
Created & published on StoryJumper™ ©2025 StoryJumper, Inc.
All rights reserved. Sources: storyjumper.com/attribution
Preview audio:
storyj.mp/a96erem4iqc
Chapter 1 - Safety Tips
2
- - You should create strong and unique passwords to keep your accounts safe
- - Protect your personal and financial information
- - If you reuse the same password, hackers can easily login to all of your accounts if it happens to leak
- - Try to utilize multi-factor authentication if your accounts offer it, to make sure no one other than you can login to your account
1- Create complex passwords

3
- - Do not give out personal information to strangers/people you don't recognize on the internet
- - Don't post about everything about you on the internet
- - Be cautious about what you do share
- - Don't give people clues about what could be used for them to guess your password
- - Make sure the pictures you choose to post don't disclose your location/address
2- Don't overshare

4
- - Always make sure that the website address starts with "https", instead of just "http"
- - Always check if there is a padlock symbol in the URL field
- - If everything above is present, it lets you know that the website is secure and uses encryption to scramble your data
- - Lookout for websites with misspellings/bad grammar
3- Make sure your websites are safe

5
- - Make your accounts private so that you can choose who can see your information/photos
- - This is so that hackers and strangers can't see what you post
- - Reduces the chances of your account being hacked and having strangers know your personal information
- - Limits your audience to only the people you trust
4- Keep privacy settings on


6
- - Make sure you don't download random apps or programs
- - Dangerous downloads would be able to steal your information and/or carry malware to your device
- - Read the reviews of games and other apps to make sure you're not downloading something that a lot of people had issues with (check high star ratings and positive comments)
5- be careful what you download

7
Chapter 2 - Cybersecutiry and Crimes
8
What is cybersecurity?
- - Cybersecurity is the protection of internet-connected systems from theft or damage
- - Protects hardware, software, and electronic data
- - Information security is an element to cybersecurity, designed to maintain the confidentiality and availability of data
- - Some other elements of cybersecurity are network security, application security, disaster recovery/business continuity planning, and operational security

9
Types of cybersecurity threats
- - Ransonware: a type of malware in which the attacker locks the victim's computer system files (typically through encryption) and demands a payment to decrypt and unlock them
- - Malware: a file or program used to harm a computer user
- - Social Engineering: the physchological manipulation of people into giving them confidential information
- - Phishing: a form of fraud where one pretends to be a trusted company and sends out fake emails to have the victim reveal personal information

10
Examples of the use of cybersecurity
- - John downloads a program that detects viruses to keep his computer and information safe
- - Bryan chose to not open the link that an unknown email sent him, informing him about his of a free trip to Hawaii
- - Tianna didn't download an app that seemed fishy and had bad reviews and comments about "computer started lagging"
- - Anna did not believe an unknown number calling about her lottery win, and she hung up without giving out information

11
12
13
14
Benefits:
- Full access to our public library
- Save favorite books
- Interact with authors
READ

Created & published on StoryJumper™ ©2025 StoryJumper, Inc.
All rights reserved. Sources: storyjumper.com/attribution
Preview audio:
storyj.mp/a96erem4iqc
Chapter 1 - Safety Tips
2
- - You should create strong and unique passwords to keep your accounts safe
- - Protect your personal and financial information
- - If you reuse the same password, hackers can easily login to all of your accounts if it happens to leak
- - Try to utilize multi-factor authentication if your accounts offer it, to make sure no one other than you can login to your account
1- Create complex passwords

3
- - Do not give out personal information to strangers/people you don't recognize on the internet
- - Don't post about everything about you on the internet
- - Be cautious about what you do share
- - Don't give people clues about what could be used for them to guess your password
- - Make sure the pictures you choose to post don't disclose your location/address
2- Don't overshare

4
- < BEGINNING
- END >
-
DOWNLOAD
-
LIKE
-
COMMENT()
-
SHARE
-
SAVE
BUY THIS BOOK (from $4.39+)
-
BUY THIS BOOK
(from $4.39+) -
BUY THIS BOOK
(from $4.39+) - DOWNLOAD
- LIKE
- COMMENT ()
- SHARE
- SAVE
- Report
Liked By
X
Encourage this author
-
BUY
-
LIKE
-
COMMENT()
-
SHARE
Problem with this book
X
- Excessive Violence
- Harassment
- Offensive Pictures
- Spelling & Grammar Errors
- Unfinished
- Other Problem
Which pages have problems?
Please describe the problem:
left text
right text
"Ethics & Cybersecurity"
Chapter 1 provides safety tips for online activities, including creating strong passwords, being cautious about sharing personal information, ensuring website security, keeping accounts private, and avoiding dangerous downloads. Chapter 2 introduces cyber
(23 pages)
Privacy level:
PUBLIC
4 reads
Report
COMMENTS
Click 'X' to report any negative comments. Thanks!