Describe four strategies that you could use to minimise the dangers of using social networking sites to make new friends. Know how to block and report.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Digital Disasters Laura M Cyberbulling Digital Reputation Identity Theft Offensive or Illegal Content Sexting Unwanted Contact.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
e-safety and cyber bullying
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
INTERNET SAFETY FOR STUDENTS
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security Issues: Phishing, Pharming, and Spam
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
A Student’s Guide to Proper and Safe Web Behavior
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Is when… someone hurts, threatens or frightens you regularly by sending messages or images using the Internet, mobile phones or other forms of digital.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
By: Jithin and Rey.  Cyber bullying is a form of bullying, which is carried out through an internet service such as , chat room, discussion group,
Cyber Bullying Kristina 5VN. What is Cyber Bullying? Cyber Bullying is when a form of bullying, which is carried out through an internet service such.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Internet safety By Suman Nazir
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Security and Ethics Safeguards and Codes of Conduct.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Created By Cece Chukwumah. ONLINE SAFETY viewing unsuitable content e.g. hate material, adult content, sites that endorse unhealthy behavior giving out.
8.1 Physical Safety 8.2 e-Safety 8.3 Security of Data.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Safety.
Gosbecks E-Safety Guide
Year 8 Assembly Internet Safety.
3.2 Introduction to .
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Digital Citizenship Middle School
University of west Alabama Ed 505 Tasha Vaughn
Information Security 101 Richard Davis, Rob Laltrello.
Protecting your personal information and privacy
Topic 6: Issues Press F5 to view!
What you can do to support people to be safe online
3.2 Introduction to .
The Internet gives us access to many resources we couldn’t otherwise come in contact with. TRUE FALSE.
Module 7 Questions Prepared by Mr O Seguna next.
Rules To Help You Navigate the Internet Safely
Cyber bullying and text bullying
Personal Safety Online
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Internet Safety.
Presentation transcript:

Describe four strategies that you could use to minimise the dangers of using social networking sites to make new friends. Know how to block and report unwanted users, Never arrange to meet anyone alone Always tell an adult first when arranging to meet someone Always meet in a public place Avoid inappropriate disclosure of personal data/set privacy settings/Avoid giving email address or phone number when chatting Avoid inappropriate disclosure of your own name/Avoid giving your full name Avoid giving your address Avoid giving your school name or displaying a picture in school uniform Do not display pictures taken at home/Do not display pictures taken of the school with the name attached/Do not send pictures/videos of yourself to strangers Ensure that the person you are befriending has very secure privacy settings Check profiles before contacting people Verify person’s contact details with other trusted people/friends

Explain why encryption is needed when transmitting data. To cause data to be scrambled/encoded Protects sensitive data… …from being understood if it falls in to the wrong hands Only user/computer with key can understand data There are many safety issues associated with the use of computers. Describe three of these issues.   Electrocution by touching loose/bare wires/spilling liquids on electrical contacts Tripping and falling over trailing wires or cables Physical injury to feet/legs, etc. caused by heavy equipment falling Fire caused by too many plugs in multisocket and thereby overheating/overheating of equipment

There are many health issues associated with the use of computers. Name three of these health issues and for each one describe, in detail, a different cause. Headaches/eyestrain From staring at screen continuously RSI in fingers From continual typing/repetitive clicking of mouse RSI in wrists From repetitive clicking of mouse/continual typing Backache From sitting in same position all day

The action of sending emails to fraudulently obtain another person’s bank details is called Phishing The action of illegally installing malicious code which redirects a person to a fraudulent website with the purpose of obtaining that person’s bank details is called Pharming Unsolicited bulk emails are called Spam The action of sending text messages to fraudulently obtain another person’s bank details is called Smishing An internet protocol for delivering private messages using cryptography is called https/SSL/TLS An attachment to an electronic message used to verify the identity of the sender is called a digital certificate

Describe four methods you could use to minimise the likelihood of receiving spam emails. Use a spam filter/anti-spam software Do not reply to spam/suspicious messages Do not click on any links/attachments in a spam/suspicious message Use a disposable email address Use a complex email user name Do not give out your email address online/do not register using email on untrusted websites/opt out of marketing Read messages as text Do not use your email address as an online username Changing to an email provider who filter spam