Cyber Sprinters: Activity 2a What is personal
1 / 1

Cyber Sprinters: Activity 2a What is personal

Author : yoshiko-marsland | Published Date : 2025-05-16

Description: Cyber Sprinters Activity 2a What is personal information Were all online more Were all spending more time online Online shopping video calls with family and friends school lessons in lockdown Not just using computers laptops

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Cyber Sprinters: Activity 2a What is personal" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Transcript:Cyber Sprinters: Activity 2a What is personal:
Cyber Sprinters: Activity 2a What is personal information? We’re all online more…. We’re all spending more time online. Online shopping, video calls with family and friends, school lessons in lockdown. Not just using ‘computers’ (laptops, tablets and phones): Smart TVs (have Disney, Netflix, Prime and other apps ‘built in’) Smart gadgets around the home (speakers, doorbells, Nest) Online gaming (computer, devices, or consoles) To access these services, we have to provide personal information. What is personal information? Personal information is the information about you that identifies who you are. In other words, it’s the information that makes you, you! Different types of personal information include: name date of birth address gender telephone number email address password When might you be asked to provide personal information? Setting up a bank account Creating a gaming account Creating a social media account Signing up for an email account Signing up for a music service Signing up for video service (NowTV, Netflix, Disney) Why do we need to be careful with this information? If someone gets hold of your personal information, they can pretend to be you. They can then set up accounts in your name and they can even spend your money. This is known as identity theft. Sometimes you don’t find out that your identity has been stolen until years later. How can you keep your accounts secure? Think about what you are sharing, and who with. Do they need that information? What are they going to use it for? Does it seem genuine? Protect your accounts using a strong password (such as one created with three random words like pinkbirdpsrouts) It’s really important that your email account is protected. If a hacker can access your email account they will be able to access lots of personal information. Install the latest updates on your devices. Devices that have the latest software on them are much harder for criminals to hack. Protect your accounts using two-step authentication (which you learned about in the passwords activities) . Would you, or wouldn’t you? Would you give your first name and second name when setting up a bank account? Yes. Banks have to know your personal details to check that it’s really you spending your money or looking at your account. They are very good at looking after your personal details, so no one else can get at them. They give you other codes to keep

Download Document

Here is the link to download the presentation.
"Cyber Sprinters: Activity 2a What is personal"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Presentations

Defending Against Modern Cyber Advisories SURVEY OF CYBER FORENSICS AND CYBER SECURITY Personal Safety and Wellbeing …and potential cyber security challenges Cyber defence in the Polish MOD 1 Cyber Security Overview of Cyber Experimentation & Test Ranges Cyber Risk Module 3: Prevention of becoming a bully Cyber Warfare and Importance of Cyber Awareness Cyber Sprinters: Activity 3a Cyber System-Centric Approach To Cyber Security and CIP Cyber Sprinters: Activity 3c