4. How strong is your password
Unless your password is strong, the it could be easier for Hackers to guess or
crack.
Use this Microsoft tool to get an idea of password strengths
https://www.microsoft.com/en-gb/security/pc-security/password-
checker.aspx
Use this tool to see how long it would take a hacker / computer to crack your
password
https://howsecureismypassword.net/
Hints “Secure passwords explained by common craft” (video)
http://www.freetech4teachers.com/2011/01/11-resources-for-teaching-
learning-web.html
Read this article “The Ultimate Guide to Passwords”
http://www.pcpro.co.uk/features/372736/the-ultimate-guide-to-passwords
6. Can you erase yourself from the internet
Video: Protecting reputations online in Plain English
http://www.freetech4teachers.com/2011/01/11-resources-for-teaching-
learning-web.html
Read the article “Can you erase yourself from the internet” which was
published in February 2013 and be prepared to answer questions about it
http://www.pcpro.co.uk/features/379786/can-you-erase-yourself-from-the-
internet
Information about how to delete your social networking accounts
http://www.deleteyouraccount.com/
15. Facebook
Regularly check the Privacy help page to make sure you know the
latest changes
https://en-gb.facebook.com/help/445588775451827
Although in Y7 you are officially too young to have a Facebook account it is
worth familiarising yourself with the privacy settings
https://www.facebook.com/video/video.php?v=366944610483
Never leave the settings at their default value
Never give away your ASL (Age, Sex, Location)
Know how to report things that you are unhappy with
https://en-gb.facebook.com/help/181495968648557/
Know how to report things you are unhappy with to CEOP
https://www.ceop.police.uk/Ceop-Report/
18. Facebook – Good / bad practice
Look at the Facebook Timeline and then answer the following:
Create a list of at least 5 SAFE features of the profile
Create a list of at least 5 potentially UNSAFE features of the profile
What types of information is important to keep safe / private online?
What information is appropriate to share publically?
How long does information stay online?
Who could potentially see your information now or in the future?
What are the implications of a user having 1,186 friends
Should you display your birthdate online? Why / why not?
21. Online Gaming
Legitimate games have “click here” buttons on the website
Downloads a RAT (Remote Access Trojan) giving the creator complete access of the
machine
Other online users you chat to may not be who they say they are; do not give
away personal information
25. Not everything is as it seems
Read this article to see how easy it is to pretend to be somebody else on
twitter
http://www.pcpro.co.uk/features/371674/the-twitter-fraudsters
If your account has been hacked, this can lead to your follows being spammed
especially with attempted phishing
Make sure that you are familiar with the “Twitter Safety tips for Teens”
https://support.twitter.com/groups/57-safety-security/topics/241-tips-
guidelines/articles/20169990-safety-tips-for-teens#
Example twitter regrets:
Rihanna: http://goo.gl/GGGnkl
27. Trolling
Who does it and why?
BBC News Magazine: http://www.bbc.co.uk/news/magazine-14898564
Lots of recent publicity about trolls, leading to twitter apologising and adding
a report button
http://news.sky.com/story/1124027/twitter-says-sorry-to-women-over-abuse
32. Malware – how does it get on my computer?
Relies on malicious or hacked websites to download the payload directly onto
your computer
If your browser isn’t up to date then you may get a “drive by” download
which downloads the payload without you knowing as it can exploit gaps in
older browsers
Most common is to convince you to download software that you think is
genuine, for example antivirus as the same site has just told you that you
have a virus! The chances are is that you will be downloading a Trojan
As you have clicked on the download or accept button, your computer
believes that it is genuine
33. Malware – nowhere is safe!
In August 2013 Steam, Konami, and Ubisoft gaming platforms were infected
http://www.tomsguide.com/us/steam-malware-ramnit-trusteer-hacking,news-
17426.html
In February 2011 The BBC 1Extra and 6Music websites had been hack to serve up
Trojans
http://news.softpedia.com/news/Malicious-Code-Injected-into-BBC-6-Music-and-
1Xtra-Websites-184546.shtml
In September 2010 the Radio 3 website was also infected
http://news.softpedia.com/news/Malware-Infection-on-BBC-Radio-3-Website-
155980.shtml
In April 2009 Paul McCartney’s Official website was infected
http://www.infosecurity-us.com/view/1178/mccartney-site-serves-up-zeus-
malware/
34. Malware – what does it do on my computer?
In the past it might pop up a message or shut down your computer
Modern ones monitor keyboard and screen in the hope of capturing banking
details or passwords
Others may make your computer into a zombie operating as part of a botnet,
allowing your computer to controlled remotely without your knowledge (often
used to send Spam)
See the infographic “Anatomy of an online banking heist” to see how your
money can be stolen
35. Malware - Macs
Macs are less prone to malware attacks but as their sales increases so does
the threat.
In 2012 The Flashback Trojan infected over 600,000 Macs
In 2010 The OnionSpy malware hid in a screensaver and spied on network
traffic
In 2009 The MacSweeper scareware demanded $39.99 to clean up fake
infections
36. Malware – what does it do on my phone?
Malware is rare on iOS but becoming more common on Android devices
Might be downloaded as, for example, a ring tone downloader
Could send texts to a premium number giving profits to the creator at the
same time as increasing your bill. (estimated that 44% of Android malware
does this)
37. Malware – how to avoid it
Don’t install software from unknown sources
Keep your internet security and antivirus up to date
39. Phishing
Often promoted via links in emails
When clicked, takes you to a website that looks genuine
You then enter your login credentials as normal but cant login
You have just given your account details to a hacker!
Recently happened to Xbox Live customers which allowed the hackers buy
games and online items
Take the test to see if you can spot the phishing sites
https://www.staysecureonline.com/staying-safe-online/quiz/
Phishing scams in plain English
http://www.freetech4teachers.com/2011/01/11-resources-for-teaching-
learning-web.html#.UiDJzJKfiDv
41. Where can I found out more?
UK Safer Internet Centre:
http://www.saferinternet.org.uk/advice-and-resources
Google tips for staying safe on the web
http://www.google.com/goodtoknow/online-safety/
43. What have you learnt?
Play the Safety Land Game and print out your certificate if successful
http://www.att.com/Common/images/safety/game.html
Do the questions on the “welcome to the web” site
http://www.teachingideas.co.uk/welcome/3711.htm
Internet safety hangman
http://www.quia.com/hm/40647.html
Games @ thinkyouknow.co.uk
http://www.thinkuknow.co.uk/11_16/everything-else/games/
44. Further reading
Ebook: “Own your own space – Keep yourself and your stuff safe Online”
Digital lBook for teens by Linda McCarthy
http://www.microsoft.com/en-us/download/details.aspx?id=1522
Website: “A thin line” created by MTV
http://www.athinline.org/
Website: “Think you know”
http://www.thinkuknow.co.uk/11_16/
Website: Childline
http://www.childline.org.uk/explore/bullying/pages/cyberbullying.aspx
Hinweis der Redaktion
Week 5 title slide
Esafety title slide
This first section is on Passwords
Microsoft tool – demonstrate the tool; ask pupils to try and then get their feedbackHowsecureismypassword – again, demonstrate the tool; ask pupils to try and then get their feedbackWatch the video and discuss strong passwordsArticle – further reading for homework or those that have completed the work (a PDF copy is on SkyDrive)
Discuss with pupils what is a digital footprint?
Video – nice simple introduction to a digital footprint.Article – ask pupils to read this article (probably best for them to read it as a homework BEFORE the lesson as is quite long) and then discussDeleteyouraccount – is a website with information about how to remove accounts
Title slide for cyberbullying
Pretty hard hitting 6mins 31sec video about a secondary school pupil being cyberbulliedAdditional video is in the Yr7 Week 5 SkyDrive folder – 3mins 51 “14 yr old describes her experiences of cyberbullying” (less hard hitting but useful info)
Discuss with pupils exactly what cyberbullying is
Before showing this slide, get the pupils to write down how they could protect themselves from being cyberbulliedThen discuss this slide to see if they have the same ideas
Again, before showing this slide, ask the pupils to write down some of their own tips (maybe discussing with a partner)Get the pupils to share their ideas with you and then see if they are the same as this slide
Before showing this slide, ask the pupils to write down what could happen if they tell a parent or teacher that they are being cyberbulliedGet the pupils to share their ideasThen see if they are the same as this slide.
Discuss with pupils what is a digital footprint?
Tilted slide for Facebook section
Theoretically the pupils shouldn’t event be on Facebook; however, some probably are.Make sure that they are aware of where to find the privacy settings using the links aboveDiscuss why you shouldn’t make private details public (refer back to the fact that once something is online it is their for ever)
1min 43secs video giving a light hearted view as to why you should only accept friends that you know in real life to be your online friends.Discuss the video afterwards
8mins 47 secs video which is more hard hitting showing how easy it is to find personal information on line and hoe predators could use it. (worth watching video yourself before lesson just to make sure it is appropriate to your pupils)Discuss the video afterwards
Friendbook timeline is in the Y7 Week 5 Skydrive folder – ask the pupils to look at it and then answer the questions on this slideUsing the answers discuss what the pupils have written
Discuss with pupils what is a digital footprint?
Discuss how easy it is to chat with other online users and how in a relaxed “game mode” you are more likely to give away personal information such as your age, teams you play for and the school you go toThis information can be used as the start of grooming (you may need to explain what is meant by grooming)
Similar to other slides, it is important that pupils understand that they should only accept real friends as their virtual friends3min 12secs video is quite hard hitting – watch and discuss.
Find out how many people know what twitter is and how many use it in order to work out how appropriate this lesson is.Make sure that pupils are aware that it is a public platform and that tweets can potentially be seen by anyone
1min 47sec video by Miley Cyrus explaining why she left twitter in 2009 (although she still has an account!)
Ask pupils to read the BBC article (if possible before the lesson as it is quite long) – alternatively you could summarise it?Discuss the article to get the pupils viewsThen ask whether they think that people should be arrested and sentenced for trolling or should people be allowed to post what they want (freedom of speech)