Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Slideshow to teach students about

Data Privacy & Cybersecurity


What’s kind of
data about you
can be stored
virtually?
Type of
1) Your personal information
For example, your name, date of birth, phone number, address, occupation,

virtual data
maiden name etc.
2) Private Details

about you For example, your criminal background, medical record, drug use, marital
details, association memberships, friends' names, pets' names, parents'
names, siblings' names, and contact list.
3) Assigned Unique Identifiers
For example, your driver's license, social media accounts, utilities account,
SIN, passport number, voter registration records, performance evaluations
and reference interviews, health card number, vehicle registration number,
etc.
4) Self-selected Unique Identifiers
For example, email address, account names, gamer nick name, social media
identity, current location, location history, passwords, user names etc.
1) Personal information 2) Private details

3)Assigned Unique Identifiers 4)Self-selected Unique Identifiers


Type of 1) Financial Details
For example credit card number, debit card number, credit score, PIN, shopping

virtual data
and purchase history, donation history, current income, bank account, load
records, tax returns etc.

about you
2) Location Information
For example, home address, work address, school address, visited locations, GPS
data, city of birth, IP address, travel records, previous addresses, postal activity,
etc.
3) Biological Identifiers
For example, iris scan, fingerprint, face, video footage, DNA, analyzed
chromosome data, height, weight, gender, sex, eye colour, voice recordings etc..
4) Behavioural and Communication
For example, click history, visual response pattern, website history, IoT usage
data, smart device recordings, cookies, browser, operating system, web form
input, social media accounts, social media posts and history, etc.
5) Financial Details 6) Location information

7) Biological Identifiers 8) Behavioural and Communication


Then, what threats are our
data and privacy facing?
HACKERS!!!
Everyone must have heard of this term at least
once in their life, but not everyone could
understand it.
But what is  A hacker is an individual who uses computer,

a hacker? networking or other skills to overcome a


technical problem. The term hacker may refer
to anyone with technical skills, but it often
refers to a person who uses his or her abilities
to gain unauthorized access to systems or
Networks.
What can hackers do with stolen data?
The main reason, is just like other types of criminal, The main
target of a hacker is still money:
 Sometimes, hackers want to steal your data so that they can
hold it for ransom.
 Sometimes, hackers can sell your data to other criminals
 Sometimes, stolen personal information is fuel for identity
theft, such as using the victim’s credit card or taking loans in
their name.
 So on and so on, there is countless ways they can make
money on your data
Are hackers
all bad?
No! Not all
hackers are bad
There are 2 types of hacker:
 Black hat hacker(Criminal Hacker)
 White hat hacker(Ethical Hacker)
Black hat hacker White hat hacker
(Criminal Hacker) (Ethical Hacker)

• A talented individual with the • A hacker who is often hired to


understanding of technology break into and out of a
who wants to do damage or system before the bad guys
steal information to make do
money • A professional with the skills
• A criminal who has access to of a criminal hacker who acts
tools and like-minded teams for good and helps to protect
of others with the same focus information
on profiting through illegal • A security researcher who
acts helps educate people and
• Someone who wants to organizations about the
victimize and hurt individuals threats to information that
using information and special they don’t know about
tools

😂
How can we
protect our data
against the bad
hackers?
3 main ways hackers use are:
a. Social Engineering
Social engineering is the art of manipulating, influencing, or deceiving
you in order to gain control over your computer system. The hacker
might use the phone, email, snail mail or direct contact to gain illegal
access. Phishing, spear phishing, and CEO Fraud are all examples.
First, we b. Ransomware
have to Ransomware is malicious software that you download onto your
computer by clicking on infected pop-up advertisements, websites or
know how email attachments. Once the malware is on your computer, hackers
can take control and encrypt your files. When files are encrypted, it is
the hacker very much like the files are locked, and scammers will demand a
ransom payment to unencrypt and unlock the files.
attack us c. Password Cracking
Password cracking is the process of attempting to gain Unauthorized
access to restricted systems using common passwords or algorithms
that guess passwords. In other words, it's an art of obtaining the
correct password that gives access to a system protected by an
authentication method.
1) Social engineering 2) Ransomware 3) Password cracking
Secondly,
we have to
know
ways to
prevent
and avoid
these
scams
Preventions
01 02 03 04 05
Get yourself decent anti-virus Back-up important data on an Be picky about who or where Be very suspicious of emails or Only log in to accounts from
and firewall software – and external hard drive or USB you share your personal info messages asking for login or your own gadgets. If you do
turn it on! stick. If there’s something that with – your data’s only as account info. This is known as have to use a public or shared
* This is the best prevention you’d be gutted to lose, keep secure as they are. phishing and is one of the device, make sure you log out
you should apply. copies! * Don’t give any of your easiest ways for passwords to afterwards.
* Like your homework, account information for be nicked. * Apply this when you use
assignments, and online someone you don’t trust. * Be more cautious when computer in the library of your
contents checking your email school
Preventions
06
07 08 09 10
If there’s something you really, Create a strong and hard to Use two-step verification if it’s Protect your phone and Only visit secure sites: check
really don’t want anyone else predict password. Use an available for logins: if gadgets for the padlock and 'https' in
to know or get hold of, don’t unusual but memorable someone signs in from a new * Think carefully before you the address bar.
put it online! phrase and replace letters or unauthorised device, they’ll entrust your phone to anyone * Don’t worry, this has been
* Like your account with numbers or punctuation have to provide a code that’s done by TDSB for you. Any
information, and think twice marks (0 instead of o, or 3 for only sent to your phone or harmful or unsuitable website
before you post anything E). email address was blocked by TDSb
*Do the same for your TDSB * Do this for your private
account. account and if possible, your
school’ accounts

04

02
01 03 05
How Canada recognizes Data
Privacy Day and Cybersecurity
Awareness Month?
On January 28, Canada and many countries around the world
celebrate Data Privacy Day. Data Privacy Day highlights the impact
technology is having on our privacy rights and underlines the
importance of valuing and protecting personal information.
For the Office of the Privacy Commissioner of Canada, Data
Privacy Day is an opportunity to highlight key issues, the role of
our Office, and the resources we have developed for
individuals, businesses and federal institutions to foster
awareness of privacy rights and obligations

October marks Cyber Security Awareness Month (CSAM), an


internationally recognized campaign to inform the public of the
importance of cyber security. This campaign is focused on helping
all Canadians be more secure online, by being informed and
knowing the simple steps to take to protect themselves, their
families, their workplace and their devices.

You might also like