Presentation on theme: "Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety."— Presentation transcript:
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Add problems that can occur from Internet use, to the diagram
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Viruses are programs that can infect a computer without the permission or knowledge of the user. They can damage the systems settings and memory, generating error messages and causing the computer to malfunction. Viruses can get on to your computer through: visiting certain websites opening emails downloading attachments or content from the Internet using infected portable storage devices such as memory sticks, CDs, DVDs connecting to an infected hard disk. Internet Safety
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate 1 2 3 4 5 6 Extension Can you explain the difference between a Worm and a Trojan Internet Safety Write a list of guidelines, with explanations, to help protect a computer from viruses
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Knowledge Spyware Spyware is a computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program. It works by collecting information and sending it back to another source. The information collected could include the websites you have been visiting or what you have been downloading. This information is often used for marketing purposes, but can also be used for illegal purposes such as fraud. Cookies A cookie is a small fi le which stores information related to your Internet activity and then reports this back to the website server. Cookies are used legitimately by website creators to enable websites to be customised for individual users. For example, if you go on to the BBC website, you can customise the homepage, and the next time you visit the site the layout will appear as you have set it. However, cookies can cause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Knowledge cont: Spam Spam is all unwanted email such as unsolicited commercial email, unsolicited bulk email and chain letters. Phishing Phishing involves sending a link via an email to a website which looks like a genuine website (e.g. a bank website) but is in fact bogus. The recipient may be tricked into following the link and entering details such as bank passwords or personal information on the website. Hackers It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer without your permission in order to steal information which they could use for malicious or criminal purposes. Using peer-to-peer (P2P) software could increase the risk of hackers accessing data stored on your computer. Identity theft This takes place when someone collects personal information about you and uses that information for malicious or criminal purposes. In the past, criminals used to rummage though bins to get information, but now people can access Internet social networking sites where peoples profiles contain personal information, which could prove valuable to the criminals. Identity theft is a growing problem.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Computer safety – complete the following to learn ways of protecting yourself against the dangers associated with computer and Internet use Complete the gap-fill texts by entering the correct words in the gaps. 1 To protect your computer from spyware: *You need to be aware that free _____________ on the Internet may contain _______________ and you should always consider this before installing such programs on your computer. * Install anti-spyware software; this is sometimes included with _____________ software. spyware software anti-virus
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety 2 To protect your computer from cookies: *Regularly ______________ your ______________ Internet files. *Change your Internet settings so they do not accept ____________ from all sites. delete temporary cookies
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety 3 To protect your computer from spam: *Set _____________ to block mail or siphon off known spam emails into a _________ mail inbox. *Alert your email service _____________ to mail which you think is spam. *Do not display your email ____________ where people can copy it and add it to a mailing list. * When signing up to online companies, make sure you ____________ of your details being passed on to third parties. junkprovideropt outaddressfilters
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety 4 To protect your computer from hackers: *Install a ____________ to block unauthorised users. This software or device checks information to make sure it is permitted to pass. * Make sure the software you use is up to date: install ____________ which make the software more secure and prevent access to hackers. *If the computer is in a place used by other people, do not leave it ____________ when you are away from it. *When a computer is used by more than one person, use a ____________ set up with ____________ rights to certain areas and not others. Guest accountfirewalllogged onfixesaccess
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety 5 To protect your computer from identify theft: *Have a firewall to block _________ access. *Protect your personal information using _________. *Use a _________ to destroy paper documents with personal details. *Use software that writes over _________ files many times so that the files cannot be recovered. encryptionunauthorisedshredderdelete
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Homework task Describe the possible threats involved in connecting a computer to the Internet and outline ways of avoiding them. 6 marks