Online safety

Welcome!
Let's form two groups
1 / 20
next
Slide 1: Slide
EnglishVocational Education

This lesson contains 20 slides, with interactive quizzes, text slides and 3 videos.

Items in this lesson

Welcome!
Let's form two groups

Slide 1 - Slide

Let's begin with a warm-up

Slide 2 - Slide

Word ladder
 Change one letter at a time, attempting to move from the starting word to the ending word

Slide 3 - Slide

Internet security

Slide 4 - Slide


Our goals for the lesson
  1. Identify Online threats
  2. Give tips for Internet users

Slide 5 - Slide

Slide 6 - Video

What's the name of such an online attack?
A
Fishing
B
Phishing
C
Malware
D
Blackmail

Slide 7 - Quiz

Phishing is a type of
social engineering attack
URL manipulation
Exploits
Malicious code
Cybercrime

Slide 8 - Poll

Slide 9 - Video

How is this type of threat called?
A
Unauthorized data disclosure
B
Spyware
C
Cyberbullying
D
Account takeover

Slide 10 - Quiz

Why is cyberbullying dangerous?

Slide 11 - Open question

Slide 12 - Video

The process of using popular websites to fool users in order to do harm is called ...
A
Scam
B
Personalization
C
Malware
D
Watering hole

Slide 13 - Quiz

timer
2:00
Types of
Internet threats

Slide 14 - Mind map

But there is a solution

Slide 15 - Slide

Use strong passwords and activate two-step verification
Be careful about what you share on social media websites
Click on suspicious links
Use the same password for all your accounts
Open or download attachments from an unknown source
Share personal or financial information on public computers or Wi-Fi hotspots
Keep your privacy settings on
Practice Safe Browsing

Slide 16 - Drag question

Slide 17 - Slide

Group #1

Phishing
Watering hole
Network spoofing
Cyberbullying
Unauthorized data disclosure


Group #2

Botnet
Spyware
Computer worms
Brute force attacks
Malware

Slide 18 - Slide


Our tips for internet users

Slide 19 - Open question

Let's sum it up!

Slide 20 - Slide