CYBERSECURI
TY
WITH ELLA
The 3 big themes for today:
Introduction to Cybersecurity
Cyber threats : Black & White Hackers
Being safe online
Outlin
e
CLASSROOM
RULES
• My role and your role
• Questions
• Keeping the order
• End-of-lesson recap (quiz)
But who initiates a cyber threat/attack?
A type of Hacker
CYBER=
+
SECURITY=
The digital world or the online realm. This relates to the
network and communication between used devices.
How we safeguard and protect ourselves from harm
CYBERSECURITY=
The practice of defending our computers, servers,
mobile devices, electronic systems, and any kind
of network, from malicious attacks.
The opposite = ??
THEBLACK
HATHACKER
“I want to access your data to harm you”
• Engage in hacking activities with malicious intent
• Exploit vulnerabilities in computer systems,
networks, or software
• Motivated by personal gain, financial benefits, or
stealing sensitive information
• Cause damage or disrupt services
• Actions are illegal and unethical
THEWHITE
HATHACKER
“Someone has to save the day! I am the good guy”
• Also known as ethical hackers or security
researchers
• Use hacking skills for positive purposes
• Identify vulnerabilities in systems, networks, or
software
• Help organizations strengthen their security
• Conduct security assessments with permission
• Uncover weaknesses and provide
recommendations for improving cybersecurity
• Be aware of the risks of sharing information
online.
• Manage your online accounts and passwords:
⚬ Use different passwords across multiple
accounts.
⚬ Lock your devices to prevent unauthorized
access.
⚬ Create long and memorable passwords.
• Install antivirus software.
• Be cautious of suspicious links and emails.
HOWTOBE
SAFEFROM
CYBERATTACKS
WHAT
HAPPENSTO
YOUUNDERA
CYBER
ATTACK?
• Financial losses for individuals and
organizations
• Theft of personal and sensitive information
• Damage to reputation and trust
• Disruption of services or operations
• Potential legal and regulatory consequences
RECAP:OURKEYTAKEAWAYS
TODAY
What is Cybersecurity?
Cypbersecurity is ...
Who is a white hat hacker?
A white hat hacker is someone
who....
Who is a black hat hacker?
A white hat hacker is someone who...
How can you be safe online?
To be safe online....
01 02 03
05
04
**What is the difference between the
white hat hacker and the black hat
hacker?
**ONE STEP FURTHER
Unauthorized access to your data
Considered cybercriminals as they do not
follow rules when it comes to system hacking.
They exploit security flaws for their own
personal gain
Authorized access
Considered the good guys because they
follow the rules when it comes to hacking
into systems.
They do not exploit security flaws but rather
identify them to build stronger systems
WELL
DONE&
THANK
YOU

More Related Content

PDF
Information & cyber security, Winter training ,bsnl. online
PDF
Information cyber security
PPTX
Cyber security
PPT
Information security Presentation
PPTX
Cyber Security PPT and how to be aware from hackers
PPTX
cybersecurity notes important points.pptx
PPTX
Cyber security & Cyber Crime
PPT
Cyber crime and cyber security
Information & cyber security, Winter training ,bsnl. online
Information cyber security
Cyber security
Information security Presentation
Cyber Security PPT and how to be aware from hackers
cybersecurity notes important points.pptx
Cyber security & Cyber Crime
Cyber crime and cyber security

Similar to Cybersecurity For kids in Powerpoint format (20)

PPTX
Cyber Crime And Cyber Safety Project.pptx
PPTX
Cyber Security.pptx
PPTX
Persentation
PPTX
Cyber security
PPTX
Cyber security
PPTX
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
PPT
IT Security Awareness-v1.7.ppt
PDF
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
PPT
Cyber Security and Cyber Awareness
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Online safety, security, ethics & etiquette
PPT
Cyberterrorism
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Cyber_Crime_Security.pptx
PPTX
Cybersecurity_Office_everyday Presentation.pptx
PPTX
Computer Ethics, Cyber ethics and securi
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
CYBER SECURITY
PPTX
Cyber crime and security
PPTX
Grade 7 Chap 10 Cyber Threats and Security
Cyber Crime And Cyber Safety Project.pptx
Cyber Security.pptx
Persentation
Cyber security
Cyber security
Learn What Is Ethical Hacking & Who Is Ethical Hackers.pptx
IT Security Awareness-v1.7.ppt
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
Cyber Security and Cyber Awareness
Cyber Security Awareness Session for Executives and Non-IT professionals
Online safety, security, ethics & etiquette
Cyberterrorism
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber_Crime_Security.pptx
Cybersecurity_Office_everyday Presentation.pptx
Computer Ethics, Cyber ethics and securi
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
CYBER SECURITY
Cyber crime and security
Grade 7 Chap 10 Cyber Threats and Security
Ad

Recently uploaded (20)

PDF
Paper A Mock Exam 9_ Attempt review.pdf.
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Trump Administration's workforce development strategy
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
International_Financial_Reporting_Standa.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Complications of Minimal Access-Surgery.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
Paper A Mock Exam 9_ Attempt review.pdf.
Cambridge-Practice-Tests-for-IELTS-12.docx
Virtual and Augmented Reality in Current Scenario
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
LDMMIA Reiki Yoga Finals Review Spring Summer
A powerpoint presentation on the Revised K-10 Science Shaping Paper
FORM 1 BIOLOGY MIND MAPS and their schemes
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Trump Administration's workforce development strategy
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
International_Financial_Reporting_Standa.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Empowerment Technology for Senior High School Guide
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Complications of Minimal Access-Surgery.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
Ad

Cybersecurity For kids in Powerpoint format

  • 1. CYBERSECURI TY WITH ELLA The 3 big themes for today: Introduction to Cybersecurity Cyber threats : Black & White Hackers Being safe online Outlin e
  • 2. CLASSROOM RULES • My role and your role • Questions • Keeping the order • End-of-lesson recap (quiz)
  • 3. But who initiates a cyber threat/attack? A type of Hacker CYBER= + SECURITY= The digital world or the online realm. This relates to the network and communication between used devices. How we safeguard and protect ourselves from harm CYBERSECURITY= The practice of defending our computers, servers, mobile devices, electronic systems, and any kind of network, from malicious attacks. The opposite = ??
  • 4. THEBLACK HATHACKER “I want to access your data to harm you” • Engage in hacking activities with malicious intent • Exploit vulnerabilities in computer systems, networks, or software • Motivated by personal gain, financial benefits, or stealing sensitive information • Cause damage or disrupt services • Actions are illegal and unethical
  • 5. THEWHITE HATHACKER “Someone has to save the day! I am the good guy” • Also known as ethical hackers or security researchers • Use hacking skills for positive purposes • Identify vulnerabilities in systems, networks, or software • Help organizations strengthen their security • Conduct security assessments with permission • Uncover weaknesses and provide recommendations for improving cybersecurity
  • 6. • Be aware of the risks of sharing information online. • Manage your online accounts and passwords: ⚬ Use different passwords across multiple accounts. ⚬ Lock your devices to prevent unauthorized access. ⚬ Create long and memorable passwords. • Install antivirus software. • Be cautious of suspicious links and emails. HOWTOBE SAFEFROM CYBERATTACKS WHAT HAPPENSTO YOUUNDERA CYBER ATTACK? • Financial losses for individuals and organizations • Theft of personal and sensitive information • Damage to reputation and trust • Disruption of services or operations • Potential legal and regulatory consequences
  • 7. RECAP:OURKEYTAKEAWAYS TODAY What is Cybersecurity? Cypbersecurity is ... Who is a white hat hacker? A white hat hacker is someone who.... Who is a black hat hacker? A white hat hacker is someone who... How can you be safe online? To be safe online.... 01 02 03 05 04 **What is the difference between the white hat hacker and the black hat hacker?
  • 8. **ONE STEP FURTHER Unauthorized access to your data Considered cybercriminals as they do not follow rules when it comes to system hacking. They exploit security flaws for their own personal gain Authorized access Considered the good guys because they follow the rules when it comes to hacking into systems. They do not exploit security flaws but rather identify them to build stronger systems