Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Safety Internet Safety LPM

Similar presentations


Presentation on theme: "Internet Safety Internet Safety LPM"— Presentation transcript:

1 Internet Safety Internet Safety LPM
Learn about the dangers associated with the internet: Viruses Spyware Cookies Spam Hackers Phishing Identity theft Internet Safety LPM

2 Starter: Make a list of the problems you and your friends have had when using the internet: Internet Safety LPM

3 Dangers…… Viruses Identity Theft Spyware Pop Ups Spam Cookies Phishing
Hackers Internet Safety LPM

4 Viruses Program designed to cause other programs to malfunction or stop working. Infect the computer without the permission or knowledge of the user. Viruses can get onto your computer through: Websites Opening s Downloading attachments Using infected portable storage Connecting to an infected hard Disk Internet Safety LPM

5 Ways to protect your computer
Back up your work Don’t use pirate copies of CD’s and DVD’s Be careful when downloading from the internet. Take care when opening s and attachments. Install anti virus software and keep it updated. Internet Safety LPM

6 Task: write a list of guidelines to help people protect their computers from viruses
Internet Safety LPM

7 Task: Bullet point seven problems that could occur from internet use
Internet Safety LPM

8 Spyware Is a computer program which is installed without permission.
It works by collecting information and sending it back to another source. Installed through a virus or as part of an installation program. The information collected could include websites you have visited or what you have been downloading. The information is often used for marketing purposes or even FRAUD. Internet Safety LPM

9 ICT & the law – link the right statement to the correct law
Computer Misuses Act 1990 Protects peoples original work or ideas from being used without their permission. Copyright, designs and Patents Act 1988 Regulates how a person uses information and protects against the misuse of personal details. Data protection Act 1998 Protects people from unauthorised access to computers material, unauthorised modification of computer material and unauthorised access to facilitate crime Internet Safety LPM

10 Why would a marketing company use Spyware?
Explain your answers Internet Safety LPM

11 Explain why the 3 laws were invented:
Use keys words in your answers: original work ideas misuse of personal details. Access Modification Crime Internet Safety LPM

12 Cookies A cookie is a small text file which stores information about your internet activity and reports it back to the website server (passwords/ usernames). Used by the website creators to enable websites to be customised for individual users Cookies can allow pop ups to be generated and password details can be stored and used by hackers Internet Safety LPM

13 Search the internet and find a website that you can customise to suit your own style print screen before/ after changes BBC website MSN Internet Safety LPM

14 Exam question Internet safety includes viruses, spyware, cookies, spam, phishing and identity theft. You might get an exam question like this. A website that Gia visits creates a cookie on her computer. What is a cookie (1) State what a cookie does (2) Give one example of how the cookie would benefit Gia (1) Internet Safety LPM

15 SPAM Un wanted emails Chain letters Bulk email
How can you prevent SPAM getting into your inbox? Internet Safety LPM

16 Phishing Use the internet to research the term Phishing…. And explain in your own words. Internet Safety LPM

17 Hackers Hackers try to access your computer without your permission to steal information that they could use for malicious or criminal purposes. P2P – increases the risk of hackers accessing data stored on your computer. P2P – (Peer-to-peer) sharing files among groups of people who are logged onto to a file sharing network. Internet Safety LPM

18 Identity Theft When someone collects information about you and uses it for malicious or criminal purposes. Identity theft is a growing problem. Gather information for bins, social networking sites Internet Safety LPM

19 Link the correct statement to the correct word
Viruses Sending a link via to a genuine looking website but it is in fact bogus. Spy ware Program designed to cause other programs to malfunction or stop working. Infect the computer without the permission or knowledge of the user. Hackers Is a computer program which is installed without permission. It works by collecting information and sending it back to another source. Installed through a virus or as part of an installation program. Cookies A small text file which stores information about your internet activity and reports it back to the website server. Phishing Un wanted s Chain letters Bulk Spam try to access your computer without your permission to steal information that they could use for malicious or criminal purposes. Id theft When someone collects information about you and uses it for malicious or criminal purposes.

20 When purchasing online
What should you look for to ensure it is safe….? Identify true/ false from the statements below: Padlock Symbol locked Padlock symbol unlocked Key and lock The colour of the address bar Verisign Key HTTP address line Door symbol Internet Safety LPM

21 Find out what Verisign is?
Internet Safety LPM

22 Knowledge Check Ruby purchased an item online. When she checked her bank statement she noticed that she had been charged for something she did not buy. How could this have happened? What should she do? The website could off got hold of her bank account details when she purchased the item and used it to charge her more. There could of also been a hidden cost in the receipt for the item. Ruby should tell here bank to investigate the problem and try and get her money back. Ruby has installed free software on her computer. She notices that her computer has slowed down. What steps should ruby take? She should scan her computer to see if the software doesn’t have virus or is to big for the computer to handle. Then delete the software. Ruby keeps receiving SPAM mail, what should she do? Put a block on any that the server suggests is spam. She should also ignore the and just delete so her computer stays Internet Safety LPM


Download ppt "Internet Safety Internet Safety LPM"

Similar presentations


Ads by Google