Curipod placeholder

What is one word you would use to describe online security?

0
0
Profile picture of z.bokhari

z.bokhari

Updated 5 months ago

1. Word cloud
120 seconds
What is one word you would use to describe online security?
2. Slide
60 seconds
IT security is important to keep our data safe and secure. Hackers can use technology to access our data without permission. We can protect our data by using strong passwords and being careful online.
IT Security Issues
3. Slide
60 seconds
Encryption: The process of scrambling data so that it is unreadable and can only be accessed with a key. Firewall: A software or hardware security system that protects computers from unauthorized access. Phishing: An attempt by cyber criminals to obtain sensitive information like passwords, credit card numbers, or account information by posing as a legitimate business or organization.
Concepts:
4. Slide
60 seconds
IT security issues can be caused by human error, such as leaving a computer logged in or forgetting to update software. IT security professionals use something called 'honeypots' to attract potential hackers and monitor their activities. AI-powered cybersecurity systems can detect threats faster than ever before and react to them quickly.
Did you know?
5. Open question
300 seconds
What are some of the risks associated with technology today?
6. Open question
300 seconds
What are some ways that we can protect ourselves from security threats?
7. Open question
300 seconds
What do you think is the most important thing to remember when it comes to IT security?
8. Open question
300 seconds
How do you think we can educate ourselves on IT security and stay safe?
9. Drawings
450 seconds
Brain break: Draw a pancake flying through outer space with toppings for wings
10. Drawings
1260 seconds
Question: What IT security issues can arise when sharing sensitive information online? Clues: • Think about who has access to the information online. • What can people do with the information once they have it? • What steps can be taken to protect the information? In pairs: Select and solve one of the tasks: A. Work in pairs to create a flowchart outlining steps to protect sensitive information online. B. Draw a picture of an example situation that could lead to IT security issues.
11. Poll
60 seconds
What is the term for a secret word or code that allows access to a computer system?
  • Username
  • Firewall
  • Password
  • Encryption
12. Poll
60 seconds
What is the practice of tricking someone into giving confidential information called?
  • Hacking
  • Spamming
  • Malware
  • Phishing
13. Open question
180 seconds
Work together in pairs: What is one way you can protect your personal information online?

Suggested content