Hello. Welcome to cyber and data security and user awareness. This is Episode one Part one. Introduction to trans and computer usage. Thank you so much for joining me today for this informative session.
I am your instructor, Tanya Mead. I have a PhD, MBA and Masters and educational psychology. I have spent a number of years and database administration extraction, transformation and loading data, migration analytics and cyber security. I have a number of certifications. A computer hacking, forensic investigator,
certified fraud examiner
and certified Blockchain professional. I've won a number of awards, including the corporate vision most influential businesswoman and cybersecurity had brought in education and the Cafritz Award, which is similar to the federal government's Sami Awards. Thank you for joining me.
You're probably asking yourself why take this course? The Internet has taken the world by storm, and it's becoming a part of almost every aspect of our lives. There. Four individuals, families, businesses and our Children need to be protected from the various internal and external debts.
Therefore, cyber security must be made a part of all security plans
for home, work, school and government.
Before we begin, let's take a pre assessment question. What are trends related to computer use.
Adults, teens, Tweens and Children increasingly used computers, increasing the vulnerabilities.
Cell phone use is Hester past fixed phone lines as preferred communication devices.
Video gaming for entertainment is enjoyed by adults and kids alike.
The learning objectives for episode one part one introduced trends that have increased the threats to cyber security. Those are demographics, mobile phones and video gaming.
Who is the target audience Information. Techies seeking to raise awareness for the need for secure devices. Small business owners, educators, nonprofit professionals, government workers looking for chips to secure their devices on a low budget
and parents training for safer device use
and data security.
There are just two prerequisites for this course.
A sincere designer to learn and basic computer skills
a supplementary materials required.
Actually, there are no materials required. However, it would be great to visit the resource page to obtain additional background. When noted
the course structure, we will have an introduction,
a pre course evaluation.
We will go over the course content. There will be pop quizzes to assess understanding.
We will have exercises toe, apply knowledge and a post course evaluation.
The first trend will talk about is the increased use of devices said. Just as top mobile tablets and game consoles,
teens spin roughly nine hours per day using online media such as online video or music.
This is clues television, radio, DVD and blue ray usage.
Children spend an average
of six hours per day, while adults spend an average of three hours on media technology for entertainment.
Because of this increased usage spent on devices, it is a considerable concern to parents. For instance, 72% of parents worry that their child will rebuild inappropriate information to strangers online,
while at the same time,
corporate board members
there is a threat to privacy and safety. Because corporate board members have a fiduciary responsibility to keep corporate information confidential.
With the Internet, confidential information is more easily exposed on a broader scale and in real time.
The second trend is that mobile device use is on the rise. Take a look at the chart on the left. Almost 15 years ago, approximately 100% of U. S households were equipped with landlines. By 2016 the figure dropped by almost half.
What repast landlines Look at the chart on the right
you guessed it. Smart cell phones from 2000 and 11 to 2016. In five short years, the percentage of Americans with smart bones doubled.
The third trend that we will review today is that adults and kids alike find video games entertaining.
According to the Entertainment Software Association, the average gamer is 35 years old and 65% of U. S households are home to a least one person who plays three. Or
as we conclude our recession today, let's
ask a post assessment question. What is the one
emerging trend impacting cybersecurity?
Increased use of devices changes devices for entertainment more than adults and Tweens.
Video games are enjoyed by adults and kids or all of the above.
In today's brief lecture, we have learned trends that have increased cybersecurity threats, the demographics, mobile phones and video gaming.
I look forward to working with you for our next video. We will raise the awareness of cyber threats, data, breaches, exposed records and become acquainted with case studies