Understanding Browsers

Slides:



Advertisements
Similar presentations
E - safety How e-safe are you?.
Advertisements

Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Internet Safety Learning Disability Partnership Board 15 th October 2010 Veronica Hughes Bromley Adult Education College.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
Using internet and cell phones safely
INTERNET SAFETY FOR STUDENTS
How To Protect Your Privacy and Avoid Identity Theft Online.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
E-Safety Challenge College. Learning Objectives To summarise electronic games which allow access to the Internet and assess the Internet Safety aspects.
INTRODUCTION & QUESTIONS.
Let’s Get Savvy about Technology Mrs. George Dondero School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Internet Safety.
Gosbecks E-Safety Guide
Chapter 40 Internet Security.
How to stay safe using the internet & App’s
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Internet Safety How to stay safe online.
Safer Internet Day.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
E-Safety – Using ICT Safely and Responsibly
Internet Identity, Safety, & Security
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
The Internet is great because…
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Dangers of the internet
How many of these apps do you really know?
STOP. THINK. CONNECT. Online Safety Quiz.
Information Technology Services Education and Awareness Team
Online safety.
Staying safe on the internet
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
E - safety How e-safe are you?.
Internet Safety – Social Media
Information Technology Services Education and Awareness Team
What devices use the internet?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Understanding Browsers

Do it now You will find your do it now task in your workbook – look for the start button! Sunday, 02 December 2018

Learning Objective “Become safety savvy” You will find differentiated outcomes for this lesson on the front of your workbook. Sunday, 02 December 2018

New learning Become safety savvy

New learning Creating an algorithm for a strong password. The first two letters of the website The last two letters of your 1st pet How old you were when you learnt to ride a bike Become safety savvy

Talk Task How do you feel about the consequences of hacking someone’s Facebook account? What do these viruses do and how can you get rid of them? What tools have you seen online to help people know if they have set a strong password? Become safety savvy

Learning development What is blue jacking? Sunday, 02 December 2018

Learning development Sunday, 02 December 2018 Mobile phones that can connect to the internet are vulnerable to the same risks as computers. Viruses and malicious code can infect your phone and allow someone else to make calls using your account. Be wary of text messages that ask you for personal details like your password or ask you to visit a particular website. Bluetooth allows users to exchange files and download to and from a computer. While this technology is very useful, it is also quite risky. Think carefully about where you use Bluetooth. Use it in hidden mode so it will still work with your twinned devices but is hidden from other devices. When you have finished, disable Bluetooth to prevent bluejacking. Sunday, 02 December 2018

Find out the name of a virus and how to remove it Learning development Find out the name of a virus and how to remove it Sunday, 02 December 2018

Learning development Sunday, 02 December 2018 Ensure good virus protection Viruses are programs that can do a lot of damage – from deleting or changing data to taking control of your computer, creating a so-called zombie computer. Sometimes a user does not even know their computer is infected with a virus. Trojans are a particularly nasty form of virus. They can be hidden inside another program and infect your system when the other program is installed. Trojan viruses can do many things, including capturing keystrokes on your computer as you type. Sunday, 02 December 2018

Independent Task Choose one of the following internet services: shopping, gaming or social networking and explain how you can stay safe while online. Write up your explanation in your booklet Secure shopping Shopping over the internet is becoming more and more popular. Criminals try and exploit security weaknesses by intercepting money transfers in order to steal money. No one should enter their credit card details into a website form unless it has the secure payment padlock symbol clearly displayed. This is usually displayed on the bottom right bar of your browser window, and the letter ‘s’ usually appears in the top ‘URL’ address bar (see above). Consoles – fun and games? Most games consoles connect to the internet and interact with other people via online games. Most online players you interact with will be friends – some, however, will be strangers. Some adults pretend to be friendly to get close to teenagers to draw them into potentially dangerous situations. This is called grooming – it could take place over many months. Never agree to receive anything from other game-players in return for demands that make you feel uncomfortable. Your social network There are a variety of social networks such as Bebo, MySpace and Facebook. Make sure you keep your passwords safe and only allow invited friends to access your network. There are lots of incidents where people have accessed someone else's account, threatening to delete their entire account unless they comply with real-life requests. This is completely unacceptable and must be urgently reported to the network administrator and discussed with your parents or guardians. Most sites have an email address called abuse@. Become safety savvy

What does anti-virus software do? Exit ticket What does anti-virus software do? R A G scam Become safety savvy