Download presentation
Presentation is loading. Please wait.
Published byJonas Stevens Modified over 9 years ago
1
E-Safety Challenge College
2
Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
3
Discussion Discuss all the different websites that you have put some information about yourself. ◦ E.g. Email accounts (yahoo, hotmail…etc) Shopping Games Social networking sites
4
Risks Weak passwords Privacy settings Identity theft Music/video downloads
5
Passwords Avoid use family or friend’s names Avoid using common words such as ‘password’ Use letters AND numbers For really strong passwords use a combination of all types of keys on the keyboard including symbols (e.g. 5tr0ng9a&&3o^@)
6
Privacy Settings When you join a social networking site all your information is public – this means that your information is there for everyone on the internet to see if they wanted. All social networking sites allow you to change your settings You can control who can see your profile by changing the settings (see picture on the next slide)
7
Privacy Settings
8
Identity Theft Identity theft is when someone pretends to be you by using your personal information This can happen if you put a lot of personal information on websites that are not secure This is known to happen to adults more than children but it is still worth keeping in mind when posting personal information online.
9
Music/Video downloads When downloading music or videos always check: ◦ that the website is legal ◦ Personal information you give to the website is secure (i.e. there should be a padlock either in the bottom right hand corner of the explorer window or at the end of the address bar AND there should be an s after the http (https) ◦ And scan the download for viruses.
10
Activity Turn to page 9 (to brainstorm), ‘protecting yourself’ section. In groups prepare a presentation on protecting yourself. The information you need to include is: ◦ List of websites you have inputted information ◦ Create examples of weak, strong and really strong password ◦ How you can protect yourself from: Social networking sites Identity theft Downloading music/videos
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.