Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Internet.

Similar presentations


Presentation on theme: "The Internet."— Presentation transcript:

1 The Internet

2 ICT Skills Online Safety John Hamill March 8, 2011
So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a collection of electronic files linked together like a spider web. These files are stored on computers called web servers located around the world Worldwide, every day, 800 million people visit the Internet to browse When you think of the Internet, think hardware a network linking computers The WWW is a network of electronic file, think software A server is like a computer that stores & delivers files John Hamill Coláiste Dhúlaigh

3 ICT Skills Online Safety John Hamill March 8, 2011
What do you need to connect? The computer programs that allow you view the Web are called "Web Browsers". The most common is Microsoft Internet Explorer. There are several others such as Firefox, Safari and Chrome. John Hamill Coláiste Dhúlaigh

4 The internet = Opportunities
Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment A means to learn and explore A means of doing business and banking The Internet is a global network that connects most of the world’s personal computers. It is a fantastic tool that has created lots of benefits for families, for business, and for education. If you’re not on the Internet, you should check it out. You can try it out at a library if you’re not ready to get a PC and an Internet connection. Worldwide, every day, 800 million people visit the Internet to search for information and entertainment, and communicate with friends and colleagues. Online, it doesn’t matter where a person or data is “actually” located, because the Internet puts an entire universe of information, images and ideas right at your fingertips. You can explore world-class museums, earn a college degree, manage your personal finances, and plan vacations. You can play games, download music and movies, purchase products and services, and make new friends. It’s now easier to stay in touch, arrange visits or appointments, order gifts or books. Lots of folks use messenger and camera functions to talk live and photo sharing sites to share pictures. Grandparents who live far away can watch the little ones grow up, even when they can’t be there in person. Lots of folks use the Internet to start a business, too, or to post a classified ad. There are great Internet resources for education, including libraries, encyclopedias and other research tools, as well as social environments where kids can interact and explore common interests. And, of course, there are games, including learning games for all ages. Of course the benefits of the Internet do not come without risks. Those risks can be dangerous to your family, your privacy, your credit, and to your computer. It’s just like when we leave our house. Every day, we are exposed to dangers that we must learn to avoid or shield ourselves against. John Hamill

5 ICT Skills Online Safety John Hamill March 8, 2011
10 Things to do on the web…. Play games, download music and movies Purchase products and services Stay in touch Post a classified ad (Buy and Sell) Social sites where people can interact and explore common interests Explore world-class museums Earn a college degree Manage your personal finances Book a vacation Set up a business The WWW is a fantastic resource that enables people reach their potential. John Hamill Coláiste Dhúlaigh

6 Leading Online Risks For Children
Predators These people use the Internet to trick children into meeting with them in person Cyber-bullies Both children and adults may use the Internet to harass or intimidate other people File-share Abuse Exchanging music, video, and other files with strangers may be illegal, and can give them access to your PC or download viruses or worms Disturbing Content If you explore unsupervised, you could stumble upon images or information you may not want to be exposed to We started by talking about the benefits of the Internet. These benefits far outweigh the risks. But now, let’s talk in detail about the risks. Understanding both the benefits and the dangers of the Internet is one of the best steps you can take to protect your family online and to help ensure a safe and fun experience when they use the Internet. For the most part, the Internet is a positive and rewarding place for kids, but the potential risks are also very real. By educating yourself and your family about those issues, you can team up to manage the risks and prevent problems. The Internet risks to children fall into five main categories: Child predators Child predators can use the Internet to find and befriend children and approach them. Frequently their goal is to isolate children and to persuade them to meet in person. Often, the only thing you know about a person you meet online is what they tell you. Child predators use that to trick children by pretending to be another child or someone who is completely trustworthy. File sharing abuses Careless use of file-sharing (or peer-to-peer) programs may also expose children to disturbing content or open a door for malicious software that could damage, delete or copy your data. Exchanging music, video, and other files with strangers is risky. Your kids could end up downloading pornography, computer viruses, or spyware by mistake. Some file-sharing programs even let other users access your computer any time it’s online. Cyberbullies On the Internet, as on any playground, some people play nice, and some don’t. Both children and adults may use the Internet to harass or intimidate other people. As in the real world, bullying can range from name calling to physical threats. For example, kids sometimes broadcast bullying comments and embarrassing images in an instant message or blog, shaming a child in a way that’s largely invisible to parents or others in the community. Invasion of privacy Some businesses use registration or contest forms to capture personal information, and if children fill out those forms unsupervised they may share information about themselves or your family that you don’t want strangers to have. Or children may innocently volunteer personal information or photographs to child predators or Internet thieves in blogs, on personal Web pages, or when playing games online. Exposure to disturbing content Children are curious and adventurous, and they tend to go where their curiosity leads them. As they explore, they could stumble upon information or images you wouldn’t want them to see, such as sexual, racist or other disturbing content that is not appropriate for children. This can happen easily if they click on the wrong link in an instant message or when sharing files with people they don’t know and trust in the real world. Once people understand the risks as well as the benefits of the Internet, they want to do something about them. Fortunately, there is a lot you can do to keep your family safe online. Invasion of Privacy If you fill out online forms, you may share information you don’t want strangers to have about you or your family John Hamill

7 Leading Threats To Personal Online Safety
Phishing sent by online criminals that tries to trick you into revealing personal information Spam Unwanted , instant messages, e-cards, and other online communication Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes sent by online criminals that tries to trick you into giving them money Many of the experiences that make the Internet so valuable and enjoyable also require us to share information about ourselves. Sometimes a little information and sometimes a lot. And it’s not always easy to tell who is asking for that information or what they intend to do with it. Sharing information can sometimes bring results you weren’t planning on and don’t want. Those unintended results may be something annoying, such as unwanted spam . Or they could be something very serious, such as an attempt to steal your identity, misuse your good credit, or take your money. Con artists on the Internet would like nothing better than to trick you into giving them your hard-earned money, or revealing personal information that would let them steal your identity. The primary tool that Internet con artists and criminals use is spam— , instant messages, even electronic greeting cards—that you never asked for and don’t want. A particularly sneaky online scam, known as phishing, usually begins with that appears to come from a business you trust or even from within your own organization. That forged message is the “bait” and typically contains a link to an equally phony Web page or pop-up window where you may be asked to reveal personal information such as your credit card number, Social Security number, or bank accounts. That’s the “hook.” Swallow the hook, and you’re sunk, because chances are you will have given some online criminal enough information to steal your identity and use it to gain access to your cash or credit. The other sneaky scam that’s prevalent online are Hoaxes such as the “Nigerian scam” which sends you an with a lie about you “winning the International lottery” or some such gimmick. The spammers then ask you to reveal your bank account number or send money for “processing fees”. Never believe these types of s; they are hoaxes. Technology can help reduce the amount of spam you receive, but nothing can block all spam messages. There are just too many, and the con artists who use spam constantly invent new ways to get around the barriers technology puts in place. But the biggest problem is that the con artists are simply misusing the capabilities that make the Internet such a fantastic resource. A criminal who uses spam to defraud consumers is relying on exactly the same technology as a child who uses to keep in touch with her grandmother. As a result, a big part of staying safe online is paying attention, trusting your instincts, and learning to recognize and avoid spam scams and phishing. John Hamill

8 Leading Threats To PC Security
Viruses/Worms Software programs designed to invade your computer, and copy, damage or delete your data Trojan Horses Viruses that pretend to be programs that help you while destroying your data and damaging your computer Spyware Software that secretly watches and records your online activities or send you endless pop-up ads The leading online threat to your PC is malicious software such as computer viruses, including highly sophisticated viruses such as worms and Trojans, and spyware. Viruses Computer viruses are software programs that are deliberately designed by online attackers to invade your computer, to interfere with its operation, and to copy, corrupt or delete your data. These malicious software programs are called viruses because they are designed not only to infect and damage one computer, but to spread to other computers all across the Internet. Computer viruses are often hidden in what appear to be useful or entertaining programs or attachments, such as computer games, video clips or photos. Many such viruses are spread inadvertently by computer users, who unwittingly pass them along in to friends and colleagues. Worms Worms are more sophisticated viruses that can replicate automatically and send themselves to other computers by first taking control of certain software programs on your PC. Trojan Horses Other viruses, called Trojans in honor of the Trojan horse, actually masquerade as beneficial programs while quietly destroying your data and damaging your system. Spyware As the name implies, spyware is software that is designed to secretly monitor all of the things you do on your computer, and to either report your behavior to the person who designed the program or to take some action based on that information. Spyware may bombard you with pop-up advertising related to the types of Web sites you visit regularly, collect personal information about you, or change the settings on your computer without your knowledge or consent. Spyware can even disable your computer or make it possible for criminals to steal your identity. Fortunately, there are many things you can do to protect your computer from malicious software. John Hamill

9 Be careful – use of the Internet
Please never ever meet an Internet “friend” in person Do not share files, click links or open attachments from strangers Treat others the way you want to be treated Stand up for yourself Respect other people’s property music, movies Set clear rules for Internet use As soon as your children begin to explore the Internet, you need to set some clear rules about when and how they are allowed use it, just as you did when they got their first bicycle. Explain the risks and why it is important to have some family rules to avoid problems and keep the Internet fun for everyone. You may want to consider the following guidelines as the basis for creating a safe online experience for your family: Never go alone to meet an Internet “friend” in person. The people your children meet online may not be who they say they are. If your child insists on a meeting, you should go along and make sure the meeting takes place in a busy public place. Do not share files, open attachments, or click links from strangers You teach your kids not to accept gifts from strangers in the physical So too attachments that comes with an message, link sin an instant message or blog, or music or video files sent by strangers could contain a virus, bad software or a disturbing image. Treat others as you want to be treated This is a basic rule of all human relationships. Give out what you want to get back. Trying to embarrass or intimidate other people with nasty comments is both rude and wrong. Stand up for yourself If someone is disrespectful or tries to bully you, ignore them. If they don’t stop, use software to block them from contacting you or playing the same game. If it is a particularly bad situation, you may report them to the Web site administrator or other authorities. Respect the property of others Just because content is easy to find and enjoy on the Internet doesn’t mean it is free for the taking. Remind your kids that copying and sharing music, games, and other copyrighted downloads can be illegal, especially if the owner hasn’t given permission. Plagiarism and hacking into computers are also illegal.

10 Keep Personal Information Private
Make sure you never share personal information online without permission Let your parents monitor your online activities Please report suspicious activity to parents, Garda or teachers Please use appropriate screen names and addresses Keep personal information private Monitor your children’s online activities Make sure you understand who your kids are sharing information with through instant messaging, blogging sites, and other social networks. Are they friends, friends of friends, or the general public? And keep an eye on what they are sharing. Teach your children to report suspicious activity Encourage your children to tell you immediately if someone starts asking personal questions or wants to arrange to meet them in person. Teach children never to share personal information online without permission Teach your children never to reveal personal information online, unless you give them permission. Personal information includes the facts—such as your child’s real name, age, sex, phone number, address, school, sports team, and favorite places to play—but it also includes photos and feelings. Child predators look for expressions of vulnerability in children, such as sadness, loneliness, and anger. And they know how to use seemingly disconnected information to locate a child. Help children choose appropriate screen names and addresses Help your children choose screen names and addresses that reveal nothing personal and are not suggestive—musicfan or sportsnut instead of john13 or sexysusie.

11 Be On The Lookout For Scams!
There are signs that can alert you to scams Alarmist messages and threats of account closures Promises of big bucks for little effort Deals that sound too good to be true Misspellings and grammatical errors Asking for replies Be on the lookout for signs of a scam: Alarmist messages and threats of account closures. Promises of big bucks for little or no effort. Deals that sound too good to be true. Misspellings and grammatical errors. Don’t share sensitive personal information in an or instant message. If a reputable company appears to ask for personal info, it could be a scam. The best defense against spam and phishing scams is your own good judgment. Be on the lookout for signs of a scam. Any time you receive an alarmist message from a company, or a threat to close your account unless you verify personal information right away, be wary. Legitimate companies don’t do business this way over the Internet. If there is a real problem with one of your accounts, you won’t be asked to reveal personal information online. that promises big money for little or no effort are most likely scams in disguise. Deals that sound too good to be true probably are, just like in the real world. Misspellings and grammatical errors in may also indicate spam that could lead to problems if you respond. Use Anti-Phishing And Anti-Spam Technology Technology tools, including features built in to your internet browser, can help identify and block spam and phishing scams. You should look for these and be sure they are turned on. Also, be alert to flashing red bars or other indicators these tools use to warn of potential threats.

12 Use Strong Passwords Keep passwords private and create ones that are hard to “crack” Use alpha numeric, symbols Never share your passwords with friends or be tricked into giving them away Use strong passwords, keep them secret, You may have important personal information in a variety of electronic and Internet locations, such as online bank and auction accounts, blogs, files on your computer, online shopping sites, etc. One way to protect your information is by using strong passwords to block access to your computer. Most passwords are cracked by a computer program running many letter combinations at high speed, not by someone guessing your password. The best defense is to create a password at least eight characters long that includes a few symbols—such as the dollar sign, pound sign, or exclamation point—as well as letters and numbers. Long, complex passwords are harder to break—even for high-speed computer programs—because the number of possible combinations. Whatever you do, never share your passwords with friends or allow yourself to be tricked into giving them away.

13 Thank you John Hamill


Download ppt "The Internet."

Similar presentations


Ads by Google