Being a Digital Detective: Finding & Fixing Computer Problems
Computers hold important stuff: pictures, messages, homework, bank information. Bad people want to steal this stuff or break things.
You're going to be like a security guard for computers!
A password is like the key to your treehouse. A bad password is like leaving the key under the doormat. A good password is complex and secret.
12345 โ too easypassword โ everyone tries this firstdoggo โ someone who knows your dog can guess itfluffy2020Fl!ffy#Moon$2020Type a password below and watch the strength meter!
Sometimes hackers don't try to break locks. They just trick you into giving them the key! This is called social engineering.
Like fishing, but for passwords and information!
Making up a fake story to trick you!
"Hi! I'm from your internet company. I need your password to check your speed."
NOPE! Real companies never ask for passwords by phone!
Can you figure out which emails are phishing? Click your answer!
Hi there! We're giving away free game codes! Click the link to claim yours now: clickme.notreal.com -TotallyRealGames
Hello Sarah, Your Google account had unusual login activity. Please verify your information here: accounts.google.com Click "Sign In" and enter your password. -Google Security Team
A vulnerability is like a crack in a wall or a broken window. Hackers look for these problems. Good guys find them first and fix them!
Computers left unlocked in the school library. Anyone can use that computer!
A password is "qwerty" or someone's birthday. Easy to guess!
Passwords written on sticky notes stuck to monitors. Anyone walking by can see!
No updates installed. Hackers know old tricks that still work!
Important files exist in only ONE place. If something breaks, all data is gone!
A website asks for your birthday, address, and school โ and you tell it all!
Walk around your house and look for security problems! Here are some examples:
If you find a problem, you don't exploit it (use it to cause harm). You report it to someone who can fix it. This is called responsible disclosure.
Click each item as you complete it!
Designs systems to be safe
Professional security tester
Watches for attacks
Discovers new protections
Protects people's data