Presentation is loading. Please wait.

Presentation is loading. Please wait.

YEAR 9 ONLINE SAFETY AND SECURITY

Similar presentations


Presentation on theme: "YEAR 9 ONLINE SAFETY AND SECURITY"— Presentation transcript:

1 YEAR 9 ONLINE SAFETY AND SECURITY

2 Viruses Cookies Social networking Worms & trojans Grooming
Phishing Viruses Online safety Cookies Worms & trojans Cyberbullying Social networking Grooming

3 1 – Staying safe online!

4 While you are logging on, think about….
How would you explain the following terms to your parents…. Cyber bullying Grooming Sexting

5 Lesson objectives In today’s lesson you will be learning about:
the risks associated with social media use and some of the ways you can protect yourselves. What to do if you feel threatened

6 Starter – what is the definition of these key words?
Cyberbullying Grooming Predator Sexting Digital footprint GPS tagging Remember the sessions from last half term on sexting by Katie and Rob? This term the session will be on grooming.

7 Staying Safe on the Internet
In today’s lesson : All of you will Most of you will Some of you will

8 Think – Pair – Share: What would you do?
You have been chatting with another person you don’t know in person and they want to meet up? You are on a social networking site and have seen a rude picture? You see a picture of someone you don’t get on with, there is the chance to write something? You notice that a friend has not protected their website, giving anyone access to their profile? Your friend has been chatting to a boy/girl for a while and does not believe who they are? Your friend uses IM and a webcam but there is one ‘friend’ who never turns on their webcam?

9 Staying Safe on the Internet
You shouldn’t really meet them at all. Don’t arrange to meet up as soon as you meet them online – get to know them better. If you do decide to meet up, go with a parent or carer and make sure you choose a public meeting place. b) Report the picture to the website producer. There will usually be a link to report abuse; alternatively, send them a message with the page link on it. c) Tempting as it may be, it’s best not to leave any comments. If you have nothing nice to say about the person, then don’t say anything. Social networking allows lots of people to get involved (friends and friends of friends), so writing a nasty comment could get out of control. d) You let them know that their profile is unprotected and that anyone can see their information, along with yours too. Ask them to set the profile so it is only visible to friends. If they refuse, it might be best to take this person off your friends list, as your own security is being compromised. e) If the girl has a webcam, ask her to turn it on as it is a good way of seeing if the person is who they claim to be. She might refuse if they have just met online, but if your friend has been chatting to her for a while, and she still declines, it might be best not to continue talking as your friend has no way of knowing if she is genuine. f) Ask him to turn the webcam on as it is a good way of seeing if the person is who they say they are. If he continues to refuse, it is probably better that your friend stops chatting to him as there is no way of knowing if he is genuine.

10 Safety advice What this means in practice Make sure you have a password that no one can guess. Use a mixture of numbers, uppercase and lowercase letters, and symbols. It should be a minimum of 8 characters. On social networking sites only add people that you know. Never accept requests from people you don’t know. Don’t send pictures of yourself to strangers because you don’t where they will end up. Until you know you can trust someone don’t share personal details or pictures of yourself. If someone writes something that makes you feel uncomfortable, take action. Save the conversation and block people you don’t trust. Tell an adult. Don’t become involved in cyberbullying. Never write anything that you would not say to a person’s face. Never arrange to meet a person you’ve met on the Internet. If someone you’ve met on the Internet asks if you can meet up, say no. Use a profile picture that doesn’t show you or shows you from a distance. Your profile picture is available for everyone to see. Change your account settings so that your profile and personal details are not available to everyone. This prevents strangers from learning too much about you but allows friends to see your profile. Ask your friends’ permission before adding their photos to a social networking site. Any photos you upload can be seen or copied by anyone. Watermark your photos. This will deter people from copying them. Never put up a rude or offensive picture or a picture showing any form of abuse. This could be seen as cyberbullying and at worst it could be illegal. Don’t put personal information online but if you do keep it brief. Your profile could be hacked into and the information could fall into the wrong hands.

11 If you feel threatened online, report it
If you feel threatened online, report it! There’s a link on many social networking sites, search for Click CEOP or use the link on our Moodle.

12 First to a Million http://www.thinkuknow.co.uk/first2amillion/
Watch the video and when you are asked, choose which way you’d like it to go next. Watch the videos from each character to find out more about their point of view

13 Stay safe online Produce a folding leaflet, a poster, a prezi or a movie clip for young people/teenagers highlighting: the positive side of using social networking the dangers of communicating online using social networking tips for staying safe online and what they can do to avoid these dangers

14 Useful links

15 2 – Staying safe online!

16 While you are logging on, think about these facts….
The average 12- to 15-year-old has never met one in four of their "friends" on social networking websites such as Facebook 12- to 15-year-olds on average spend 17 hours a week on the internet Texting is most popular among 12- to 15- year-olds, who send an average of almost 200 texts a week, girls send the most! Almost two thirds of 12- to 15-year-olds now own a smart phone

17 Lesson objectives: In this lesson you will:-
Continue and complete your work from last lesson to demonstrate your understanding of social networking safety

18 Starter – posting online vs freedom of speech
Read this article and be ready to share your thoughts about whether comments posted online should be “policed” and prosecuted if offensive/abusive/false etc Newsbeat guide to social networks and freedom of speech

19 3 - Someone’s watching you online!

20 What makes a secure password?
While you are logging on, think about…. What makes a secure password? What advice would you give someone about what a strong password should or should not include?

21 Lesson objectives In today’s lesson you will:
To understand threats to online security and how to avoid them.

22 Password advice Do not choose obvious things such as your dog’s name or your favourite football team or password Try to use nonsense words rather than something straight out of the dictionary, or create a nonsense word using words/numbers which mean something to you Try to remember your password, do not write it down Make your password at least 6 characters long Use a mix of letters, numbers, symbols and upper and lower case letters Do not use the same password for everything Keep your password a secret – not even your best friend should know it.

23 Captcha tests As an added level of security, some websites will get you to take a “CAPTCHA” test.

24 What is a CAPTCHA test? A CAPTCHA is a short online typing test that is easy for humans to pass but difficult for robotic software programs. The purpose of a CAPTCHA is to discourage hackers and spammers from using auto-filling software programs at that web page. What Does CAPTCHA Stand For? It stands for "Completely Automated Public Turing test to tell Computers and Humans Apart". How does it work? CAPTCHAs work by asking you to type a phrase that a robot would be hard-pressed to read. Commonly, these CAPTCHA phrases are .gif pictures of scrambled words, but can also be .mp3 voice recordings. These pictures and recordings are very hard for conventional software programs to understand, and robots are usually unable to type the phrase in response to the picture or recording. Why do we need them? This should prevent automated programs from: Swaying an online poll by robotically submitting hundreds of false responses. Accessing someone's online account by repeatedly attempting different passwords. Signing up for hundreds of free accounts. Buying an excessive number of concert tickets for a popular artist/band so that someone can then sell these tickets on ebay for an extortionate amount of money.

25 Cookies, Adware and Spyware

26 Key vocabulary adware cookie spyware Phishing Identity theft

27 Cookies A cookie is a very simple text file that gets downloaded onto your PC when you visit a website. They generally contain two bits of information: a site name and a unique user ID Once the cookie is on your computer, the site "knows" that you have been there before and can then use that knowledge to tailor the experience that you have eg make suggestions about things you might like to buy. The vast majority of commercial websites -- be they major online publishers, banks or ecommerce sites etc -- will use them. Cookies are used for many different functions including auto-filling forms, counting visitors, storing shopping basket items, personalising content, targeting advertising, recording user preferences and for authentication and security.

28 The EU Cookie Law What is the so-called "Cookie Law"? The "Cookie Law" stems from a change to a law from November 2009 and aims to safeguard your privacy online and protect you from unwanted marketing. Cookies can be used to build up a profile of where you have been and how you have behaved online. The law aims to make sure that any company seeking to collect information about a web user must ask for their consent first. You used to have to opt out of cookies being placed on your computer. Now you have to opt in to all "non-essential" cookies. These are any cookies which are used for analytical purposes eg to count the number of visitors to a website and cookies used to recognise the user when they return to a website so they receive a tailored greeting. Cookies which are essential for example those used in an online checkout, can still be placed on your computer without your consent. Who needs to comply with it? The law applies to all member states of the European Union. Websites outside of the EU must comply with the law if they are targeting people within member states. So a website based in the USA that sells to people in the UK will also have to comply. How do sites comply with the Cookie Law from 26 May? Technically, from 26 May 2012, sites must gain the consent of their web users for placing non-essential cookies on their computers. This is why you keep getting asked about cookies when you go onto a website. It might involve clicking an icon, dismissing a banner, sending an or subscribing to a service. What happens if sites don't comply? Technically, the maximum penalty for not complying is £500,000 for cases where there is a deliberate breach of the law that causes substantial distress, and some lesser penalties, but this will be a very hard law to enforce.

29 Adware Adware is any software that automatically puts advertisements on websites. These could be pop up adverts or a completely separate webpage could pop up. The objective of an advert is to draw a customer in and to get them to buy the particular item that is on display. Unfortunately, some applications that contain adware track your Internet surfing habits in order to put up ads related to you. Have you ever noticed adverts at the side of other websites which relate to searches you’ve been doing recently? When the adware becomes intrusive like this, then we move it into the spyware category and it then becomes something you should avoid for privacy and security reasons.

30 Adware

31 Spyware Spyware is software downloaded by a user, often hidden inside a program they download for another purpose. The Spyware can record the websites they access and some versions record keystrokes such as passwords when a user accesses secure online websites such as online banking. The log on details are then passed by the computer over the internet to the criminals for fraudulent use.

32 Spyware

33 Spam What is spam? Spam s are s sent to you without consent. It is that you don’t want and didn’t ask for, and its content can cause embarrassment and distress. The sender generally doesn’t target recipients personally. The same spam can be sent to millions of people at the same time and the addresses can often be guessed. The law says that organisations must only send marketing s to individuals if you have agreed to receive them. Many spam s come from outside the UK. What can I do if I’m getting unwanted s? If you receive marketing by from an identifiable UK company that you don’t want, you should first use the ‘unsubscribe’ link or the organisation to ask them to stop (remembering to keep a copy of any correspondence). What can I do to reduce the amount of spam s I receive? Be careful who you give your address to. Consider having separate personal and business addresses. Choose an address which is difficult to guess. Don’t advertise your address, for example by putting it on the internet. Check privacy policies and marketing opt-outs carefully. Use them to tell the organisation not to send you s. Avoid responding to spam s. Replying indicates that your address is live. Don’t click on the adverts in spam s. Use a spam filter on your computer. These are programs which work with your package to sift through new s, separating spam s from wanted s and blocking them. Spam s sometimes contain viruses so you should also consider using anti-virus software to protect against virus programs that can destroy computer files and are increasingly being exploited by spammers.

34 Cookies, adware and spyware summary
Give a definition of a cookie (not the chocolate chip kind)? Why do online retailers use cookies? Explain the recent European law about the use of cookies on websites. What are the benefits and drawbacks of cookies for customers? What is a third party cookie and why it can be a nuisance? How can you delete cookies from your computer? (a) What is adware? (b) What does it do? (a) What is spyware? (b) What does it do? (c)Why is it a problem? How can you protect yourself from spyware? (a) What is spam? (b) How can you avoid receiving it?

35 http://www. innovatemyschool

36 4 - Gone phishing….with your identity!

37 Would you click the link in these emails?
While you are logging on, think about…. Would you click the link in these s? xxx

38 Lesson objectives In today’s lesson you will:
Understand the online security problem of phishing Understand the serious issue of identity theft

39 Key vocabulary Phishing Identity theft Fraud Smishing Scams

40 Phishing videos – American!

41 Phishing The act of sending an to a user falsely claiming to be a legitimate business (eg ebay, amazon, a bank) in an attempt to scam the user into surrendering private information that will be used for identity theft. The directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organisation already has. The Web site, however, is bogus and set up only to steal the user’s information Because bank security is so good, fraudsters rely on getting information directly from customers. Examples of phishing s. What should make a customer suspicious?

42 Identity Theft What is all the fuss about? What is identity theft?
It is the misuse of the identity (e.g. name, date of birth, current or previous addresses) of another person without their knowledge or consent. It occurs when sufficient information about an identity is obtained so that the fraudster can carry out identity fraud, the victim could be alive or dead. Can cost the person concerned a lot of money, could affect their chances of getting things like credit/mortgage, could falsely give them a criminal record, could stop them getting a job etc Identity Fraud This is the use of a false identity. Can be used to do things that are usually legal but not if you are using a false identity! Eg to open accounts, (fraudulently) obtain social security benefits, (in the case of individuals), apply for credit and/or obtain goods and services. Can also be used to carry out illegal activities eg to obtain goods or services by deception What is all the fuss about? What is identity theft? (

43 How does identity theft happen?
Identity Stolen when a person goes through your bins looking for bills or other papers with your personal information on it. SHRED your waste! Identity Stolen via Phishing Identity Stolen via Skimming - this occurs when someone steals your credit card or debit card number through a special device when processing your payment. Identity Stolen via Change of Address - your address for billing statements or credit card accounts is changed by the identity thief to divert your billing statements to another address. Identity Theft via Pretexting - occurs when false pretences are used by the thief to obtain personal information through telephone companies, financial institutions, surveys, or other sources. Identity Theft via Stealing - Your identity may be stolen by means of old fashioned stealing.

44 Credit Card Fraud and Identity Theft The credit card fraud which has increased the most is where the card is not actually with the person making the purchase. They have obtained all the details of the card and its owner in order to make the purchase without the card.

45 Online card fraud The vast majority of credit card fraud involves the use of card details that have been fraudulently obtained through methods such as skimming – for example where your PIN/other details are collected electronically while you use your card in an ATM, data hacking, or through unsolicited s or telephone calls. The card details are then used to undertake fraudulent “card-not-present” transactions.

46 How to avoid credit card fraud
Keep your credit cards safe and never let your card out of your sight if paying in a restaurant or shop. Do not use your card if anything suspicious is attached to an ATM/self serve payment machine Shred anything with your credit card number on it. Don't sign blank credit card receipts. Avoid giving out your credit card information to anyone who calls you requesting it for a purpose you don’t know anything about. Be safe with your credit card online - Don't click on links from anyone pretending to be your bank, credit card company, or other business who uses your personal information, even if the looks legitimate. This is phishing! To be sure a website is secure before making a purchase, look for a lock in the lower right corner of your internet browser. Report lost or stolen credit cards immediately. Review your billing statements each month.

47 What to do now.. Log onto Moodle
User name: ictmoodle password: ictmoodle Go to ICT > Year 9 > Health, safety and security in ICT Go to the Online safety and security section Click the link to the resources Open and save to your area the 2 worksheets below, and then complete them and print: scams Identity theft

48 How to avoid credit card fraud

49 5 – Protect your computer

50 What links these images?
While you are logging on, think about…. What links these images?

51 Lesson objectives In today’s lesson you will:
to understand the security risks to your computer and how to avoid them.

52 Computer Worms http://www.tech-faq.com/computer-worm.html

53 Computer viruses

54 Trojans

55 How to protect your computer
Keep it updated so it can deal with latest viruses Make sure you actually RUN it, don’t just have it installed! Virus checker Download and install any software patches or other programs that will help you eliminate the virus. Software updates Use extra caution when you receive attachments that end in the commonly used extensions .doc, .exe, .com, .xls or .ppt. Never open attachments that end in .vbs or .js, since a typical user would never have a reason to open these files. attachments Intruders are constantly scanning home user systems for known vulnerabilities. It’s not sufficient to install a firewall and then ignore all other security measures. Firewall

56 What to do now.. Log onto Moodle
User name: ictmoodle password: ictmoodle Go to ICT > Year 9 > Health, safety and security in ICT Go to the Online safety and security section Click the link to the resources Open and save to your area the 2 worksheets below, then complete them and print: Viruses Trojans, worms and hoaxes Protecting your computer

57 5 & 6 – Online security Presentation

58 While you are logging on, think about….
It’s important to properly delete any personal information before you sell or dispose of your computer/tablet/phone so that it cannot be accessed by anybody else either by mistake or for malicious purposes. How can you do this? 58

59 How to delete your data Physical destruction - This involves physically destroying the media so that it can no longer be used. Once destroyed, data on the media will not be recoverable except using specialist, expensive equipment. Secure deletion software - This involves using software to overwrite data one or more times. Simple and cheap. The media can be reused once the overwriting is complete. Restore to factory settings - Many devices offer a function to ‘Restore to factory settings’. This will return the device to the state in which you bought it. You should check with the device manufacturer to determine if this is sufficiently secure Send to a specialist - There are many organisations which will securely delete data from a range of devices and types of media. These organisations will destroy or overwrite your data on your device. Make sure they are a trustworthy company! Formatting - Formatting media recreates the data structures and file system and deletes the data, but re-formatting may mean that data can still be obtained using freely available software programmes.

60 While you are logging on, think about….
What is phishing? The act of catching fish When a computer virus captures your personal details and Internet passwords and sends these to fraudsters The process of attempting to acquire confidential information by sending out s or other kinds of messages that direct you to bogus websites or phone lines When a fraudster steals personal documents, such as cards, chequebooks or passports How can you help minimise the risk of lost or stolen card fraud? Report any lost or stolen cards immediately Only carry the cards you need Avoid placing cards in your pockets, where they can easily fall out All of the above When does identity theft occur? When you order a new card and it's stolen in transit When fraudsters use your personal information to take out bank accounts, financial products, state benefits and documents in your name When fraudsters use your credit or debit card details to make purchases over the Internet or by phone, fax or mail When you pretend to be someone else for a while, such as at a fancy dress party How can you protect yourself from telephony fraud on your mobile? Install the latest anti-virus software Keep your mobile software up to date Set up a password or PIN on your mobile Why do banks deactivate your access to Online Banking if three unsuccessful attempts are made to log in using your details? To make sure that you change your login details regularly To drive you crazy when you forget your login details, so that you don't do it again No specific reason - it's just the way our systems are set up To stop fraudsters making repeated attempts to get into your account(s) How can you protect yourself from identity theft? You can't - it's impossible to keep your personal details safe nowadays Keep your cards, passwords, PINs, documents and personal information secure Get everything sent to you by , since stolen mail is one of the prime causes of identity theft Always respond to unsolicited s that ask you to verify personal details, such as PINs and Online Banking passwords

61 How can you help minimise the risk of lost or stolen card fraud?
While you are logging on, answer these questions and be ready to share your answers What is phishing? How can you help minimise the risk of lost or stolen card fraud? When does identity theft occur? How can you protect yourself from telephony fraud on your mobile? Why do banks deactivate your access to Online Banking if three unsuccessful attempts are made to log in using your details? How can you protect yourself from identity theft?

62 Lesson objectives In today’s lesson you will:
to demonstrate your understanding of the security risks to your computer and how to avoid them in a presentation, video, prezi or other document.

63 Stay secure online Many older people have started to use the internet to shop, socialise and bank online. However they are vulnerable to identity theft and other online security problems. Can you help explain the risks and how to avoid them of the security issues we’ve been discussing? Produce a presentation, prezi, movie clip or other document aimed at the older generation (60+) to cover the points on the next slide.

64 Stay secure online Give some advice on choosing a secure password
Explain what a CAPTCHA test is and why we need them. Explain the meaning of phishing Explain how to deal with a phishing and what the consequences could be Explain what identity theft is Explain how can identity theft take place Explain how to avoid the risks Explain how to avoid credit card fraud explain what is meant by a computer virus, a Trojan and a worm and how they can cause havoc. Give 4 pieces of advice to protect your computer and your important data Explain how data should be deleted before selling or getting rid of an old computer/phone etc You could also add some extra information from the work you did on adware/spyware/cookies etc

65 While you are logging on, think about….
xxx

66 Lesson objectives In today’s lesson you will be:

67


Download ppt "YEAR 9 ONLINE SAFETY AND SECURITY"

Similar presentations


Ads by Google