Masterclass_ Cybersecurity and Data Privacy Basics
The document provides an introduction to cybersecurity and emphasizes the importance of protecting personal data online. It covers topics such as recognizing secure websites, creating strong passwords, and avoiding online scams, including phishing. Additionally, it offers practical tips and activities to help individuals enhance their online safety.
Introduction to Cybersecurity concepts and the presenter Richard Mawa Michael.
Defines cybersecurity, personal data protection, and the need for secure devices free of malware.
Discusses secure websites, their role in protecting personal information, and what distinguishes them from insecure sites.
Explains what constitutes a strong password, including tips on creation and management of passwords.
Defines phishing and spear phishing, alongside social engineering tactics used to manipulate individuals. Tips on recognizing scams including identifying urgency, checking for mistakes, and known contacts.Lists actions to avoid engagement with fraudsters, emphasizing caution and verification.
Summarizes learned concepts on cybersecurity, including secure websites, strong passwords, and scam avoidance.
• Introduction
▫ Whatis cybersecurity?
• Skill Building
▫ Recognizing a secure website
▫ Making passwords strong and memorable
▫ Recognizing and avoiding online scams
• Tips and Tricks
• Practice
Today’s Agenda
2
3.
3
Introduction
Why do weneed to be safe when
we’re online?
• Because we share personal information that we want
to keep private to avoid online attacks from cyber
criminals.
• Fraudsters may try to gain access to our personal
data or information so that they can restrict, steal,
or delete.
4.
4
Cybersecurity:
Personal data shouldnot be
accessed by others. .
Our devices should work properly
and be free from malware.
Introduction (continued)
Cybersecurity is all about the safety of information—our identity, our personal data, and our financial assets—when
we’re online.
For people like you and me, cybersecurity means that 1) your personal data is only accessible to you or others you
authorize, and that 2) our devices—laptops, desktop computers, mobile phones, tablets—work properly and are free
from malware. Malware is malicious software. It can take many shapes—from viruses that infect your favorite
devices to spyware and adware that track your online activities.
5.
Secure Websites
5
Why dowe need secure website
for our online activities?
• So that if you enter your personal information, you
want to keep your information safe.
• A secure website always keeps its users accounts
safe as a way of maintaining its reputation.
6.
6
Secure Websites containhttps not just http.
HTTPS stand for Hypertext Transfer Protocol
Secure. It's a way to securely send your data from
a browser to a website. It encrypts both data
entered in to a users device and data going from
the website to the browser
Personal Accounts
8
What kindsof online accounts have
you created? Personal where all your
information/data is fully encrypted or
public accounts where all information
about you is publicly displayed.
Why would someone create an
account on a website?
• You create a personal account for communication,
online banking, e-services, learning/research, etc.
11
ACTIVITY #1: SecureWebsites
Use a Web browser to browse to a website you might use for shopping, banking, social
media, or something else that interests you.
If you don’t have your own computer, follow along with the instructor.
Website visited: ___________________________________________________________
Is the website I visited secure? ______ yes ______ no
How did you determine that the website is secure?
1. ___________________________________________________________________
2. ___________________________________________________________________
Strong Passwords (continued)
13
Howdo you come up with a password? Think of
something unique and strong.
How do you make it strong and secure? Avoid using
common dictionary names, your device names even
don't create your password from your name.
Tips for StrongPasswords
15
Don’t use common words like “password”
Don’t include personal information
Don’t use the same password on multiple accounts and sites
Don’t share with others—keep them private
16.
Tips for strongpasswords and phrase passes
16
Make the password longer
Use short phrases that are easier to remember:
“cowshelpmakecheese”
Hard to
remember
17.
Keeping Track ofPasswords
17
How do you remember your
passwords?
1. Include your password elsewhere in your Notebook
2. Use Password manager to store your passwords eg
last pass
18.
1. Notebook
18
Store ina safe and
secure place
Instead of writing the actual password, write something that
helps you remember what the password is.
19.
2. Password Softwareprovide applications that you
can install in your devices to store your passwords
safely for example last pass.
19
20.
Use passphrase ratherthan password.
It is easier to create a passphrase rather than a password because it is
generally in the form of a sentence rather than a word.
20
cowshelpmakecheese
Phishing is whena malicious party sends a
fraudulent email disguised as being from a
legitimate, trusted source.
25
26.
Spear phishing.
While phishingand spear phishing both use emails to
reach the victim,spear phishing emails are customized
to a specific person. The attacker researches the
Target's interests before sending the email.
26
27.
Social Engineering isan access attack that attempts to
manipulate individuals into performing actions or
divulging confidential information.
27
28.
Online Fraud andScams (continued)
28
What are some examples you’ve
experienced?
How can you help to stay safe from
fraudsters? to stay safe avoid responding to urgent problems
from unknown people that requires immediate network
access.
29.
Tips to RecognizeScams
29
Have you heard of the person or organization?
Can you tell who the email message is from?
Does the email have mistakes?
Are they asking for your information?
Are they trying to rush you into a quick action?
Is it too good to be true?
Dos and Don’tsto Avoid Scams
38
Give any personal information
Reply to or engage with the fraudster
Click any links or buttons
Download any files or attachments
Be skeptical
Read emails carefully
Look up information on your own
Don’t
Do
Today you .. .
▫ learned about cybersecurity.
▫ built skills to:
● recognize a secure website.
● make passwords strong and memorable.
● recognize and avoid online scams.
▫ discovered useful tips to help you stay safe online.
Congratulations!
54