Download presentation
1
Internet Safety Internet Safety LPM
Learn about the dangers associated with the internet: Viruses Spyware Cookies Spam Hackers Phishing Identity theft Internet Safety LPM
2
Starter: Make a list of the problems you and your friends have had when using the internet: Internet Safety LPM
3
Dangers…… Viruses Identity Theft Spyware Pop Ups Spam Cookies Phishing
Hackers Internet Safety LPM
4
Viruses Program designed to cause other programs to malfunction or stop working. Infect the computer without the permission or knowledge of the user. Viruses can get onto your computer through: Websites Opening s Downloading attachments Using infected portable storage Connecting to an infected hard Disk Internet Safety LPM
5
Ways to protect your computer
Back up your work Don’t use pirate copies of CD’s and DVD’s Be careful when downloading from the internet. Take care when opening s and attachments. Install anti virus software and keep it updated. Internet Safety LPM
6
Task: write a list of guidelines to help people protect their computers from viruses
Internet Safety LPM
7
Task: Bullet point seven problems that could occur from internet use
Internet Safety LPM
8
Spyware Is a computer program which is installed without permission.
It works by collecting information and sending it back to another source. Installed through a virus or as part of an installation program. The information collected could include websites you have visited or what you have been downloading. The information is often used for marketing purposes or even FRAUD. Internet Safety LPM
9
ICT & the law – link the right statement to the correct law
Computer Misuses Act 1990 Protects peoples original work or ideas from being used without their permission. Copyright, designs and Patents Act 1988 Regulates how a person uses information and protects against the misuse of personal details. Data protection Act 1998 Protects people from unauthorised access to computers material, unauthorised modification of computer material and unauthorised access to facilitate crime Internet Safety LPM
10
Why would a marketing company use Spyware?
Explain your answers Internet Safety LPM
11
Explain why the 3 laws were invented:
Use keys words in your answers: original work ideas misuse of personal details. Access Modification Crime Internet Safety LPM
12
Cookies A cookie is a small text file which stores information about your internet activity and reports it back to the website server (passwords/ usernames). Used by the website creators to enable websites to be customised for individual users Cookies can allow pop ups to be generated and password details can be stored and used by hackers Internet Safety LPM
13
Search the internet and find a website that you can customise to suit your own style print screen before/ after changes BBC website MSN Internet Safety LPM
14
Exam question Internet safety includes viruses, spyware, cookies, spam, phishing and identity theft. You might get an exam question like this. A website that Gia visits creates a cookie on her computer. What is a cookie (1) State what a cookie does (2) Give one example of how the cookie would benefit Gia (1) Internet Safety LPM
15
SPAM Un wanted emails Chain letters Bulk email
How can you prevent SPAM getting into your inbox? Internet Safety LPM
16
Phishing Use the internet to research the term Phishing…. And explain in your own words. Internet Safety LPM
17
Hackers Hackers try to access your computer without your permission to steal information that they could use for malicious or criminal purposes. P2P – increases the risk of hackers accessing data stored on your computer. P2P – (Peer-to-peer) sharing files among groups of people who are logged onto to a file sharing network. Internet Safety LPM
18
Identity Theft When someone collects information about you and uses it for malicious or criminal purposes. Identity theft is a growing problem. Gather information for bins, social networking sites Internet Safety LPM
19
Link the correct statement to the correct word
Viruses Sending a link via to a genuine looking website but it is in fact bogus. Spy ware Program designed to cause other programs to malfunction or stop working. Infect the computer without the permission or knowledge of the user. Hackers Is a computer program which is installed without permission. It works by collecting information and sending it back to another source. Installed through a virus or as part of an installation program. Cookies A small text file which stores information about your internet activity and reports it back to the website server. Phishing Un wanted s Chain letters Bulk Spam try to access your computer without your permission to steal information that they could use for malicious or criminal purposes. Id theft When someone collects information about you and uses it for malicious or criminal purposes.
20
When purchasing online
What should you look for to ensure it is safe….? Identify true/ false from the statements below: Padlock Symbol locked Padlock symbol unlocked Key and lock The colour of the address bar Verisign Key HTTP address line Door symbol Internet Safety LPM
21
Find out what Verisign is?
Internet Safety LPM
22
Knowledge Check Ruby purchased an item online. When she checked her bank statement she noticed that she had been charged for something she did not buy. How could this have happened? What should she do? The website could off got hold of her bank account details when she purchased the item and used it to charge her more. There could of also been a hidden cost in the receipt for the item. Ruby should tell here bank to investigate the problem and try and get her money back. Ruby has installed free software on her computer. She notices that her computer has slowed down. What steps should ruby take? She should scan her computer to see if the software doesn’t have virus or is to big for the computer to handle. Then delete the software. Ruby keeps receiving SPAM mail, what should she do? Put a block on any that the server suggests is spam. She should also ignore the and just delete so her computer stays Internet Safety LPM
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.