1. Introduction
Slide: “Cybersecurity: Protecting Against Digital Threats”
“Hello everyone, and welcome to our presentation: Cybersecurity – Protecting Against Digital Threats.
We – Sarah, Tom and Baptiste – want to guide you through one of the most important topics of our digital age.
Many people think cyberattacks only happen to big companies or to highly technical individuals.
But the truth is: anyone with a phone, laptop, email address, or social media account can become a target.
During the next hour, we will explore:
- What the most common cyber threats are
- How cybercriminals trick people
- How to protect yourself with simple and practical steps
No technical background is required — everything will be explained clearly and from the ground up.”
2. Phishing – The Invisible Threat
Slide: “Phishing: The Invisible Threat”
“Let’s start with one of the most widespread cyberattacks: phishing.
Phishing happens when criminals pretend to be trustworthy organisations to steal personal information.
Typical examples include:
- Emails pretending to be from Amazon, your bank, or PayPal
- Text messages with suspicious links about packages or accounts
- Fake websites that look like the real login pages
- Urgent warnings designed to make you panic
The purpose is always the same: to steal your sensitive data.”
What Cybercriminals Want (based on your slide)
Cybercriminals may target:
- Personal information – addresses, dates of birth, national insurance numbers
- Financial data – bank details, card numbers, login passwords
- Business secrets – company data, strategies, customer records
- System access – login credentials to break into networks
“In short: anything valuable is worth stealing.”
3. Common Attack Methods
Slide: “Common Attack Methods”
“There are several ways cybercriminals launch attacks. Some of the most common include:
- Phishing emails
– They contain malicious links or attachments. - Fake websites
– These pages look identical to real platforms and steal your login data. - Social engineering
– Emotional or psychological manipulation to gain trust. - Malware
– Malicious software that installs silently and collects information. - Phone scams
– Fraudsters pretend to be tech support or government officials.
These attacks are effective because they exploit trust, fear, and curiosity.”
4. Social Engineering – The Art of Manipulation
Slide: “Social Engineering: The Art of Manipulation”
“Social engineering does not attack technology — it attacks people.
Instead of hacking computers, criminals try to hack your emotions.
Common tactics include:
- Artificial urgency
– ‘Your account will be closed in 24 hours.’ - False authority
– Pretending to be a boss, bank employee, or technician. - Emotional bait
– Offers or rewards that seem too good to be true. - Deceptive familiarity
– Using information from social media to appear trustworthy.
Remember:
People are the strongest defence — and also the easiest target.”
5. Password Security – Your First Line of Defence
Slide: “Password Security”
“Many cyberattacks succeed simply because passwords are weak or reused.
A strong password should have:
- At least 12 characters (ideally 16 or more)
- A mix of uppercase and lowercase letters
- Numbers and special symbols
- No real words or personal information
- A different password for each important account
Why?
Because hackers use automated tools that can test millions of combinations per second.”
Password Managers
“Password managers solve the problem by:
- Creating strong, random passwords
- Storing them securely
- Requiring you to remember only one master password
For most people, using a password manager is the simplest way to stay safe.”
6. Multi-Factor Authentication – Stronger Protection
Slide: “Multi-Factor Authentication (MFA)”
“Even a strong password can be stolen. That’s why we use multi-factor authentication (MFA).
MFA combines two or more types of verification:
- Something you know – a password
- Something you have – your phone or a security key
- Something you are – fingerprint or facial recognition
According to studies:
MFA blocks 99% of automated attacks.
This is why enabling MFA on email, banking, and social media accounts is one of the most important steps you can take.”
7. The Benefits of Good Security vs. the Risks of Neglect
Slide: “Advantages and Risks”
“When you follow good security practices, you gain many advantages:
✓ Your personal and financial data stay protected
✓ You dramatically reduce the risk of being hacked
✓ Your digital identity and reputation remain safe
✓ You comply with professional and security standards
✓ You feel more confident online
But if you ignore cybersecurity, the risks are serious:
✗ Identity theft
✗ Financial loss
✗ Compromised work accounts
✗ Exposure of sensitive data
✗ Reputational damage that can be hard to repair
A single careless action — such as clicking the wrong link — can have severe consequences.”
8. Ransomware – Digital Hostage Taking
Slide: “Ransomware and Encryption”
“Ransomware is one of the most dangerous cyber threats today.
Here is how it works:
- Malicious software infects your device
- It encrypts your files so they become unreadable
- A ransom message appears demanding money
- Even if you pay, there is no guarantee you’ll get your files back
How Ransomware Spreads
- Infected email attachments
- Compromised websites
- Software that hasn’t been updated
- Pirated or illegal downloads
How to Protect Yourself
- Regular backups, stored offline or on external drives
- System updates to fix vulnerabilities
- Reliable antivirus software
- Training and awareness, recognising suspicious behaviour
- Limited access privileges, so malware cannot spread easily
Ransomware affects individuals and businesses — prevention is essential.”
9. Final Recommendations – Take Action Today
Slide: “Take Action Today”
“To close, here are four simple actions you can take right after this presentation:
- Audit your passwords
– Replace weak or reused passwords. - Enable MFA everywhere
– Add a second layer of protection to your accounts. - Create backups
– Protect your important files from ransomware attacks. - Stay alert
– Be cautious with suspicious messages, links, and attachments.
Cybersecurity is not only a technical challenge — it’s a matter of daily behaviour.
By applying these basic principles, you significantly reduce your risk of becoming a victim.
Thank you for your attention!”
We used a kahoot : https://play.kahoot.it/v2/?quizId=c7d83af9-d7ac-4acc-8fa6-48d76ec0795e
POWERPOINT
OUR FELLING
We are really happy with this lesson it went well . We presented it for an hour and the students were attentive and participated, and i answered their questions.
GROUP : SARAH , BAPTISTE ,Tom
THE PROBLEM : The student was ashamed to speak but overwall they answered well so we didnt’t encounter any problems