicating with just a few people on our friends list. But in reality we are in a huge auditorium speaking into a public address system to a world that can record and distribute everything we say.”
  • 3. What is a Digital Footprint ● Digital footprint is the presence that you leave behind online ● It is a trail of data that is associated with your online name ● Your digital footprint is PERMANENT ● Digital Footprint
  • 4.
  • 5. How to Leave a Positive Footprint Make your password strong- and DO NOT share it with anyone Always remember to logout when you are finished online Know what information about you is available for the public to see Check privacy setting and adjust them from the default Most importantly… T.H.I.N.K. before you post or search 5 Ways to Make a Positive Digital Footprint
  • 6.
  • 7. What is Cyber Security? Cyber Security 101 Protection of your computer and network against: Unauthorized attacks Unwanted data It matters to everyone http://www.forbes.com/sites/larrymagid/2014/10/01/why-cyber-security-matters-to-everyone/
  • 8. It is how all personal and private information stored on the web is able to stay private and secure Personal information is stored, accessed, and processed all throughout the web Doctors Government Bank Amazon According to the National Institute of Standards and Technology, the U.S. will need 700,000 new cyber security professionals by 2015. Why is Cyber Security Important?
  • 9. ● What is the financial impact? Can you guess how much money cybercrime has cost us? ● "The world isn’t run by weapons anymore, or energy, or money. It’s run by little ones and zeros, little bits of data... There’s a war out there... and it’s not about who’s got the most bullets. It’s about who controls the information.” (Federation of American Scientists)
  • 10.
  • 11. Phishing What is Phishing? http://security.fsu.edu/content/down load/298639/2091991/oneclick.m p4 How to spot a Phish: - AVOID attachments and links in suspicious e-mails

Editor's Notes

  1. Pictures of famous presenters.
  2. Information is everywhere and keeping your personal information secure is a top priority.
  3. MAYBE??? ASK STUDENTS: How many of you have ever been to the doctor or have a bank account open in your name?
  4. As you transition into college you will be required to use your computer every single day. The average bank robbery according to the U.S. DEPARTMENT OF JUSTICE FEDERAL BUREAU OF INVESTIGATION: $38 million. Globally, cybercrime has cost us $3 Trillion dollars.
  5. Natalie
  6. Add your contact info