Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Internet safety

Y10 lesson 19/11/12
by

Richard Cambridge

on 25 April 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet safety

Lesson objectives
Internet safety
Starter
What problems have you had when using the internet? Produce a list of problems (on Word) stating problems you may have had when using the internet.
Internet problems
Task
Log onto Edmodo and complete the quiz on Internet safety
The words needed for each question (not necessarily in this order are:
1: spyware software anti-virus
2: cookies delete temporary
3: junk provider opt out address filters
4: guest account firewall logged on fixes access
5: encryption unauthorised shredder deleted

Your answers must be spelled correctly to get the question correct
Knowledge Check
1) Ruby purchased an item online. When she checked her bank statement she noticed that she had been charged for something she did not buy. How could this have happened? What should she do?

2) Ruby has installed free software on her computer. She notices that her computer has slowed down. What steps should Ruby take?

3)Ruby keeps receiving spam mail. What should she do?
Examples may include Viruses, Pop ups or Spam emails
Viruses are programs that can infect a computer without the permission or knowledge of the user. They can damage the system’s settings and memory, generating error messages and causing the computer to malfunction.
Viruses can get on to your computer through:
• visiting certain websites
• opening emails
• downloading attachments or content from the Internet
• using infected portable storage devices such as memory sticks, CDs, DVDs
• connecting to an infected hard disk.
Spyware is a computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program. It works by collecting information and sending it back to another source. The information collected could include the websites you have been visiting or what you have been downloading. This information is often used for marketing purposes, but can also be used for illegal purposes such as fraud.
A cookie is a small file which stores information related to your Internet activity and then reports this back to the website server.
Cookies are used legitimately by website creators to enable websites to be customised for individual users.
For example, if you go on to the BBC website, you can customise the homepage, and the next time you visit the site the layout will appear as you have set it.
However, cookies can cause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.
Phishing involves sending a link via an email to a website which looks like a genuine website (e.g. a bank website) but is in fact bogus. The recipient may be tricked into following the link and entering details such as bank passwords or personal information on the website
It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer without your permission in order to steal information which they could use for malicious or criminal purposes.
Using peer-to-peer (P2P) software such as music sharing sites could increase the risk of hackersaccessing data stored on your computer.
PHISHING
COOKIES
SPYWARE
VIRUSES
HACKERS
IDENTITY THEFT
This takes place when someone collects personal information about you and uses that information for malicious or criminal purposes. In the past, criminals used to rummage though bins to get information, but now people can access Internet social networking sites where people’s profifiles contain personal information, which could prove valuable to the criminals. Identity theft is a growing problem.
Answer the following questions at the end of worksheet 1.7
1) To know the risks associated with internet use and some of the ways you can protect yourself and your computers

2) To know how to protect yourself and your computers from Internet-related problems and write a list of guidelines for Internet users

3) Be able to recommend types of software to install to protect computers from Internet-related problems
Extension
Exam question
A website that Gia visits creates a cookie on her computer.

i) What is a cookie? (1)

ii) State what a cookie does. (1)

iii) Give one example of how the cookie would benefit Gia. (1)
What is a cookie?
A cookie is a text file
Answer the following questions, again at the end of the Word document
State what a cookie does.
A cookie stores information about what Gia does or orders on the website
Give one example of how the cookie would benefit Gia
It would benefit Gia by making the website personalised for her
Full transcript