Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
The Very Important Guide About...
Transcript of The Very Important Guide About...
There are some ways to protect us that the
That won't happen to me!
USING DATA ONLINE
ONE DAY YOU WILL NEED IT...
AND YOU'LL HAVE TO BE AWARE!
HOW DOES THIS AFFECT US?
We use the internet a lot - a
Here are some examples...
Stuff about you!!
Email, social networking
Amazon, shopping and banking online
Messaging, emails and chatrooms
Computer Misuse Act
This makes certain things like phishing illegal
Data Protection Act
The Eight Data Protection Act Principles
The act contains eight “Data Protection Principles”. These specify that personal data must be:
1. Processed fairly and lawfully.
2. Obtained for specified and lawful purposes.
3. Adequate, relevant and not excessive.
4. Accurate and up to date.
5. Not kept any longer than necessary.
6. Processed in accordance with the “data subject’s” (the individual’s) rights.
7. Securely kept.
8. Not transferred to any other country without adequate protection in situ.
The anti-virus that was actually a virus
Many people, to prevent viruses from attacking their computer download free anti-virus software. However, this person downloaded it and realised that instead of killing the software... it was software.
It worked like this...
However, there are people who don't care if it
is illegal or not
So you need to learn how to protect yourself
Look at your emails
NASA hacked by a __ year old person
A ____-year-old computer hacker caused a 21-day shutdown of NASA computers that support the international space station, and invaded a Pentagon weapons computer system to intercept 3,300 e-mails, steal passwords and cruise around like an employee.
Who was the youngest hacker to be charged ?
Is when people pretend to be people they are not, tricking you into giving them personal information.
Deletion/Changing of Data
access to your account and
changing personal files
People pretending to be people they are not - e.g - pretending to be your bank and asking for personal information.
People pretending to be you and uses your personal accounts (e.g. credit cards) for their own use.
Passwords and Encryptions
A ancient greek method....
It is a computer program that claims to be one thing (a game) but does another (deletes programs)
It is a small piece of software that uses networks and security holes to copy itself
There are two types of viruses - email and normal
Attached to an email, this virus copies itself and mails others in the victim’s email address book
A small piece of software that reproduces by attaching itself to other programs
Which are which?
Look for the Lock
'Help! My computer has shut down!'
'I hate viruses!'
'Hackers are people who are so bored because they have nothing better to do than ruin people lives'
Comments about hackers and
the stress they give people...
ARE YOU SURE YOU WANT TO SUBMIT YOUR ANSWER
A company hired him to hack into a Québécois website and write protests about political issues
GUESS WHAT HE WAS BRIBED WITH?
As many of you guys know... loads of people have been hacked and have gotten strange emails.....
Thank you for watching!