unit 1 living in the digital worldchapter 1 lets communicate internet safety

12
Unit 1 Living in the Digital World Chapter 1 Let’s Communicate Internet Safety

Upload: carolyn-carradine

Post on 28-Mar-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet Safety

Page 2: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet SafetyAdd problems that can occur from Internet use, to the diagram

Page 3: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Viruses are programs that can infect a computer without thepermission or knowledge of the user. They can damage thesystem’s settings and memory, generating error messages andcausing the computer to malfunction.

Viruses can get on to your computer through:• visiting certain websites• opening emails• downloading attachments or content from the Internet• using infected portable storage devices such as memorysticks, CDs, DVDs• connecting to an infected hard disk.

Internet Safety

Page 4: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

1

2

3

4

5

6

ExtensionCan you explain the difference between a Worm and a Trojan

Internet SafetyWrite a list of guidelines, with explanations, to help protect a computer from viruses

Page 5: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet SafetyKnowledge

SpywareSpyware is a computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program. It works by collecting information and sending it back to another source. The information collected could include the websites you have been visiting or what you have been downloading. This information is often used for marketing purposes, but can also be used for illegal purposes such as fraud.

CookiesA cookie is a small fi le which stores information related to your Internet activity and then reports this back to the website server. Cookies are used legitimately bywebsite creators to enable websites to be customised for individual users.For example, if you go on to the BBC website, you can customise the homepage, and the next time you visit the site the layout will appear as you have set it.However, cookies can cause problems such as pop-ups being generated ordetails like passwords stored which could be used by hackers.

Page 6: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet SafetyKnowledge cont:

SpamSpam is all unwanted email such as unsolicited commercial email, unsolicitedbulk email and chain letters.PhishingPhishing involves sending a link via an email to a website which looks like a genuine website (e.g. a bank website) but is in fact bogus. The recipient may be tricked into following the link and entering details such as bank passwords or personal information on the website.HackersIt is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer without your permission in order to steal information which they could use for malicious or criminal purposes. Using peer-to-peer (P2P) software could increase the risk of hackers accessing data stored on your computer.Identity theftThis takes place when someone collects personal information about you and uses that information for malicious or criminal purposes. In the past, criminals used to rummage though bins to get information, but now people can access Internet social networking sites where people’s profiles contain personal information, which could prove valuable to the criminals. Identity theft is a growing problem.

Page 7: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet SafetyComputer safety – complete the following to learn ways of protecting yourself against the dangers associated with computer and Internet use

Complete the gap-fill texts by entering the correct words in the gaps.

1 To protect your computer from spyware:

*You need to be aware that free _____________ on the Internet may contain _______________ and you should always consider this before installing such programs on your computer.* Install anti-spyware software; this is sometimes included with _____________ software.

spyware software anti-virus

Page 8: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet Safety

2 To protect your computer from cookies:

*Regularly ______________ your ______________ Internet files. *Change your Internet settings so they do not accept ____________ from all sites.

delete temporarycookies

Page 9: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet Safety

3 To protect your computer from spam:

*Set _____________ to block mail or siphon off known spam emails into a _________ mail inbox. *Alert your email service _____________ to mail which you think is spam. *Do not display your email ____________ where people can copy it and add it to a mailing list.* When signing up to online companies, make sure you ____________ of your details being passed on to third parties.

junk provider opt out address filters

Page 10: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet Safety

4 To protect your computer from hackers:

*Install a ____________ to block unauthorised users. This software or device checks information to make sure it is permitted to pass.* Make sure the software you use is up to date: install ____________ which make the software more secure and prevent access to hackers. *If the computer is in a place used by other people, do not leave it ____________ when you are away from it. *When a computer is used by more than one person, use a ____________ set up with ____________ rights to certain areas and not others.

Guest account firewall logged on fixes access

Page 11: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet Safety

5 To protect your computer from identify theft:

*Have a firewall to block _________ access. *Protect your personal information using _________. *Use a _________ to destroy paper documents with personal details. *Use software that writes over _________ files many times so that the files cannot be recovered.

encryption unauthorised shredder delete

Page 12: Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital World Chapter 1 Let’s Communicate

Internet Safety

Homework task• Describe the possible threats involved in

connecting a computer to the Internet and outline ways of avoiding them.

6 marks