Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Internet Safety.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Safe Use of Social Media Cadets – Air Force’s Future.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Topic 5: Basic Security.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
PUBLIC COMPUTER SAFETY
Internet Safety.
Protecting Your Assets By Preventing Identity Theft
INTERNET SAFETY FOR EVERYONE
Gosbecks E-Safety Guide
How to stay safe using the internet & App’s
Digital Security Identity theft Copyright Laws Plagiarism, and More.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Creating your online identity
Together we can stop bullying happening…
How to stay safe using the internet and app’s?
Fraud Protection.
E-Safety.
Social Media Security: Understanding how to keep yourself safe.
Hacking Computer crime and cyber security.
Fraud protection.
Done by… Hanoof Al-Khaldi Information Assurance
Key words: Secure | Password | Character
E-Safety Briefing
Learn how to protect yourself against common attacks
How To Be Safe On The Internet
Unit 4 IT Security.
Protecting What’s Yours: Your Identity
How to use the internet safely and How to protect my personal data?
Information Security.
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
E-safety Staying safe online 2017/18.
Protecting your personal information and privacy
Online Safety.
Unit 4 IT Security.
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Internet Safety for Everyone
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
What you can do to support people to be safe online
Internet Safety for Everyone
E - safety How e-safe are you?.
CYBERSAFETY & Personal information
Internet Safety – Social Media
Internet Safety for Everyone
Internet Safety for Everyone
Lesson 2- Protecting Yourself Online
Internet Safety for Everyone
Internet Safety for Everyone
Safe, secure and empowered
What devices use the internet?
Presentation transcript:

Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and friends; Understand how social networking operates; Understand the different ways in which criminals target people on social networking sites; Know what level and type of information you should post online; Know how to use security settings on your accounts and profiles; 2

Outline of this module By the end of this module, you will be able to: Understand how communicating online is different to communicating face to face; Know simple strategies which can reduce the likelihood that you become a victim of social networking; and Know what to do if you think you have been a victim on a social networking site. 2

Important information A copy of this presentation and the accompanying training booklet are available for download at: 4

Meet Beryl and Alan

Getting started… What do you currently know about social networking? 6

What is social networking? It is all about connecting and communicating with people. It isn’t just confined to the internet, however the internet has increased the ease and popularity of communication. It operates through various websites where people can post profiles and initiate/receive contacts from other people.

Online communication Talking to a person over the internet is different to talking to a person face to face It is harder to establish trust (people can say anything without having to back it up). Visual cues (such as facial expressions) are missing. Not everything that appears on the internet is true! There is no filter to edit material. Anyone can post anything online.

An awareness of social networking Social networking sites are a great way to communicate with people, but there are a few things which you need to be aware of: Identity crime Fraudulent s Malware However, each of these can be overcome with a few simple steps.

Identity crime One of the biggest threats on social networking sites, is the need to post excessive amounts and levels of information. The internet isn’t as private as we might think, and our posts can be viewed by people other than our contacts. Putting high levels of information on the internet and inadequate security settings can increase the risk of identity crime. 10

Fraudulent s These types of s will appear in your inbox and can look genuine. They might come from a social networking site and ask you for personal information. They might ask you to reply to their or they might provide a link to provide your personal details. 11

Malware Short for “malicious software”, malware is designed to disrupt the normal running of your computer. Malware comes in many forms, each with a different purpose. Malware can be downloaded from an attachment or through visiting a compromised website. You might not know your computer is infected. 12

Revision questions

How well did you do?

How to protect yourself on social networking sites There are several strategies which can help you protect yourself when using social networking sites. By following these simple steps, you will greatly reduce the likelihood that you become a victim of a crime while communicating with people on social networking sites. 17

Protecting yourself while social networking 1)Limit what details you put on the internet Carefully consider the amount and type of information that you make available to others. 2)Knowing and using security settings Make sure that you have security setting activated on all your accounts and profiles. Don’t rely on the default setting as this may not be as secure as you think it is. 18

Protecting yourself while social networking 3)Use a strong password Try to use different passwords that contain at least 8 characters and a combination of letters, numbers and symbols. 4)Avoid clicking links in s Clicking on links in s can take you to an infected website and allow malware to download on your computer. 19

Protecting yourself while social networking 5)Never reply to an with personal details Fraudulent s will not always be obvious. Talk to someone if you are unsure of an . Don’t feel pressured to respond. 6)Never send money in response to an The situation may seem genuine and you may trust the person, but once you have sent the money there is no way to get it back. 20

Online dating sites These are legitimate ways to meet people. However, criminals can use these sites to gain money from unsuspecting victims. They seek to manipulate a person’s good will and their emotions and exploit the relationship. This can have a devastating effect on victims. Be extra cautious when using these sites.

If you think you are a fraud victim There are steps you can take if you think that you may have become a victim of fraud on a social networking site. Don’t panic or ignore it! 1) Contact the social networking site. Most sites have a way to report someone to investigate having them removed or blocked. 2) Use the delete key. Delete people from your contacts. 22

If you think you are a fraud victim 3)If you have sent money, there are a few things you can do: Contact your bank and see if the transaction can be cancelled. Contact the wire transfer service to see if the transaction can be cancelled. Contact the police to report your loss. You are unlikely to get the money back, but it is important for you to report it. 23

Reporting Fraud You can report fraudulent s to the Australian Communications and Media Authority via at: You can report cybercrime to the Australian Cybercrime Online Reporting Network (ACORN): 24

Conclusion Social networking sites are a great way of communicating and connecting with family, friends and contacts all over the world. By following the steps outlined in this presentation, you should be able to enjoy using these sites in a confident and safe manner. 25

Revision scenario 26

Revision scenario 27

Revision scenario 28

Revision scenario 29

Revision scenario 30

Questions?

Further information… For more information about other modules in this series: For more information about reporting cybercrime: For more information about online security issues: or For more information about computers and technology: 32