Year 8 online identity, cyber security

Year 8 online identity, cyber security
1 / 12
next
Slide 1: Slide
ComputingLower Secondary (Key Stage 3)

This lesson contains 12 slides, with interactive quizzes, text slides and 2 videos.

time-iconLesson duration is: 60 min

Items in this lesson

Year 8 online identity, cyber security

Slide 1 - Slide

Online Identity is how you are seen or known on the internet.

It includes things like:
  • Usernames and profiles – the names and pictures you use on social media, games, or websites.
  • Personal details – any information you share, like your name, age, where you live, and what you like.
  • Online activity – what you do online, like posting, commenting, liking things, or sharing content.
  • Professional info – if you use websites like LinkedIn, it can show your school, skills, or jobs you’ve had.
  • All of this helps build your online identity, so it’s important to think carefully about what you share.






Slide 2 - Slide

What information would you be willing to share?​
Why are you comfortable with that? ​

Slide 3 - Open question

Slide 4 - Video

Why should we care about privacy
online?​

Slide 5 - Open question

What can company's do with our
images and data?​

Slide 6 - Open question

What should you read before signing
up?​

Slide 7 - Open question

Which browsers can help you with
your privacy?

Slide 8 - Open question

Types of Scams:

  • Phishing: Fake messages that look real to steal your info
  • Fake websites: Websites that look like real ones but are made to trick you
  • Lottery or prize scams: Saying you’ve won something you never entered
  • Job offer scams: Fake job offers that ask for money or personal info
  • Social media impersonations: People pretending to be someone else online
  • Deep fakes: Fake videos or voices made to look or sound real

Warning Signs to Look Out For:

  • Messages from people you don’t know
  • Promises that sound too good to be true
  • Being asked for personal details or money
  • Strange links or websites

Types of Phishing:

  • Email Phishing: Fake emails pretending to be from a real company
  • Spear Phishing: A scam that’s made just for you, using your name or info
  • SMS Phishing: Fake texts trying to trick you
  • Voice Phishing: Scam phone calls pretending to be from banks or companies

Slide 9 - Slide

Slide 10 - Video

Create a PowerPoint poster on phishing. 
Visit this website link to help,



  • An Image
  • What is phishing?....
  • How do we report it?...

Slide 11 - Slide

Further tasks:
Use the internet and add more slides to your PowerPoint:

  • What is shouldering?
  • What is a computer worm?
  • What is the difference between a worm and a virus?

Slide 12 - Slide