Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: What precautions should I take? Name:

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Unit 1 Living in the Digital WorldChapter 2 Which devices should we take? This presentation will cover the following topic: Which devices should we take?
Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
Hacking. Learning Objectives: At the end of this lesson you should be able to:
SPYWARE  Do you know where your personal information is?
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topic: Setting up a Multimedia System Name:
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
Unit 1 Living in the Digital WorldChapter 2 Finding the way This presentation will cover the following topic: Finding the way Name:
211 Multimedia Web Design Lesson 1 – Web Functionality & Purpose.
Unit 1 Living in the Digital WorldChapter 1 Let’s Communicate This presentation will cover the following topic: Socialising on the Internet.
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: Connecting to a home network Which types.
OCR Nationals Technological Innovation and E-Commerce Unit version.
OCR Nationals Technological Innovation and E-Commerce Unit 8.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topic: Running a business online Name:
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Keeping in touch Name:
Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Planning a Trip Name:
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Section 6 Theory Software Copyright, Viruses and Hacking.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Unit 1 Living in the Digital WorldChapter 2 How do we connect? This presentation will cover the following topic: How can we connect? Name:
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
Carole Myers CIED What is Digital Security?  According to Ribble and Bailey, it is “the precautions that all technology users must take to guarantee.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Internet Privacy By Joel Bryner. The Right to Internet Privacy The right to Internet privacy, like the right to common privacy, is the lawful privilege.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Cloud Storage Name:
Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Keeping in touch Name:
Internet Safety Internet Safety LPM
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me Alternative Devices Although his laptop will play music using media software, Jamie could buy.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Julie Latham Digital Citizenship: An Informational Guide.
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topic: Setting up a Multimedia System Name:
Does It Matter Who Has Your Data? 1.Intro 2.Teach 1: Travel Safety Rules 3.Teach 2: How to Protect Your Data 4.Wrap-Up 5.Assessment 6.Extension Activity.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Year 8- Web Pages Worksheet 1 YOUR NAME:. Task 1 What Makes A Bad Website? Look at the following THREE web sites on the internet and describe what makes.
Starter (June 2011) Explain two methods by which someone could find a website on the internet. [4]
Topic 3: Operating Online GCSE ICT Revision.  For this topic, you need to be aware of how people can use the Internet safely.  You need to be able to.
Name: Teacher: Class: Year 10 Computing Networks.
Starter To complement our notes and learning from last lesson (Topic 10 Introducing Large ICT Systems: Features of Large ICT Systems), fold your piece.
Unit 1 Living in the Digital WorldChapter 1 Let’s Communicate This presentation will cover the following topic: The Internet as a work tool.
Unit 1 Living in the Digital WorldChapter 2 Which devices should we take? This presentation will cover the following topic: Which devices should we take?
Unit 1 Living in the Digital WorldChapter 2 Finding the way This presentation will cover the following topic: Finding the way Name:
Unit 1 Living in the Digital WorldChapter 2 On the move This presentation will cover the following topic: Solving a last-minute hitch Name:
Unit 1 Living in the Digital WorldChapter 2 On the move Chapter 2 Theory.
Computer Security Keeping you and your computer safe in the digital world.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Unit 1 Living in the Digital WorldChapter 2 How do we connect? This presentation will cover the following topic: How can we connect? Name:
Online Safety Lesson One. Introduction to ICT  ICT is a core subject in Mount Grace school, which means you will study it right the way through until.
This presentation will cover the following topic:
Internet developments
Bigger Picture.
Personal spaces.
Malware aka- malicious software By: Ken Fogel
TB2 Lesson 8 Online Banking
TB2 Lesson 5 Data Protection
Topic 3: Operating Online Press F5 to view!
Starter Task One: Complete the gapped worksheet, identifying which description matches the correct key word. Task Two: Briefly answer the questions outlined.
McAfee Customer Support Get the best solution of McAfee technical issues Hello Sir, Welcome I would like to tell you that If you are looking for McAfee.
AVG Antivirus is specially designed and developed for Windows and Mac computers to provide a durable protection from various threats. If you are covered.
Chapter 3 - Software Split into 3 groups of 5..
Pima Medical Institute Online Education
Pima Medical Institute Online Education
Digital footprint.
Presentation transcript:

Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: What precautions should I take? Name:

Unit 1 Living in the Digital WorldChapter 3 – Entertain Me Chapter Objectives: By the end of this lesson you will be able to: describe the symptoms of spyware explain how to prevent and cure spyware define what is meant by a ‘cookie’ explain the functions of cookies discuss the privacy implications of the use of cookies. Name:

Unit 1 Living in the Digital WorldChapter 3 – Entertain Me Starter Starter task: Make a list below of all the programs that you know can be harmful to computers or their security when you are online.

Unit 1 Living in the Digital WorldChapter 3 – Entertain Me What is wrong with Jamie’s computer? Jamie has been using his computer without adequate protection. It looks as if he has installed some spyware without realising it. He probably did this when he installed free or peer-to-peer sharing software. As this spyware runs, it is slowing down his computer. Using the 2 website links on the VLE and your own research, answer the following questions: Spyware What is spyware? What does spyware aim to do? How can you protect yourself?

Unit 1 Living in the Digital WorldChapter 3 – Entertain Me Complete a mind map below about cookies. Explain what they are; how they work; the good things about cookies; the bad things about cookies. Also include information on the new EU law introduced from May 2012 and the implications of this law on internet users. Use the web links on the VLE and your own research to complete the mind map.

Unit 1 Living in the Digital WorldChapter 3 – Entertain Me How can information be collected about Jamie? Jamie has some questions about the collection of covert data. Complete the table below about the different types of data collection Define: Covert data collection Overt data collection Can I allow cookies from some sites but not others? Can I stop sites giving me cookies? How can I remove cookies that are already there?

Unit 1 Living in the Digital WorldChapter 3 – Entertain Me Open Page 15/16 in the VLE textbook and select etask3.19 and paste a screenshot of the completed exercise below.

Unit 1 Living in the Digital WorldChapter 3 – Entertain Me Exam questions A website Gia visits creates cookies on her computer. (i)State what a cookie does. (1) (i)Give one benefit of the cookie to Gia. (1) (ii)Give two reasons why Gia should consider deleting the cookie from her computer. (2) Answers: