2ICT Skills Online Safety John Hamill March 8, 2011 So what is the internet?The internet is global network that connects most of the world’s personal computers.The World Wide Web is a collection of electronic files linked together like a spider web.These files are stored on computers called web servers located around the worldWorldwide, every day, 800 million people visit the Internet to browseWhen you think of the Internet, think hardware a network linking computersThe WWW is a network of electronic file, think softwareA server is like a computer that stores & delivers filesJohn HamillColáiste Dhúlaigh
3ICT Skills Online Safety John Hamill March 8, 2011 What do you need to connect?The computer programs that allow you view the Web are called "Web Browsers".The most common is Microsoft Internet Explorer. There are several others such as Firefox, Safari and Chrome.John HamillColáiste Dhúlaigh
4The internet = Opportunities Look what’s at your fingertipsA way to communicate with friends, family, colleaguesAccess to information and entertainmentA means to learn and exploreA means of doing business and bankingThe Internet is a global network that connects most of the world’s personal computers. It is a fantastic tool that has created lots of benefits for families, for business, and for education. If you’re not on the Internet, you should check it out. You can try it out at a library if you’re not ready to get a PC and an Internet connection.Worldwide, every day, 800 million people visit the Internet to search for information and entertainment, and communicate with friends and colleagues. Online, it doesn’t matter where a person or data is “actually” located, because the Internet puts an entire universe of information, images and ideas right at your fingertips.You can explore world-class museums, earn a college degree, manage your personal finances, and plan vacations.You can play games, download music and movies, purchase products and services, and make new friends.It’s now easier to stay in touch, arrange visits or appointments, order gifts or books. Lots of folks use messenger and camera functions to talk live and photo sharing sites to share pictures. Grandparents who live far away can watch the little ones grow up, even when they can’t be there in person.Lots of folks use the Internet to start a business, too, or to post a classified ad.There are great Internet resources for education, including libraries, encyclopedias and other research tools, as well as social environments where kids can interact and explore common interests. And, of course, there are games, including learning games for all ages.Of course the benefits of the Internet do not come without risks. Those risks can be dangerous to your family, your privacy, your credit, and to your computer. It’s just like when we leave our house. Every day, we are exposed to dangers that we must learn to avoid or shield ourselves against.John Hamill
5ICT Skills Online Safety John Hamill March 8, 2011 10 Things to do on the web….Play games, download music and moviesPurchase products and servicesStay in touchPost a classified ad (Buy and Sell)Social sites where people can interact and explore common interestsExplore world-class museumsEarn a college degreeManage your personal financesBook a vacationSet up a businessThe WWW is a fantastic resource that enables people reach their potential.John HamillColáiste Dhúlaigh
6Leading Online Risks For Children PredatorsThese people use the Internet to trick children into meeting with them in personCyber-bulliesBoth children and adults may use the Internet to harass or intimidate other peopleFile-share AbuseExchanging music, video, and other files with strangers may be illegal, and can give them access to your PC or download viruses or wormsDisturbing ContentIf you explore unsupervised, you could stumble upon images or information you may not want to be exposed toWe started by talking about the benefits of the Internet. These benefits far outweigh the risks. But now, let’s talk in detail about the risks. Understanding both the benefits and the dangers of the Internet is one of the best steps you can take to protect your family online and to help ensure a safe and fun experience when they use the Internet.For the most part, the Internet is a positive and rewarding place for kids, but the potential risks are also very real. By educating yourself and your family about those issues, you can team up to manage the risks and prevent problems.The Internet risks to children fall into five main categories:Child predatorsChild predators can use the Internet to find and befriend children and approach them. Frequently their goal is to isolate children and to persuade them to meet in person. Often, the only thing you know about a person you meet online is what they tell you. Child predators use that to trick children by pretending to be another child or someone who is completely trustworthy.File sharing abusesCareless use of file-sharing (or peer-to-peer) programs may also expose children to disturbing content or open a door for malicious software that could damage, delete or copy your data. Exchanging music, video, and other files with strangers is risky. Your kids could end up downloading pornography, computer viruses, or spyware by mistake. Some file-sharing programs even let other users access your computer any time it’s online.CyberbulliesOn the Internet, as on any playground, some people play nice, and some don’t. Both children and adults may use the Internet to harass or intimidate other people. As in the real world, bullying can range from name calling to physical threats. For example, kids sometimes broadcast bullying comments and embarrassing images in an instant message or blog, shaming a child in a way that’s largely invisible to parents or others in the community.Invasion of privacySome businesses use registration or contest forms to capture personal information, and if children fill out those forms unsupervised they may share information about themselves or your family that you don’t want strangers to have. Or children may innocently volunteer personal information or photographs to child predators or Internet thieves in blogs, on personal Web pages, or when playing games online.Exposure to disturbing contentChildren are curious and adventurous, and they tend to go where their curiosity leads them. As they explore, they could stumble upon information or images you wouldn’t want them to see, such as sexual, racist or other disturbing content that is not appropriate for children. This can happen easily if they click on the wrong link in an instant message or when sharing files with people they don’t know and trust in the real world.Once people understand the risks as well as the benefits of the Internet, they want to do something about them. Fortunately, there is a lot you can do to keep your family safe online.Invasion of PrivacyIf you fill out online forms, you may share information you don’t want strangers to have about you or your familyJohn Hamill
7Leading Threats To Personal Online Safety Phishingsent by online criminals that tries to trick you into revealing personal informationSpamUnwanted , instant messages, e-cards, and other online communicationIdentity TheftA crime where con artists get your personal information and access your cash and/or creditHoaxessent by online criminals that tries to trick you into giving them moneyMany of the experiences that make the Internet so valuable and enjoyable also require us to share information about ourselves. Sometimes a little information and sometimes a lot. And it’s not always easy to tell who is asking for that information or what they intend to do with it.Sharing information can sometimes bring results you weren’t planning on and don’t want. Those unintended results may be something annoying, such as unwanted spam . Or they could be something very serious, such as an attempt to steal your identity, misuse your good credit, or take your money.Con artists on the Internet would like nothing better than to trick you into giving them your hard-earned money, or revealing personal information that would let them steal your identity.The primary tool that Internet con artists and criminals use is spam— , instant messages, even electronic greeting cards—that you never asked for and don’t want.A particularly sneaky online scam, known as phishing, usually begins with that appears to come from a business you trust or even from within your own organization. That forged message is the “bait” and typically contains a link to an equally phony Web page or pop-up window where you may be asked to reveal personal information such as your credit card number, Social Security number, or bank accounts. That’s the “hook.”Swallow the hook, and you’re sunk, because chances are you will have given some online criminal enough information to steal your identity and use it to gain access to your cash or credit.The other sneaky scam that’s prevalent online are Hoaxes such as the “Nigerian scam” which sends you an with a lie about you “winning the International lottery” or some such gimmick. The spammers then ask you to reveal your bank account number or send money for “processing fees”. Never believe these types of s; they are hoaxes.Technology can help reduce the amount of spam you receive, but nothing can block all spam messages. There are just too many, and the con artists who use spam constantly invent new ways to get around the barriers technology puts in place. But the biggest problem is that the con artists are simply misusing the capabilities that make the Internet such a fantastic resource. A criminal who uses spam to defraud consumers is relying on exactly the same technology as a child who uses to keep in touch with her grandmother.As a result, a big part of staying safe online is paying attention, trusting your instincts, and learning to recognize and avoid spam scams and phishing.John Hamill
8Leading Threats To PC Security Viruses/WormsSoftware programs designed to invade your computer, and copy, damage or delete your dataTrojan HorsesViruses that pretend to be programs that help you while destroying your data and damaging your computerSpywareSoftware that secretly watches and records your online activities or send you endless pop-up adsThe leading online threat to your PC is malicious software such as computer viruses, including highly sophisticated viruses such as worms and Trojans, and spyware.VirusesComputer viruses are software programs that are deliberately designed by online attackers to invade your computer, to interfere with its operation, and to copy, corrupt or delete your data. These malicious software programs are called viruses because they are designed not only to infect and damage one computer, but to spread to other computers all across the Internet.Computer viruses are often hidden in what appear to be useful or entertaining programs or attachments, such as computer games, video clips or photos. Many such viruses are spread inadvertently by computer users, who unwittingly pass them along in to friends and colleagues.WormsWorms are more sophisticated viruses that can replicate automatically and send themselves to other computers by first taking control of certain software programs on your PC.Trojan HorsesOther viruses, called Trojans in honor of the Trojan horse, actually masquerade as beneficial programs while quietly destroying your data and damaging your system.SpywareAs the name implies, spyware is software that is designed to secretly monitor all of the things you do on your computer, and to either report your behavior to the person who designed the program or to take some action based on that information.Spyware may bombard you with pop-up advertising related to the types of Web sites you visit regularly, collect personal information about you, or change the settings on your computer without your knowledge or consent. Spyware can even disable your computer or make it possible for criminals to steal your identity.Fortunately, there are many things you can do to protect your computer from malicious software.John Hamill
9Be careful – use of the Internet Please never ever meet an Internet “friend” in personDo not share files, click links or open attachments from strangersTreat others the way you want to be treatedStand up for yourselfRespect other people’s property music, moviesSet clear rules for Internet useAs soon as your children begin to explore the Internet, you need to set some clear rules about when and how they are allowed use it, just as you did when they got their first bicycle. Explain the risks and why it is important to have some family rules to avoid problems and keep the Internet fun for everyone.You may want to consider the following guidelines as the basis for creating a safe online experience for your family:Never go alone to meet an Internet “friend” in person. The people your children meet online may not be who they say they are. If your child insists on a meeting, you should go along and make sure the meeting takes place in a busy public place.Do not share files, open attachments, or click links from strangersYou teach your kids not to accept gifts from strangers in the physical So too attachments that comes with an message, link sin an instant message or blog, or music or video files sent by strangers could contain a virus, bad software or a disturbing image.Treat others as you want to be treatedThis is a basic rule of all human relationships. Give out what you want to get back. Trying to embarrass or intimidate other people with nasty comments is both rude and wrong.Stand up for yourselfIf someone is disrespectful or tries to bully you, ignore them. If they don’t stop, use software to block them from contacting you or playing the same game. If it is a particularly bad situation, you may report them to the Web site administrator or other authorities.Respect the property of othersJust because content is easy to find and enjoy on the Internet doesn’t mean it is free for the taking. Remind your kids that copying and sharing music, games, and other copyrighted downloads can be illegal, especially if the owner hasn’t given permission. Plagiarism and hacking into computers are also illegal.
10Keep Personal Information Private Make sure you never share personal information online without permissionLet your parents monitor your online activitiesPlease report suspicious activity to parents, Garda or teachersPlease use appropriate screen names and addressesKeep personal information privateMonitor your children’s online activitiesMake sure you understand who your kids are sharing information with through instant messaging, blogging sites, and other social networks. Are they friends, friends of friends, or the general public? And keep an eye on what they are sharing.Teach your children to report suspicious activityEncourage your children to tell you immediately if someone starts asking personal questions or wants to arrange to meet them in person.Teach children never to share personal information online without permissionTeach your children never to reveal personal information online, unless you give them permission. Personal information includes the facts—such as your child’s real name, age, sex, phone number, address, school, sports team, and favorite places to play—but it also includes photos and feelings. Child predators look for expressions of vulnerability in children, such as sadness, loneliness, and anger. And they know how to use seemingly disconnected information to locate a child.Help children choose appropriate screen names and addressesHelp your children choose screen names and addresses that reveal nothing personal and are not suggestive—musicfan or sportsnut instead of john13 or sexysusie.
11Be On The Lookout For Scams! There are signs that can alert you to scamsAlarmist messages and threats of account closuresPromises of big bucks for little effortDeals that sound too good to be trueMisspellings and grammatical errorsAsking for repliesBe on the lookout for signs of a scam:Alarmist messages and threats of account closures.Promises of big bucks for little or no effort.Deals that sound too good to be true.Misspellings and grammatical errors.Don’t share sensitive personal information in an or instant message.If a reputable company appears to ask for personal info, it could be a scam.The best defense against spam and phishing scams is your own good judgment.Be on the lookout for signs of a scam. Any time you receive an alarmist message from a company, or a threat to close your account unless you verify personal information right away, be wary. Legitimate companies don’t do business this way over the Internet. If there is a real problem with one of your accounts, you won’t be asked to reveal personal information online.that promises big money for little or no effort are most likely scams in disguise. Deals that sound too good to be true probably are, just like in the real world.Misspellings and grammatical errors in may also indicate spam that could lead to problems if you respond.Use Anti-Phishing And Anti-Spam TechnologyTechnology tools, including features built in to your internet browser, can help identify and block spam and phishing scams. You should look for these and be sure they are turned on. Also, be alert to flashing red bars or other indicators these tools use to warn of potential threats.
12Use Strong PasswordsKeep passwords private and create ones that are hard to “crack”Use alpha numeric, symbolsNever share your passwords with friends or be tricked into giving them awayUse strong passwords, keep them secret,You may have important personal information in a variety of electronic and Internet locations, such as online bank and auction accounts, blogs, files on your computer, online shopping sites, etc. One way to protect your information is by using strong passwords to block access to your computer.Most passwords are cracked by a computer program running many letter combinations at high speed, not by someone guessing your password.The best defense is to create a password at least eight characters long that includes a few symbols—such as the dollar sign, pound sign, or exclamation point—as well as letters and numbers. Long, complex passwords are harder to break—even for high-speed computer programs—because the number of possible combinations.Whatever you do, never share your passwords with friends or allow yourself to be tricked into giving them away.