Cybersecurity Basics: Protecting Your Digital World

Cybersecurity Basics: Protecting Your Digital World
1 / 13
next
Slide 1: Slide
MathematicsFurther Education (Key Stage 5)

This lesson contains 13 slides, with interactive quizzes and text slides.

Items in this lesson

Cybersecurity Basics: Protecting Your Digital World

Slide 1 - Slide

This item has no instructions

Do you think it is a good idea to use robots in education?
timer
0:20
😒🙁😐🙂😃

Slide 2 - Poll

This item has no instructions

Learning Objectives
Understand the basics of cybersecurity and its importance. Recognize common types of cybercrime and their impact. Apply seven tips to protect your data from cyber threats.

Slide 3 - Slide

This item has no instructions

What do you already know about cybersecurity?

Slide 4 - Mind map

This item has no instructions

The concept of cybersecurity
Cybersecurity: The practice of protecting digital information and systems from unauthorized access or attacks.

Slide 5 - Slide

This item has no instructions

Reasons to care about cybersecurity
Vulnerabilities in online activities. Exploitation by online criminals. Consequences of poor cybersecurity.

Slide 6 - Slide

This item has no instructions

Common types of cybercrime
Phishing, Malware, DoS and DDoS Attacks, Credit Card Fraud, Identity Theft.

Slide 7 - Slide

This item has no instructions

Risks of poor cybersecurity
Credit card fraud, loss of company data, identity theft.

Slide 8 - Slide

This item has no instructions

Seven tips for data protection
Back up files, update software, install antivirus, use strong passwords, enable MFA, be cautious of unknown senders, check URLs for security.

Slide 9 - Slide

This item has no instructions

Definition List
Cybersecurity: The practice of protecting digital information and systems from unauthorized access or attacks. Phishing: A cybercrime technique where fraudulent emails or messages are used to deceive individuals into revealing personal information. Malware: Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. DoS and DDoS Attacks: Denial-of-service attacks aimed at overwhelming a system with traffic to disrupt service. Credit Card Fraud: Unauthorized use of a credit card to make purchases or withdraw funds. Identity Theft: The fraudulent acquisition and use of a person's private identifying information, usually for financial gain. MFA (Multifactor Authentication): A security system that requires more than one method of authentication to verify the user's identity.

Slide 10 - Slide

This item has no instructions

Write down 3 things you learned in this lesson.

Slide 11 - Open question

Have students enter three things they learned in this lesson. With this they can indicate their own learning efficiency of this lesson.
Write down 2 things you want to know more about.

Slide 12 - Open question

Here, students enter two things they would like to know more about. This not only increases involvement, but also gives them more ownership.
Ask 1 question about something you haven't quite understood yet.

Slide 13 - Open question

The students indicate here (in question form) with which part of the material they still have difficulty. For the teacher, this not only provides insight into the extent to which the students understand/master the material, but also a good starting point for the next lesson.