Download presentation
Presentation is loading. Please wait.
1
Bethesda Cybersecurity Club
Lesson 2 Online Safety and Cybersecurity Principles
2
Agenda News and Nova Labs Review from last week
Personally Identifiable Information Internet safety CIA Triad Malware Hands on 10 min – meet your teammates 5 min – News – NotPetya Virus 10 min – Nova labs experience 5 min – Review last week 10 min – PII and Internet Safety 10 min – CIA Triad 10 min - Malware 40 min – hands on stuff 20 min – review/closeout/cleanup
3
Personally identifiable information (pii)
PII is any information specific to an individual •Examples: Student ID Number Date of Birth Address Mailing Address Credit Card Information Social Security Number •PII can be used by hackers to steal someone’s identity, bank funds, etc. •Hackers also use PII to impersonate victims in order to gain access to a different person or an organizations network •This type of information should only be shared with trusted, verified individuals
4
Online safety Never share your password
Only share PII when absolutely necessary Do not download any suspicious or unknown software Always log out when you are done Never post anything you do not want public You might think you’re being safe and limiting your posts to only friends, but anything you post can be easily copied and pasted and sent to someone else If you’re unsure about anything you do online, ask your parent or guardian if it is OK
5
Safe browsing Do not use public Wi-Fi to access risk sites
Check the address for spoofs Use a secure website, especially when submitting PII Look for a ‘padlock’ in the browser address bar Look for a green background or green text Internet browsers Use automatic updates Use and regularly update built-in safety features Pop-up blockers Anti-spyware Anti-virus Anti-phishing Do not use “Save Password” or “Remember Me” functions Internet Explorer is more frequently targeted and has more security flaws than any other browser
6
Social media Be picky Do not post your location Be careful with apps
Only accept or follow friends you know in real life Do not post your location Be careful with apps Games and geo-tracking apps may give away your location or other PII Assume everything you post online is permanent Colleges and employers check social media accounts Don’t over-share Just because a site asks for information doesn’t mean it’s required to set up an account Customize and update your security settings Default settings are weak
7
CIA Triad Confidentiality - Making sure only approved users have access to data Integrity Data Integrity - assurance that information has not been tampered with or corrupted between the source and the end user Source Integrity - assurance that the sender of the information is who it is supposed to be Availability - Ensuring data is accessible by approved users when needed People Processes Tools
8
CIA Triad: Tools of the trade
Confidentiality Encryption - Passwords, encryption keys User access control - Controlling which users have access to networks and what level of access each user has Integrity Encryption User access control File permissions - Customizable settings that only allow certain users to view and edit files Version control systems/backups Availability Offsite data storage/backups Redundant architecture (hardware and software)
18
Anti-Virus/malware software
Scans files for known malware Alerts when match or suspect program runs Quarantines infected files
19
Hands on… Create user accounts Passwords Firewall WiFi Anti virus
File permissions Malware
20
What’s next? Homework: Lesson 3 – Cybersecurity principles
research a cyber attack What did it do? How did it work? What could have prevented it? Read Top 19 Worst Passwords Lesson 3 – Cybersecurity principles
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.