Internet Safety and The Digital Divide

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Unit 2 - Hardware Computer Security.
IT Security for Users By Matthew Moody.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
How To Remove Flooders?-Get Help Website:
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Edexcel GCSE Cyber security threats Computer Science 1CP1
Hacking Computer crime and cyber security.
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
COMPUTER VIRUSES Computer Technology.
Cyber Security By: Pratik Gandhi.
Topic 6: Issues Press F5 to view!
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
How to Get Rid of Online Threats Impacting your Computer Device?
Lesson 2- Protecting Yourself Online
Computer Technology Notes 5
– Communication Technology in a Changing World
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
ISNE101 Dr. Ken Cosh Week 13.
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
King Saud University- College OF Applied Studies
Lesson 2- Protecting Yourself Online
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Internet Safety and The Digital Divide Ian Ramsey C of E School GCSE ICT Let’s Communicate Internet Safety and The Digital Divide

Definition of a computer virus Starter: Use the internet to find a definition of a computer virus. Copy and paste the URL (web address) of the site that you use. Definition of a computer virus Source A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. A computer virus is a program. http://www.webopedia.com/TERM/V/virus.html https://www.google.co.uk/search?safe=vss&site=&source=hp&q=computer+virus+definition&oq=computer+virus+defin&gs_l=hp.3.0.0i131j0l8.4143.7993.0.9027.20.20.0.0.0.0.352.1830.13j4j0j1.18.0.ccynfh...0...1.1.64.hp..2.18.1829.kX8_c1fDhPs

Lesson Objectives: By the end of this lesson you will be able to: understand the risks associated with Internet use protect yourself and your computer from Internet-related problems understand the digital divide and the factors that contribute to lack of access to technology

Internet problems: What problems have you had when using the Internet? In pairs make a list below and add any specific examples or an explanation of how it affected you. Problem encountered Description/Effects Slow loading The information you want takes a while to load Spam email Spam email clutters up your inbox with emails you don’t want Computer virus The computer crashes and causes problems with hardware and software sometimes deleting data Link doesn’t work The site you want to go to doesn’t work Pop up adverts or surveys Annoying as they pop up when you don’t want them to When you go on a site and it takes you to an advertisement page Its more difficult to quickly view the site you want Accounts hacked into Can get personal information Inaccurate information If the site is created by someone with false information you are informed wrongly Unable to close a webpage Bad when you need to go on something else

Viruses: Viruses are programs that can infect a computer without the permission or knowledge of the user. They can damage the system’s settings and memory, generating error messages and causing the computer to malfunction. Viruses can get on to your computer through: Visiting certain websites Opening e-mails Downloading attachments or content from the internet Using infected portable storage devices such as memory sticks, DVDs and CDs Connecting to an infected hard disk Worm – similar to a virus, but it has the capability to travel without any human action so it can infect many computers. It is able to replicate itself and can use the email address book to send itself to everyone listed. It consumes system memory to do this and slows down the computer or the network. Trojan horse – a program that appears legitimate but performs some harmful activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan is similar to a virus, except that it does not replicate itself or reproduce by infecting other files. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.

Viruses (task): Write a list of guidelines for teenagers to help protect their computers from viruses. 1 Be wary of opening trash mail – delete them as soon as you get them 2 Think before downloading free apps 3 Don’t open attachments from emails unless you trust the person 4 Only use your own hardware devices to put in the computer 5 Keeping your operating system up to date 6 Using up to date anti virus software 7 Only downloading files from safe websites 8 Avoiding software from unreliable sources Clear the cache or search history to prevent viruses Use these websites to help you if necessary: http://www.surfnetkids.com/tech/335/tips-for-protecting-your-computer-from-viruses/ http://antivirus-software.topchoicereviews.com/11-ways-prevent-computer-viruses_258.html http://www.wikihow.com/Avoid-Getting-a-Computer-Virus-or-Worm-on-Your-Windows-PC http://list25.com/25-best-ways-to-prevent-viruses-and-malware/

Spyware: Spyware is a computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program. It works by collecting information and sending it back to another source. The information collected could include the websites you have been visiting or what you have been downloading. This information is often used for marketing purposes, but can also be used for illegal purposes such as fraud (tricking someone for personal gain or to damage them). Cookies: A cookie is a small file which stores information related to your internet activity and then reports this back to the website server. Cookies are used legally by website creators to enable websites to be customised for individual users. For example, if you go onto the BBC website you can customise the homepage and the next time you visit the site the layout will appear as you have set it. However, cookies can cause problems such as pop-ups being generated.

Spam: Phishing: Hackers: Identity theft: Spam is all unwanted email such as advertisements and chain letters. Phishing: Phishing involves sending a link via an email to a website which looks like a genuine site (e.g. a bank website) but is in fact bogus. The recipient may be tricked into following the link and entering details such as bank passwords, or personal information on the website. Hackers: It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer without your permission in order to steal information which they could use for malicious or criminal purposes. Identity theft: This takes place when someone collects personal information about you and uses that information for malicious or criminal purposes. In the past, criminals used to rummage through bins to get information, but now people can access internet social networking sites where people’s profiles contain personal information which could prove valuable to the criminals.

Make a PowerPoint presentation advising teenagers on how to keep their computer safe. Include information on some of the following: Viruses Spyware Phishing Identity theft

Protecting yourself – Computer safety: Open this worksheet: All pupils – ICT – GCSE Edexcel – Theory – Unit 1– Computer safety Replace the lines with the correct words, choosing from those given underneath each statement. Save the worksheet into your Theory – Unit 1 folder.

The digital divide This is the gap between people in society who cannot or do not have effective access to digital technology and those who do. Because of the importance of technology in modern life, people who do not have access to it can be disadvantaged in man ways. Lack of access is most common in the UK if you: Have a low income Live in a rural area Have weak literacy skills Have a disability Are from an ethnic minority Are elderly Can you think of reasons why these groups in society do not have access to the latest technology or may choose not to get the latest technology? Is it the responsibility of the Government to try to do something about the digital divide?

Knowledge check You have installed free software on your computer. You notice that your computer has slowed down. What steps should you take? Answer: You keep receiving spam mail. What can you do? Answer: