Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Internet safety prezi

No description

Lydia Ferguson

on 10 May 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet safety prezi

What can go wrong through the internet;

-social networking
-uploading harmful or inappropriate videos/images
-disorders due to bullying
-Virus's from downloads
- loss of personal information By Lara, Ali, Lydia and Talia Using social network sites safely... Encryption *Be careful what you give out on your profile
*Don't accept friend requests from people you don't know
*Remember anyone might be able to see your profile
*Always use privacy settings
*Don't let people pressure you into doing something you don't want to do
*Never post abusive things
*Be safe Digital rights and responsibilities Freedom extends to everyone in a digital world - electronic responsibility for actions and deeds

Rights and responsibilities is a key area of internet safety, without it you leave yourself open to many different online attacks from fraud, to online bullying. The three main areas of rights and responsibilities are AUP, Use online material ethically, Report cyberbullies and threats. Social / ethical aspects

Social Rights and Responsibilities has a lot of influence over us, and our daily life. Everything we do in our online lives or even just online we have to think about whether it is within our rights or whether we have the responsibility to do something. For many people, this has been hard because our rights and responsibilities online are very different offline.

•Ethically it is a difficult issue altogether for people to grasp because of how quickly our internet is growing around us. Many of us find it difficult to work out where to ethically draw the line, where they can stop or interrupt what's happening, or to just ignore it and carry on with what they're doing. This is where the problem of where our ethical issues mold into our rights and responsibilities online. CYBERBULLYING

America started a new campaign against cyberbullying. Most of the teenagers spend a lot of time on a mobile phone or instant messenger chatting with friends and uploading photos, videos, and music to websites. You may have online friends whom you’ve never met in person, with whom you play games and exchange messages. Teens’ lives exist in a variety of places such as school hallways, part-time jobs, and friends’ houses. Now many teens also have lives on the Internet. And bullying has followed teens online.
It consists of humiliation/embarrassment, threats and harassing.
It can involve, abusive language, comments and remarks, discriminating images or footage, forged accounts or fake identities, and internet polling (who's hot and who's not!) Biometric scanners Biometric technology uses computerised methods to identify a person by their unique physical or behavioural characteristics.
Biometrics is more personal than a passport photo or Pin, using traits such as fingerprints, face or eye "maps" as key identifying features.
Face recognition is being used by some authorities to scan crowds to identify suspects whose faces have been logged on a database.
However, some of the technology may be easy to fool through ageing or face coverings and there are privacy concerns over surveillance uses.
While iris scanning is fast and accurate, its accuracy can be affected by objects obscuring the eye and may not be suitable for people with cataracts.
Using fingerprints is the oldest method of identification but some readings may be affected by fingerprints that have been damaged through injury and some sensors may not be able to read fingers that are too wet or too dry. A PIN number or personal identification number is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system. Normally, the person is required to provide a non-confidential username, and a confidential PIN to gain access to the system. Despite the name, a PIN number doesn't personally identify a user. A PIN number is typically used to gain access to an ATM machine, or to pay for something with a debit/credit card in a shop. PIN numbers In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. it turns the message/information into an algorithm, that is sent across the internet before de-coding. this becomes a ciphertext.

This is usually done with the use of an encryption key, which specifies how the message is to be encoded. An authorized party, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys.

Computer forensics is a branch of digital forensic science. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information.

Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings.

Evidence from computer forensics investigations is usually made to stay to the same guidelines and practices as other forms of digital evidence. It has been used in a number of high profile cases and is becoming widely accepted as a reliable within the US and European court systems. Copy-Right Laws Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work, to determine who may adapt the work to other forms, who may perform the work, who may financially benefit from it, and other related rights. It is a form of property applicable to any expressible form of an idea or information. Forensic computing Be Careful What You Download. When you download a program or file from an unknown source, you risk loading malicious software programs on your computer. Frauds often hide these programs within seemingly innocent applications. Think twice before you click on a pop-up advertisement or download a "free" game or gadget. How to protect yourself online
Full transcript