Cyber Security For Kids 2.1
Cyber Security For Kids 2.1
SECURITY
FOR KIDS 2
JOAS ANTONIO
ABOUT PDF
• This document was made for parents, teachers, teenagers and children with basic
computer skills or who want to learn more about cybersecurity
• Intended for children from 10 years of age
https://www.linkedin.com/in/joas-antonio-dos-santos
W H AT I S
CYBERSECURIT
Y?
• Cybersecurity is the act of
protecting the internet and its
technologies from unwanted
intruders. Quite simply, those who
work with cybersecurity have a
responsibility to prevent evil
hackers from committing some kind
of improper act against a company.
https://www.linkedin.com/in/joas-antonio-dos-santos
Availability Integrity Confidentiality
Ensuring that no information is Prevent unauthorized access and
Ensuring that the website or changed by unauthorized persons. ensure your privacy.
application must always be active Example: Ensuring that your friend Example: Prevent your colleague
for you to use. does not change their nickname or
from knowing your account
Example: Ensuring a game server password for their account in an
online game information in an online game
is always up and running
TRIAD OF
H A C K E R V S C H E AT E R
You must have already come across these two words - Hacker and Cheater, but what's the difference?
MALICIOUS CHEATER
HACKER
The Hacker is a person with The Cheater or the famous
great computer skills, knowing cheater, is the one who takes
in depth how technology works advantage of gaps in games to
and ways to improve, modify win a video game match or
and create something new. In even get the best items.
that case he uses his abilities for
evil. Being through programs
known as cheats, or taking
There are those malicious advantage of game bugs. We
hackers like the character shown can compare it to Marvel's
to the side, villain from the Loki, who uses his powers to
Cyberchase series, who use overcome himself in various
their skills to break into challenges.
computers and steal passwords
https://www.linkedin.com/in/joas-antonio-dos-santos
for example.
NETWORK
COMPUTER
SECURITY
• The goal is to protect a computer
network, which are your devices like
computers and cell phones that are
connected and exchanging
information with each other. Ensuring
that no person with bad intentions
does not hack your device.
https://www.linkedin.com/in/joas-antonio-dos-santos
PROTECT YOUR
COMPUTER
1. Use antivirus software: Think of antivirus as a vaccine, it 2. Put a strong password: Passwords are the secret that will
ensures that your computer is not infected by any virus that restrict access to unauthorized people;
destroys your computer or cell phone;
3. Backup or copy of information: It is very important to 4. Safe internet browsing: It is an important point of
ensure that you do not end up losing any kind of security, because when you search the internet you are
information from your computer. Think of backup as exposed to various threats, so always search on trusted sites
copying keys, so you always have a spare key in case you and don't click on anything you see around, consult
lose one; someone before that.
https://www.linkedin.com/in/joas-antonio-dos-santos
COMPUTER
VÍRUS
• Computer viruses are like diseases that affect us, without
proper care, we can get sick and contract a virus that can
be weak or strong.
https://www.linkedin.com/in/joas-antonio-dos-santos
COMPUTER
VÍRUS - DEFEND
1. Use antivirus;
https://www.linkedin.com/in/joas-antonio-dos-santos
SAFE BROWSING
SECURITY
• Be careful when accessing websites or • Do not click on advertisements that appear on the websites
downloading files on the internet, you could end you are browsing, it may end up being a bait to steal your
up being hacked; information or invade your device.
https://www.linkedin.com/in/joas-antonio-dos-santos
SOCIAL NETWORK SECURITY
• Avoid talking to strangers on social media;
• Avoid posting any kind of photo on your social media, as people with
bad intentions can use it for evil;
• Avoid accessing online chats without knowing the people who are
participating, as you can avoid numerous risks;
• Do not click on links or download files from unknown people, you
can use a site called *Virus Total* to help you analyze the origin of
this file
• Put strong passwords on your account and enable the second access
factor for extra protection
https://www.linkedin.com/in/joas-antonio-dos-santos
ONLINE SHOPPING
S E C U R I T YBeware of fraudulent emails
Shop on trusted sites, that arrive in your inbox;
remember that sometimes the
cheap ends up costing more Always make a purchase
using the payment system
Do not save your credit card
offered by the website you
on any shopping site
are buying from, any
problem with the payment,
Check the website reputation communicate directly to the
of the store you are shopping website
for
Use secure wifi networks to
shop Monitor your credit
Create strong passwords on any card statement
shopping site
Do not send credit
card information by
email
PROTECT YOUR NETWORK
COMPUTER
Use a virtual private network
Disable automatic connection (VPN) when accessing the
to unknown or unexpected Internet on public or
Wi-Fi networks. unknown networks.
https://www.linkedin.com/in/joas-antonio-dos-santos
H O W T O AV O I D C Y B E R B U L L Y I N G
https://www.linkedin.com/in/joas-antonio-dos-santos
SECURITY DEFINITIONS
• Authentication: The process of verifying a protects a network by controlling incoming that guide users' actions regarding security.
user's identity before allowing access to and outgoing traffic.
systems or network resources.
• Virtual Private Network (VPN): A secure
• Malware: Any malicious software designed connection that allows a user to connect to
• Backup: A backup copy of important data to cause system damage or steal a network from a remote location.
that can be used to restore data in the event confidential information.
of a system failure.
• Strong Password: A complex password that
• Phishing: A social engineering technique is difficult to guess or hack.
• Encryption: The process of transforming used to steal sensitive information, such as • Security vulnerability: A flaw or weakness
data into an encrypted format to protect it passwords, through fraudulent emails or in a system or application that could be
from unauthorized access. fake websites. exploited to allow unauthorized access or
damage the system.
• Firewall: A software or hardware that • Security policy: A set of rules and practices
SECURITY DEFINITIONS #2
• Spam: Unsolicited emails that often contain • Social engineering: A technique used to trick users
advertising or phishing. into providing confidential information. • Privacy: The user's right to keep personal and
confidential information private and secure.
• Security Update: A software patch designed to fix a • Patch Management: A process for applying software
security vulnerability or other issue. updates to vulnerable systems to fix known • Ransomware: A type of malware that encrypts user
vulnerabilities. data and demands payment in exchange for a
• Security Token: A physical device or application that decryption key.
generates a temporary passcode for two-factor • Admin Password: A password used to access system
authentication. or device administration functions. • Physical security: The protection against
unauthorized access to physical facilities that contain
• Digital certificate: A digital credential that confirms • Security monitoring: A security practice that involves confidential information.
the user's identity and is used for data encryption. analyzing logs and tracking suspicious activity on the
network. • Network security: The protection of a network from
• Secure DNS: A technology that protects against external and internal threats, including malware,
spoofed DNS attacks, redirects, and other threats. • Guest network: A separate network that allows guests denial of service attacks, and other threats.
to access the Internet without accessing the main
network.
BOOKS
R E C O M E N D AT I O N S
https://www.linkedin.com/in/joas-antonio-dos-santos