Download presentation
Presentation is loading. Please wait.
1
Internet Safety and The Digital Divide
Ian Ramsey C of E School GCSE ICT Let’s Communicate Internet Safety and The Digital Divide
2
Definition of a computer virus
Starter: Use the internet to find a definition of a computer virus. Copy and paste the URL (web address) of the site that you use. Definition of a computer virus Source A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems. a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. A computer virus is a program.
3
Lesson Objectives: By the end of this lesson you will be able to:
understand the risks associated with Internet use protect yourself and your computer from Internet-related problems understand the digital divide and the factors that contribute to lack of access to technology
4
Internet problems: What problems have you had when using the Internet? In pairs make a list below and add any specific examples or an explanation of how it affected you. Problem encountered Description/Effects Slow loading The information you want takes a while to load Spam Spam clutters up your inbox with s you don’t want Computer virus The computer crashes and causes problems with hardware and software sometimes deleting data Link doesn’t work The site you want to go to doesn’t work Pop up adverts or surveys Annoying as they pop up when you don’t want them to When you go on a site and it takes you to an advertisement page Its more difficult to quickly view the site you want Accounts hacked into Can get personal information Inaccurate information If the site is created by someone with false information you are informed wrongly Unable to close a webpage Bad when you need to go on something else
5
Viruses: Viruses are programs that can infect a computer without the permission or knowledge of the user. They can damage the system’s settings and memory, generating error messages and causing the computer to malfunction. Viruses can get on to your computer through: Visiting certain websites Opening s Downloading attachments or content from the internet Using infected portable storage devices such as memory sticks, DVDs and CDs Connecting to an infected hard disk Worm – similar to a virus, but it has the capability to travel without any human action so it can infect many computers. It is able to replicate itself and can use the address book to send itself to everyone listed. It consumes system memory to do this and slows down the computer or the network. Trojan horse – a program that appears legitimate but performs some harmful activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan is similar to a virus, except that it does not replicate itself or reproduce by infecting other files. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game.
6
Viruses (task): Write a list of guidelines for teenagers to help protect their computers from viruses. 1 Be wary of opening trash mail – delete them as soon as you get them 2 Think before downloading free apps 3 Don’t open attachments from s unless you trust the person 4 Only use your own hardware devices to put in the computer 5 Keeping your operating system up to date 6 Using up to date anti virus software 7 Only downloading files from safe websites 8 Avoiding software from unreliable sources Clear the cache or search history to prevent viruses Use these websites to help you if necessary:
7
Spyware: Spyware is a computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program. It works by collecting information and sending it back to another source. The information collected could include the websites you have been visiting or what you have been downloading. This information is often used for marketing purposes, but can also be used for illegal purposes such as fraud (tricking someone for personal gain or to damage them). Cookies: A cookie is a small file which stores information related to your internet activity and then reports this back to the website server. Cookies are used legally by website creators to enable websites to be customised for individual users. For example, if you go onto the BBC website you can customise the homepage and the next time you visit the site the layout will appear as you have set it. However, cookies can cause problems such as pop-ups being generated.
8
Spam: Phishing: Hackers: Identity theft:
Spam is all unwanted such as advertisements and chain letters. Phishing: Phishing involves sending a link via an to a website which looks like a genuine site (e.g. a bank website) but is in fact bogus. The recipient may be tricked into following the link and entering details such as bank passwords, or personal information on the website. Hackers: It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer without your permission in order to steal information which they could use for malicious or criminal purposes. Identity theft: This takes place when someone collects personal information about you and uses that information for malicious or criminal purposes. In the past, criminals used to rummage through bins to get information, but now people can access internet social networking sites where people’s profiles contain personal information which could prove valuable to the criminals.
9
Make a PowerPoint presentation advising teenagers on how to keep their computer safe.
Include information on some of the following: Viruses Spyware Phishing Identity theft
10
Protecting yourself – Computer safety:
Open this worksheet: All pupils – ICT – GCSE Edexcel – Theory – Unit 1– Computer safety Replace the lines with the correct words, choosing from those given underneath each statement. Save the worksheet into your Theory – Unit 1 folder.
11
The digital divide This is the gap between people in society who cannot or do not have effective access to digital technology and those who do. Because of the importance of technology in modern life, people who do not have access to it can be disadvantaged in man ways. Lack of access is most common in the UK if you: Have a low income Live in a rural area Have weak literacy skills Have a disability Are from an ethnic minority Are elderly Can you think of reasons why these groups in society do not have access to the latest technology or may choose not to get the latest technology? Is it the responsibility of the Government to try to do something about the digital divide?
12
Knowledge check You have installed free software on your computer. You notice that your computer has slowed down. What steps should you take? Answer: You keep receiving spam mail. What can you do? Answer:
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.