Lesson 2: Protecting your devices Ground rules We
Author : debby-jeon | Published Date : 2025-05-16
Description: Lesson 2 Protecting your devices Ground rules We will listen when others are speaking We can pass if we need to We will respect other points of view We will be open and honest but not discuss our own lives or others personal lives
Presentation Embed Code
Download Presentation
Download
Presentation The PPT/PDF document
"Lesson 2: Protecting your devices Ground rules We" is the property of its rightful owner.
Permission is granted to download and print the materials on this website for personal, non-commercial use only,
and to display it on your personal computer provided you do not modify the materials and that you retain all
copyright notices contained in the materials. By downloading content from our website, you accept the terms of
this agreement.
Transcript:Lesson 2: Protecting your devices Ground rules We:
Lesson 2: Protecting your devices Ground rules We will listen when others are speaking. We can pass if we need to. We will respect other points of view. We will be open and honest but not discuss our own lives or others’ personal lives. Learning objective To learn how to protect personal information and devices We will be able to: describe what personal information is and how to keep it secure identify when it is and is not appropriate to share personal information explain why it is important to update the software and apps on devices identify why and how devices should be backed up Cyber security mapping Security Strong passwords Name Date of birth Address Antivirus software Personal information Email Device updates Hacker Virus App updates Three random words Back-up 2 SV Identity theft Data Email Strong passwords Protect your email account with a strong password, so that no one else can access it. Online activity Online shopping Online gaming Video calls with friends and family Watching TV Laptops Tablets Phones Smart TVs Smart gadgets (e.g. speakers, doorbells) Gaming consoles Computers What reasons might people have to go online? What devices might people use? What is ‘Personal Information’? name date of birth address sex/gender telephone number email address password I wonder what the different types of personal information are? Personal information is the information about a person that identifies who they are. When might someone be asked to provide personal information? Setting up a bank account Creating a gaming account Creating a social media account Signing up for an email account Signing up for a music service Signing up for video service (NowTV, Netflix, Disney) Why do we need to be careful with this information? If someone gets hold of a person’s personal information, they can pretend to be that person. They can then set up accounts in their name and they can even spend that person’s money. This is known as identity theft. Sometimes the person doesn’t find out that their identity has been stolen until years later. Keeping Personal Information secure Think about what is being shared and who with. Do they need that information? What are they going to use it for? Does it seem genuine? Protect your accounts using a strong password. Strongly protect email accounts. Install the latest updates on devices. Protect accounts using 2-Step Verification. How can someone keep their online accounts secure?