A group of square icons AI-generated content may be incorrect..
Topic cover. Artificial intelligence (AI) Cyber security and Digital Literacy for daily life. Digital Literacy Digital Citizen Digital Footprint Learning Management System-LMS.
Abstract picture of the brain made up of patterns.
AI use case. [image] A robot using a laptop sitting on a blue chair.
Cyber security. Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. #CISCO.
Digital Literacy. Digital literacy means having the skills to effectively use technology, and the knowledge and skills to do so safely and responsibly. # Learning.com.
Digital Citizen. Safe on Cyber Space Maintain Digital footprint.
How AI collect our data. Direct data input Web tracking Social media monitoring Location data Sensor data from IoT devices Biometric data.
[image] A white table with black text AI generated content may be incorrect.
Green Lock In A 3D Electronic System. How to be safe from Cyber Attack.
Protect data?. On devices On the internet Using social media.
On devices. Illuminated server room panel. Data Backups Using anti-virus and anti-malware software Disposing of old equipment Software Update Paying attention to passwords Paying attention to app sharing.
Padlock on computer motherboard. On the internet.
[image]. Using social media. Avoiding overshare Updating our privacy settings Blocking suspicious accounts Understand your friends.
The biggest internet dangers. Identity theft Data breaches Malware and viruses Phishing and scam emails Fake websites Online scams Romance scams Inappropriate content Cyberbullying Faulty privacy settings.
[image]. TikTok/Facebook/YouTube-Social Media. Use Use privacy settings Enable Enable two-step verification Don't share Don't share sensitive information Use Use good digital hygiene Review Review permissions Use Use YouTube Kids.
Continue... Don't reuse passwords Be careful about what you share online Be mindful of the permissions you grant to apps Consider using a VPN to protect your privacy Reading the privacy policies of the apps you use Understanding the platform's policies Using the safety features that are available Being aware of the risks of sharing sensitive information Limiting the permissions you grant to apps.
How would you know your system is hacked?. So, You might have been hacked if: friends and family are getting emails or messages you didn’t send your sent message folder has messages you didn’t send, or it has been emptied your social media accounts have posts you didn’t make you can’t log into your email or social media account.
Most common security mistakes. Poor password management Not locking the computer while unattended Opening email attachments from unknown addressees Not running anti-virus programs Sharing information (and machines) Not reporting security violations Unattended Paper Documents Unprotected Electronic Data (while at rest and in motion).E.g: Emails, USB’s, CD’s, etc.. Improper Information Handling Passing of information over Phone..
10+ Best Open Source Learning Management Systems | Moodle.
A screenshot of a computer AI-generated content may be incorrect..
[image] Thank you so much myRepublica The New York Times Partner Latest news of Nepal in English Latest News Articles Republica.