Internet Safety / 2013 [Team Work]

15

Transcript of Internet Safety / 2013 [Team Work]

Page 1: Internet Safety / 2013 [Team Work]
Page 2: Internet Safety / 2013 [Team Work]

1. Take appropriate precautions to ensure own safety and privacy.

2. Protect personal information online.

3. Carry out checks on others’ online identity.

4. Describe the forms and features of cyber bullying.

Page 3: Internet Safety / 2013 [Team Work]

0 By Charley

Page 4: Internet Safety / 2013 [Team Work]

Privacy and safety online is a very big role associating with being on the internet. Privacy and safety is something that is not put into place by some people online and can lead to massive range of problems e.g cyber bullying, emails used as a threatening message or harassment, unsafe pop ups and hacks, and can also range to Trojans and viruses coming into your computer alongside a unsafe advertisement and email.

The ranges of unsafe behaviour on a computer, laptop, or tablet can be quite devastating and can also include blackmail. To ensure your security and privacy online you must take precautions and avoid things what you might find harmful and unsafe. Also if you find a website unsafe and you don’t find it trustworthy don’t use it!!!.

Charley

Page 5: Internet Safety / 2013 [Team Work]

The way how you can ensure privacy and safety protection online is by a very easy set of steps by using these steps you are ensuring that you want absolute total control over your pc or laptop and don’t want any exposure when using the internet online. Step 1: Go onto www.filehippo.com and download Microsoft Security Essentials this is a great software to protect yourself in a security-based way and also can help- you scan a malicious website. Step 2: After downloading Microsoft Security Essentials there is another programme which I highly recommend for protection head back onto www.filehippo.com and then download Spyware Blaster after downloading Spyware Blaster this is a excellent programme to use for blocking pop ups and malicious websites. Even though Spyware Blaster is mainly used for Spyware protection it is still handy for scanning blocking and defeating malicious websites and can also block ActiveX pop ups as well. Step 3: The final programme what you should decide to download is CCleaner Ccleaner is another great and trustworthy programme to use for computer protection. This is one of the most trustworthy programmes used for protection against malicious files serious malware and temporary internet files download from www.filehippo.com and you will be sorted!. Step 4: After downloading Microsoft Security Essentials, Spyware Blaster, and Ccleaner if you want more further protection while browsing the internet there are certain options what you can put into place when browsing (e.g if you want to block a website what you may find with full of malware or pop ups) then there are certain internet browsers which can help with this option. If you use Internet Explorer there are certain options which can block malicious websites here are the steps..

Page 6: Internet Safety / 2013 [Team Work]

Intro:

If you use Internet Explorer there are ways and methods to stop yourself worrying about pop-ups advertisements and threats to security. There are very easy ways that can help you and above all else protect you.

Step 1:

To stop pop ups incoming onto your pc first click onto the tolls option and then click onto the

Page 7: Internet Safety / 2013 [Team Work]

0 By Patryk Piras

Page 8: Internet Safety / 2013 [Team Work]

Many people don't shop online because they think that their bank details are not safe. Shopping online is just as safe as ordering by the telephone as long as you follow these rules.

0 - Make sure that the company that your ordering from has a secure shopping server.

0 - Make sure that the website your using starts with “https:”

0 - Make sure that you don't send any bank details to anyone in an email.

0 - If you do receive an official looking email that asks you to send your financial details, you should never replay because you could become a victim of identity fraud.

0 - If its a company that you have never heard of before , search their site for any contact numbers and postal addresses. They would not mid you doing a quick call asking few questions.

Page 9: Internet Safety / 2013 [Team Work]

Take steps to protect your online privacy

Looking after your privacy online will help protect your personal information from abuse.

0 Good computer security includes installing anti-spyware, anti-virus.

0 Keep these security tools up to date.

0 Make sure you are visiting secure web sites before handing over personal information such as banking and credit card details.

Page 10: Internet Safety / 2013 [Team Work]

When creating passwords there are some rules that you should follow: Do

0 Make it at least eight characters in length.

0 Combine letters, numbers and upper and lower case letters.

0 Change your password regularly.

Don’t

0 Use pet names, birthdates, family or friends names.

0 Share passwords with others, even with friends.

0 Store them on the device or write them down.

Page 11: Internet Safety / 2013 [Team Work]

0 By Jonathan Callcott 0 Laura Nicolai

Page 12: Internet Safety / 2013 [Team Work]

0 Cyber bullying is where people use computers to abuse or harm someone else.

0 People use fake accounts to attack vulnerable individuals to send offensive comments/content.

0 People harass someone due to an event.

0 People use social networking site to target people.

Page 13: Internet Safety / 2013 [Team Work]

When using the internet you should be very careful of who you chat and become friends to because the internet can be used 24/7 and people become more vulnerable to fake accounts and people can send messages to other people.

Page 14: Internet Safety / 2013 [Team Work]

Cyber stalking > Is where people make other people scared and try to harm them and threaten someone's privacy

Harassment > Is w>hen someone targets an individual or group by sending offensive messages/content

Sending Spyware and/or Hacking Programs > Using technology to jeopardize or gain unauthorized access to someone else’s computer.

Sending Pictures > Sending, posting, or altering compromising pictures of others whether the images were taken with or without consent.

http://bullyingproject.com/curriculum/

Page 15: Internet Safety / 2013 [Team Work]

0 Can effect peoples confidence

0 Can affect peoples lives

0 Can lead to suicides and suicide thoughts

0 People will stress over the event

0 Can affect peoples attendance and punctuation