E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
Keeping our Children Safe Online
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
Worle Community School E-Safety for Parents and Carers Penketh Community Primary School September 2015.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
INTERNET: The Good, The Bad and The Ugly
Helping your family to stay in control Living with technology.
Valley Let’s create a better internet together.
Computer Skills and Applications Computer Security.
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Any criminal action perpetrated primarily through the use of a computer.
E- Safety Victoria Community School 9 th July 2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
E-Safety for parents and carers Highfield Community Primary School.
ELWORTH & E-SAFETY EXTRACTS FROM E-SAFETY PARENTS PRESENTATION – WEDNESDAY 4 TH NOVEMBER.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
DIGITAL SAFETY City of Edinburgh Council Digital Learning Team.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
E-Safety Presentation Chollerton C. of E. Aided First School How to reduce risks for your child whilst using the internet. Chollerton C. of E. Aided First.
Safety.
How to minimise the risks for your children online
Managing Windows Security
An Introduction to Phishing and Viruses
3.6 Fundamentals of cyber security
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Online Safety Evening 2019.
Presentation transcript:

E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY

PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!

SHARING EXPERTISE – WE CAN’T DO EVERYTHING OURSELVES Gap between children and adults is widening – we need to upskill ourselves. We need to work together – share expertise Name: Class No: I’m able to help with Installing antivirus Applying Windows Updates Upgrading to Windows 10 Applying Parental controls Installing a Firewall Applying Restrictions e.g iPads Social media restrictions e.g Facebook, Instagram & Twitter

RESTRICTIONS - KEEP IT SIMPLE The No Technology Rule! Upstairs Mealtimes Specific times

PASSWORD- FOUR WORDS Create one with your children so you have access to their devices. Passwords with Parents: Sharing = Access

INTERNET HISTORY Do you know how to view your ‘internet history’ on multiple devices? Internet Explorer iPad- Safari History Google Chrome Mozilla Firefox

ANTI-VIRUS & FIREWALLS ee-anti-virus-software#firewall

THE TECHIE BITS - HOW AWARE ARE YOU? TerminologyExplanation Malware Short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand alone computer or a networked pc. Worms Worms are malicious programs that make copies of themselves again and again on the local drive, network shares, etc. The only purpose of the worm is to reproduce itself again and again. Virus Virus is a program written to enter to your computer and damage/alter your files/data. A virus might corrupt or delete data on your computer. Viruses can also replicate themselves. Trojans A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft. Adware Generically adware is a software application in which advertising banners are displayed while any program is running. Adware can automatically get downloaded to your system while browsing any website and can be viewed through pop-up windows or through a bar that appears on a computer screen automatically. Adwares are used by companies for marketing purpose. Spyware Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user. Spam Spamming is a method of flooding the Internet with copies of the same message. Most spams are commercial advertisements which are sent as an unwanted to users. Tracking cookies A cookie is a plain text file that is stored on your computer in a cookies folder and it stores data about your browsing session. Cookies are used by many websites to track visitor information A tracking cookie is a cookie which keeps tracks of all your browsing information and this is used by hackers and companies to know all your personal details like bank account details, your credit card information etc. which is dangerous. Misleading applications Misleading applications misguide you about the security status of your computer and shows you that your computer is infected by some malware and you have to download the tool to remove the threat. As you download the tool it shows some threats in your computer and to remove it you have to buy the product for which it asks some personal information like credit card information etc. which is dangerous.

AGE LIMITS – IT’S NOT ABOUT KEEPING THEM QUIET!

CHILD FRIENDLY SEARCH ENGINES

CHILD-FRIENDLY APPS

INCREASING AWARENESS

ANYONE CAN BECOME A TECHIE! /parental-controls/interactive- guide/

PARENTS & CHILDREN WORKING TOGETHER

LET THEM TEACH YOU! The people who know best about what your children are up to online, are your children! Get them to tell you about the sites they’re using. Ask them questions such as: Why do they like the site? What can they do on it? What’s so fun about it? Who uses it at school? Who you can talk to? Who are their friends on it? This is a good way to develop a trusting relationship with your child about what they are up to online.

REACH AN AGREEMENT A good way to set boundaries with your child about what they can and can’t do online is to set an agreement with them. Here are some examples of the areas you might want to discuss: Limits on the amount of time your child spends online, or playing computer games. Having regular screen breaks – at least five minutes every minutes. Not sharing any pictures they wouldn’t be happy to share with you. Not giving out personal details, such as mobile phone number and address without parents permission/knowledge. Coming to you if they are concerned. Or, if not, knowing where they can go for independent help and support. Why not introduce an agreement after watching one of the Thinkuknow films?

GOING THAT EXTRA MILE

TOOLS TO PROTECT YOUR CHILDREN – PARENTAL CONTROL Every parental control package is different, but most provide services such as: Filtering – content to restrict access to particular sites Time limits – restrict the amount of time your child can be online, or set periods of time where your child can access certain sites. Monitoring – where you are informed of certain sites that your child is attempting to gain access to. Reporting – where you are provided with information about what sites your child has used.

ROUTER SETTINGS & SHIELD

KNOW YOUR PIES!  Practical principles Talk with, NOT at your children. Agree family guidelines and rules. Discuss regularly online safety  InfrastructureVirus and firewall software up to- date, Browser ‘safe search’ enabled.  Education Learn together about new technologies and enjoy! Reflect together about new technologies, the benefits, dangers and potential.  Systems Keep technology in family rooms Monitor time spent on the internet View the ‘History’ or purchase filtering software. Have proportionate responses to problems.

Your child will not tell you about a problem if they feel their access to technology will be restricted.

STAYING INFORMED – SOCIAL MEDIA

USEFUL ONLINE RESOURCES ation-Starters/Go-to-the-movies/ guide