Topic 3: Operating Online Press F5 to view!

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
The Internet.
INTERNET SAFETY FOR STUDENTS
INTERNET SAFETY FOR STUDENTS
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Internet Safety Internet Safety LPM
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Topic 3: Operating Online GCSE ICT Revision.  For this topic, you need to be aware of how people can use the Internet safely.  You need to be able to.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Internet Safety.
Safety.
Gosbecks E-Safety Guide
Digital Security Identity theft Copyright Laws Plagiarism, and More.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Creating your online identity
Misuses of ICT Malpractice and crime © Folens 2008.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Unit 4 IT Security.
Personal spaces.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
Topic: Operating Online
GCSE ICT Revision Topic 2: Connectivity.
Topic 5: Online Communities Press F5 to view!
Protecting your personal information and privacy
Topic 6: Issues Press F5 to view!
Importance of Privacy Internet Safety
STOP. THINK. CONNECT. Online Safety Quiz.
Information Security Awareness 101
Cyberspace Risks and Defenses
BCT 2.00 Analyze Technology Issues
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
ICT Communications Lesson 3: Internet Life and Privacy
Being Aware of What You Share
Welcome to the E Safety Workshop
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Topic 3: Operating Online Press F5 to view! GCSE ICT Revision Topic 3: Operating Online Press F5 to view!

Topic 3: Operating Online For this topic, you need to be aware of how people can use the Internet safely. You need to be able to describe safety concerns people may have when using the Internet. You should also be able to describe laws that exist to protect against fraud and online crime. Make sure you’re reading this PowerPoint carefully, your attention will be tested at the end !

The Internet The Internet is a huge network that links networks of computers all over the world. All of the computers use the same protocol (rule) – TCP/IP – so they an communicate and send data to each other. One of the most widely used services on the Internet is the World Wide Web (WWW) which uses the HTTP protocol to allow users to access the documents that we call web pages. To connect to the Internet, you need to sign up with an Internet Service Provider (ISP).

Choosing an ISP ISPs are companies that provide customers with a means to connect to the Internet; like BT, Sky and Virgin Media. People need to consider many things when they choose which ISP (company) to sign up to. Cost – how much is the monthly fee? Bandwidth – how fast is the connection? Download limits – some ISPS have download limits! Security – ISPs might provide services like parental controls or virus protection. Reliability – how reliable is the connection/service? Support – does the ISP offer good customer support?

Test yourself! Which ISP offers the best bandwidth? Fastnet Future Broadband Lavendar Mobile Flexweb Download Speed 30 mbps 8 mbps 6 mbps 20 mbps Monthly Usage 250 GB Unlimited 15 GB 100 GB Which ISP offers the best bandwidth? Future Broadband offers ‘unlimited’ monthly usage. State what this means. Fastnet. Higher bandwidth means a faster flow of data. This means there is no limit for the customer on downloads – they can download as much data as they wish.

Communicating on the Internet Internet Use You need to be able to discuss how the Internet is used to communicate: Instant Messaging ‘Talking’ in real time Help collaboration Email Sending messages Can be accessed on a range of devices Blogs Shared online diaries Post and share experiences Communicating on the Internet Online Albums Photos hosted on a website (Flickr) Share/back up photos Social Networking Sites that allow chat, messaging, file sharing, email. Voice over Internet Needs fast Internet connection. Example = Skype

Test yourself! Explain how having access to the Internet could enhance a family’s daily life. Help learning/school work – (always explain why/how). Shopping online – more convenient than going to the shops. Paying bills online. Compare prices online (explain the effects of this). Research travel arrangements, holidays etc. Socialising online, keeping in touch. EXAM TIP! When asked to explain, you cannot just list points; they need discussing/describing too.

I use the Internet to... You need to think of a range of people and consider how they use the internet. For example, a teenager uses the internet to: Keep in touch with friends through social networking sites. Download and stream movies and music. Keep up to date with news through RSS feeds. Access the school VLE (Virtual Learning Environment). Privacy is a concern for teenagers so it is important to protect personal information when communicating online by changing/updating privacy settings.

Security Measures Passwords are used on the Internet as a security measure to protect personal details. To enhance security, sometimes security questions are asked when signing up to a website. Security questions help further protect personal information and can be used if a user forgets their password. To prove you are human, a captcha is sometimes used when signing up to some websites.

Test yourself! Identify two features of a strong password. Not easily guessed Contains numbers, upper and lower case letters and punctuation List two things you must do to keep your password secure. Change it regularly Do not write it down EXAM TIP! In the exam, when a question asks you to list, describe or discuss two (or more) things, make sure your answers are different! So for the first question on this slide – you wouldn’t give one answer as “include lower case letters” and another as “include upper case letters” because these answers are too similar!

Personal Space You can design your own websites and blogs and have access to your own social networking profile pages. You need to be careful because what you publish online tells the world what you are like! So, follow the four basic rules: Don’t post anything online that you would not want made public. Minimise details that identify you or your whereabouts. Keep usernames, account numbers and passwords a secret. Only share your screen names with people you know. Don’t share things with people you do not know.

Stealing information Personal details are valuable and can be stolen online. Filling in online forms can be one way criminals steal personal data. People need to make sure they are using a secure website by looking for https:// in the address bar or looking for a padlock on display. Tricking people into filling in an online form is called overt data collection because people know this data is being collected. Hackers can install software called Trojans on your computer. These spy on users and record what keys are pressed on the keyboard or take pictures of the screen. Secretly installing software on a person’s computer is called covert data collection because the people don’t know that this information is being collected.

Identity Theft If fraudsters find out people’s personal details they can use them to make money by pretending to be that person. They could easily open bank accounts and apply for loans all in someone else’s name. Data is valuable. The government, for example, sell the personal details that people give when they tax their car through the DVLA to private companies. This is the reason sites like Facebook allow users to sign up for free – they are able to find out lots about what people like as well as their habits which can then be sold to companies or used to show users advertisements related directly to their interests.

Preventing Stolen Information People need to take precautions to make sure their personal information is not stolen. Controlling Cookies Cookies track which websites you have visited to make sites load quicker or remember details about your previous visit. People should set their preferences to only accept cookies from trusted websites. People should also delete cookies regularly. Trusted websites will have a privacy policy that makes people aware that cookies are being used.

Preventing Stolen Information People need to take precautions to make sure their personal information is not stolen. Phishing Phishing is a scam that tricks people into giving out personal details (overt data collection). This is commonly done through the use of bogus emails. People need to be cautious when giving out information – banks never ask for passwords or personal details, especially via email and people to need to consider this when they receive such correspondence. People also need to look out for the fact that a phishing email does not contain their name and will probably contain web addresses that are not that of the official company.

Preventing Stolen Information People need to take precautions to make sure their personal information is not stolen. Preventing Spyware Spyware is software that is installed on a person’s computer without them knowing. Spyware is usually installed when people download files online or when they open email attachments from fraudsters. To prevent spyware, people need to use a firewall. People should also install antispyware protection software. Care should be taken when downloading ‘free’ programs or music.

Laws Two pieces of legislation (laws) are designed to protect privacy when online. The Data Protection Act 1998: this law ensures companies that hold data are required to keep it secure, not keep it longer than needed, keep the data up to date and not use the data for any other purpose without our consent. The Computer Misuse Act 1990: this law makes it a criminal offence to: Log into another person’s computer without permission Steal someone’s documents or programs Destroy or corrupt another user’s files or create viruses Gain access to financial or administrative documents and using this information to commit further crime (like fraud)

Test yourself! Aisha likes to buy clothes online. The websites she uses hold her personal data. Describe the law that protects her data. The Data Protection Act protects Aisha’s personal data by ensuring that it is kept secure, accurate, up to date and private.

Copyright Copyright protects people’s original work from being used without their permission. Original work includes; Literature (writing) Music Art Sausages Images Software Drama Sound recordings Films

Why bother with Copyright? People spend a lot of time and money creating original work so they deserve to be paid for them. If professional artists cannot make any money from their work, then they will not be able to afford to create any more. Breaking copyright law (by downloading music illegally or sharing videos on the Internet) is called Copyright Infringement and is a crime. People can be prosecuted for copyright infringement and could go to prison or face a fine. Internet Service Providers may prevent use of the Internet for people breaking copyright laws.

Test yourself! Michael uses a search engine to choose an image to go on his blog. Explain Margaret’s legal responsibilities when using images. Michael should not use the image without permission of the copyright owner because he would be breaching copyright law. He should ask the owner’s permission to use this image to protect intellectual property rights.

Were you really reading? Just to check you were really reading and revising this topic content, did you notice... On slide 22: Michael turned into Margaret half way through the question being asked? On slide 20: sausages is listed as something protected by copyright (this is clearly not true, do not write this in the exam!) On slide 11: you were asked to follow four basic rules but given five in the list in total... I bet you were thinking I can’t count, right?