Topic 4: E-safety, Health and Safety

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Important Facts you should know about the Net
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
Viruses & Destructive Programs
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Topic 5: Basic Security.
321 Phishing Vishing SMiShing Social Engineering Techniques.
Internet safety By Suman Nazir
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
KS3 COMPUTING E-Safety Lesson 1 Malware KS3 Computing E-Safety.
Being Connected and Secure: Lessons for Everyday Computer Use
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Cybersecurity.
Network Security Fundamentals
3.6 Fundamentals of cyber security
Big Picture Consider this How many online threats might you be faced with a day?
Lesson 3 Safe Computing.
National Cyber Security Month
Protecting our institutional and your personal data
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Cybersecurity Awareness
Cybersecurity.
Malware, Phishing and Network Policies
Staying safe on the internet
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Ch9 E-commerce Security
What devices use the internet?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Unit 1.6 Systems security Lesson 1
Privacy, Security, and Ethics
Presentation transcript:

Topic 4: E-safety, Health and Safety

Learning Objectives To explain what eSafety is, and how to be safe online. To explain what eSafety is, and how to be safe online.

To explain what eSafety is, and how to be safe online. What is e-Safety? The steps you need to take whilst being online / using technology in order to avoid any problems. To explain what eSafety is, and how to be safe online.

What in Person Data? Personal data can include your Health, Religion, Criminal Record, Political, Financial details and are protected by the eight principles of the Act. To avoid these ‘leaking’ be careful what you post / send online.

To explain what eSafety is, and how to be safe online. Phishing My username My password To explain what eSafety is, and how to be safe online.

Phishing The fraudulent practice of sending emails pretending to be from reputable companies in order to trick people to reveal personal information, such as passwords and credit card numbers.

Smishing It is the same as phishing but done on SMS (texting) To explain what eSafety is, and how to be safe online.

To explain what eSafety is, and how to be safe online. Pharming My username My password To explain what eSafety is, and how to be safe online.

To explain what eSafety is, and how to be safe online. Pharming My username My password To explain what eSafety is, and how to be safe online.

Vishing The fraudulent practice of making phone calls or leaving voice messages pretending to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.

Trojan Horse In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.

Worms A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

Adware Software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.

Ransomware A type of malicious software designed to block access to a computer system until a sum of money is paid.

Malicious Bots A computer program that intends on carrying out automated malicious acts on computers.

Credit Card Fraud The real hustle https://www. youtube. com/watch