SlideShare ist ein Scribd-Unternehmen logo
1 von 44
WEEKS 5-8
LESSON 1
PASSWORDS
How strong is your password
 Unless your password is strong, the it could be easier for Hackers to guess or
crack.
 Use this Microsoft tool to get an idea of password strengths
https://www.microsoft.com/en-gb/security/pc-security/password-
checker.aspx
 Use this tool to see how long it would take a hacker / computer to crack your
password
https://howsecureismypassword.net/
 Hints “Secure passwords explained by common craft” (video)
http://www.freetech4teachers.com/2011/01/11-resources-for-teaching-
learning-web.html
 Read this article “The Ultimate Guide to Passwords”
http://www.pcpro.co.uk/features/372736/the-ultimate-guide-to-passwords
DIGITAL
FOOTPRINT
Can you erase yourself from the internet
 Video: Protecting reputations online in Plain English
http://www.freetech4teachers.com/2011/01/11-resources-for-teaching-
learning-web.html
 Read the article “Can you erase yourself from the internet” which was
published in February 2013 and be prepared to answer questions about it
http://www.pcpro.co.uk/features/379786/can-you-erase-yourself-from-the-
internet
 Information about how to delete your social networking accounts
http://www.deleteyouraccount.com/
CYBERBULLYING
Cyberbullying
Protect yourself from cyberbullying
Tips for dealing with cyberbullying
What your parents / teachers can do …..
Lesson 2
Facebook
 Regularly check the Privacy help page to make sure you know the
latest changes
https://en-gb.facebook.com/help/445588775451827
 Although in Y7 you are officially too young to have a Facebook account it is
worth familiarising yourself with the privacy settings
https://www.facebook.com/video/video.php?v=366944610483
 Never leave the settings at their default value
 Never give away your ASL (Age, Sex, Location)
 Know how to report things that you are unhappy with
https://en-gb.facebook.com/help/181495968648557/
 Know how to report things you are unhappy with to CEOP
https://www.ceop.police.uk/Ceop-Report/
Facebook
 Watch Little Red Riding Mood learn about safe Facebook Surfing
Facebook – who sees your information?
Facebook – Good / bad practice
 Look at the Facebook Timeline and then answer the following:
 Create a list of at least 5 SAFE features of the profile
 Create a list of at least 5 potentially UNSAFE features of the profile
 What types of information is important to keep safe / private online?
 What information is appropriate to share publically?
 How long does information stay online?
 Who could potentially see your information now or in the future?
 What are the implications of a user having 1,186 friends
 Should you display your birthdate online? Why / why not?
WEEK 6
Lesson 3
ONLINE GAMING
Online Gaming
 Legitimate games have “click here” buttons on the website
 Downloads a RAT (Remote Access Trojan) giving the creator complete access of the
machine
 Other online users you chat to may not be who they say they are; do not give
away personal information
INSTANT
MESSAGING
Instant Messaging
 Only use instant messaging for people you personally know.
 Still be careful how much personal information you give away
TWITTER
Not everything is as it seems
 Read this article to see how easy it is to pretend to be somebody else on
twitter
http://www.pcpro.co.uk/features/371674/the-twitter-fraudsters
 If your account has been hacked, this can lead to your follows being spammed
especially with attempted phishing
 Make sure that you are familiar with the “Twitter Safety tips for Teens”
https://support.twitter.com/groups/57-safety-security/topics/241-tips-
guidelines/articles/20169990-safety-tips-for-teens#
 Example twitter regrets:
Rihanna: http://goo.gl/GGGnkl
Miley Cyrus left and came back!
Trolling
 Who does it and why?
BBC News Magazine: http://www.bbc.co.uk/news/magazine-14898564
 Lots of recent publicity about trolls, leading to twitter apologising and adding
a report button
http://news.sky.com/story/1124027/twitter-says-sorry-to-women-over-abuse
WEEK 6-7
Lesson 4-6
Mini Project
You have three lessons to write,
choreograph, and record a rap for
other Y7 pupils about online safety /
dangers
WEEK 8
Lesson 7
MALWARE
Malware – how does it get on my computer?
 Relies on malicious or hacked websites to download the payload directly onto
your computer
 If your browser isn’t up to date then you may get a “drive by” download
which downloads the payload without you knowing as it can exploit gaps in
older browsers
 Most common is to convince you to download software that you think is
genuine, for example antivirus as the same site has just told you that you
have a virus! The chances are is that you will be downloading a Trojan
As you have clicked on the download or accept button, your computer
believes that it is genuine
Malware – nowhere is safe!
 In August 2013 Steam, Konami, and Ubisoft gaming platforms were infected
http://www.tomsguide.com/us/steam-malware-ramnit-trusteer-hacking,news-
17426.html
 In February 2011 The BBC 1Extra and 6Music websites had been hack to serve up
Trojans
http://news.softpedia.com/news/Malicious-Code-Injected-into-BBC-6-Music-and-
1Xtra-Websites-184546.shtml
 In September 2010 the Radio 3 website was also infected
http://news.softpedia.com/news/Malware-Infection-on-BBC-Radio-3-Website-
155980.shtml
 In April 2009 Paul McCartney’s Official website was infected
http://www.infosecurity-us.com/view/1178/mccartney-site-serves-up-zeus-
malware/
Malware – what does it do on my computer?
 In the past it might pop up a message or shut down your computer
 Modern ones monitor keyboard and screen in the hope of capturing banking
details or passwords
 Others may make your computer into a zombie operating as part of a botnet,
allowing your computer to controlled remotely without your knowledge (often
used to send Spam)
 See the infographic “Anatomy of an online banking heist” to see how your
money can be stolen
Malware - Macs
 Macs are less prone to malware attacks but as their sales increases so does
the threat.
 In 2012 The Flashback Trojan infected over 600,000 Macs
 In 2010 The OnionSpy malware hid in a screensaver and spied on network
traffic
 In 2009 The MacSweeper scareware demanded $39.99 to clean up fake
infections
Malware – what does it do on my phone?
 Malware is rare on iOS but becoming more common on Android devices
 Might be downloaded as, for example, a ring tone downloader
 Could send texts to a premium number giving profits to the creator at the
same time as increasing your bill. (estimated that 44% of Android malware
does this)
Malware – how to avoid it
 Don’t install software from unknown sources
 Keep your internet security and antivirus up to date
PHISHING
Phishing
 Often promoted via links in emails
 When clicked, takes you to a website that looks genuine
 You then enter your login credentials as normal but cant login
 You have just given your account details to a hacker!
 Recently happened to Xbox Live customers which allowed the hackers buy
games and online items
 Take the test to see if you can spot the phishing sites
https://www.staysecureonline.com/staying-safe-online/quiz/
 Phishing scams in plain English
http://www.freetech4teachers.com/2011/01/11-resources-for-teaching-
learning-web.html#.UiDJzJKfiDv
WHAT HAVE
YOU LEARNT?
Where can I found out more?
 UK Safer Internet Centre:
http://www.saferinternet.org.uk/advice-and-resources
 Google tips for staying safe on the web
http://www.google.com/goodtoknow/online-safety/
FIND OUT MORE
ABOUT ESAFETY
What have you learnt?
 Play the Safety Land Game and print out your certificate if successful
http://www.att.com/Common/images/safety/game.html
 Do the questions on the “welcome to the web” site
http://www.teachingideas.co.uk/welcome/3711.htm
 Internet safety hangman
http://www.quia.com/hm/40647.html
 Games @ thinkyouknow.co.uk
http://www.thinkuknow.co.uk/11_16/everything-else/games/
Further reading
 Ebook: “Own your own space – Keep yourself and your stuff safe Online”
Digital lBook for teens by Linda McCarthy
http://www.microsoft.com/en-us/download/details.aspx?id=1522
 Website: “A thin line” created by MTV
http://www.athinline.org/
 Website: “Think you know”
http://www.thinkuknow.co.uk/11_16/
 Website: Childline
http://www.childline.org.uk/explore/bullying/pages/cyberbullying.aspx

Weitere ähnliche Inhalte

Was ist angesagt?

Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsErnest Staats
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusABHAY PATHAK
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyoneAshesh R
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security snobbishmishap958
 
B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network securityDamon Cortesi
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Tannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossTannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossmarketingsocialmedia09
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!EMBplc.com
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 

Was ist angesagt? (19)

Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Internet for everyone
Internet for everyoneInternet for everyone
Internet for everyone
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
B-sides Las Vegas - social network security
B-sides Las Vegas - social network securityB-sides Las Vegas - social network security
B-sides Las Vegas - social network security
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Tannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home lossTannehill, Dolphins deal Bears third home loss
Tannehill, Dolphins deal Bears third home loss
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Spyware
SpywareSpyware
Spyware
 
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
101 Internet Security Tips Slideshow - Know How To Protect Your Computer Online!
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Spyware
SpywareSpyware
Spyware
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware
SpywareSpyware
Spyware
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
News Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYDNews Bytes - June 2015 - Null HYD
News Bytes - June 2015 - Null HYD
 

Ähnlich wie Year 7 - Week 5 esafety

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks Khalil Jubran
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2JeffUrgelles
 

Ähnlich wie Year 7 - Week 5 esafety (20)

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Internet security
Internet securityInternet security
Internet security
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
What is malware
What is malwareWhat is malware
What is malware
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Presentation for class
Presentation for classPresentation for class
Presentation for class
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 

Kürzlich hochgeladen

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Kürzlich hochgeladen (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

Year 7 - Week 5 esafety

  • 4. How strong is your password  Unless your password is strong, the it could be easier for Hackers to guess or crack.  Use this Microsoft tool to get an idea of password strengths https://www.microsoft.com/en-gb/security/pc-security/password- checker.aspx  Use this tool to see how long it would take a hacker / computer to crack your password https://howsecureismypassword.net/  Hints “Secure passwords explained by common craft” (video) http://www.freetech4teachers.com/2011/01/11-resources-for-teaching- learning-web.html  Read this article “The Ultimate Guide to Passwords” http://www.pcpro.co.uk/features/372736/the-ultimate-guide-to-passwords
  • 6. Can you erase yourself from the internet  Video: Protecting reputations online in Plain English http://www.freetech4teachers.com/2011/01/11-resources-for-teaching- learning-web.html  Read the article “Can you erase yourself from the internet” which was published in February 2013 and be prepared to answer questions about it http://www.pcpro.co.uk/features/379786/can-you-erase-yourself-from-the- internet  Information about how to delete your social networking accounts http://www.deleteyouraccount.com/
  • 9.
  • 10. Protect yourself from cyberbullying
  • 11. Tips for dealing with cyberbullying
  • 12. What your parents / teachers can do …..
  • 14.
  • 15. Facebook  Regularly check the Privacy help page to make sure you know the latest changes https://en-gb.facebook.com/help/445588775451827  Although in Y7 you are officially too young to have a Facebook account it is worth familiarising yourself with the privacy settings https://www.facebook.com/video/video.php?v=366944610483  Never leave the settings at their default value  Never give away your ASL (Age, Sex, Location)  Know how to report things that you are unhappy with https://en-gb.facebook.com/help/181495968648557/  Know how to report things you are unhappy with to CEOP https://www.ceop.police.uk/Ceop-Report/
  • 16. Facebook  Watch Little Red Riding Mood learn about safe Facebook Surfing
  • 17. Facebook – who sees your information?
  • 18. Facebook – Good / bad practice  Look at the Facebook Timeline and then answer the following:  Create a list of at least 5 SAFE features of the profile  Create a list of at least 5 potentially UNSAFE features of the profile  What types of information is important to keep safe / private online?  What information is appropriate to share publically?  How long does information stay online?  Who could potentially see your information now or in the future?  What are the implications of a user having 1,186 friends  Should you display your birthdate online? Why / why not?
  • 21. Online Gaming  Legitimate games have “click here” buttons on the website  Downloads a RAT (Remote Access Trojan) giving the creator complete access of the machine  Other online users you chat to may not be who they say they are; do not give away personal information
  • 23. Instant Messaging  Only use instant messaging for people you personally know.  Still be careful how much personal information you give away
  • 25. Not everything is as it seems  Read this article to see how easy it is to pretend to be somebody else on twitter http://www.pcpro.co.uk/features/371674/the-twitter-fraudsters  If your account has been hacked, this can lead to your follows being spammed especially with attempted phishing  Make sure that you are familiar with the “Twitter Safety tips for Teens” https://support.twitter.com/groups/57-safety-security/topics/241-tips- guidelines/articles/20169990-safety-tips-for-teens#  Example twitter regrets: Rihanna: http://goo.gl/GGGnkl
  • 26. Miley Cyrus left and came back!
  • 27. Trolling  Who does it and why? BBC News Magazine: http://www.bbc.co.uk/news/magazine-14898564  Lots of recent publicity about trolls, leading to twitter apologising and adding a report button http://news.sky.com/story/1124027/twitter-says-sorry-to-women-over-abuse
  • 29. Mini Project You have three lessons to write, choreograph, and record a rap for other Y7 pupils about online safety / dangers
  • 32. Malware – how does it get on my computer?  Relies on malicious or hacked websites to download the payload directly onto your computer  If your browser isn’t up to date then you may get a “drive by” download which downloads the payload without you knowing as it can exploit gaps in older browsers  Most common is to convince you to download software that you think is genuine, for example antivirus as the same site has just told you that you have a virus! The chances are is that you will be downloading a Trojan As you have clicked on the download or accept button, your computer believes that it is genuine
  • 33. Malware – nowhere is safe!  In August 2013 Steam, Konami, and Ubisoft gaming platforms were infected http://www.tomsguide.com/us/steam-malware-ramnit-trusteer-hacking,news- 17426.html  In February 2011 The BBC 1Extra and 6Music websites had been hack to serve up Trojans http://news.softpedia.com/news/Malicious-Code-Injected-into-BBC-6-Music-and- 1Xtra-Websites-184546.shtml  In September 2010 the Radio 3 website was also infected http://news.softpedia.com/news/Malware-Infection-on-BBC-Radio-3-Website- 155980.shtml  In April 2009 Paul McCartney’s Official website was infected http://www.infosecurity-us.com/view/1178/mccartney-site-serves-up-zeus- malware/
  • 34. Malware – what does it do on my computer?  In the past it might pop up a message or shut down your computer  Modern ones monitor keyboard and screen in the hope of capturing banking details or passwords  Others may make your computer into a zombie operating as part of a botnet, allowing your computer to controlled remotely without your knowledge (often used to send Spam)  See the infographic “Anatomy of an online banking heist” to see how your money can be stolen
  • 35. Malware - Macs  Macs are less prone to malware attacks but as their sales increases so does the threat.  In 2012 The Flashback Trojan infected over 600,000 Macs  In 2010 The OnionSpy malware hid in a screensaver and spied on network traffic  In 2009 The MacSweeper scareware demanded $39.99 to clean up fake infections
  • 36. Malware – what does it do on my phone?  Malware is rare on iOS but becoming more common on Android devices  Might be downloaded as, for example, a ring tone downloader  Could send texts to a premium number giving profits to the creator at the same time as increasing your bill. (estimated that 44% of Android malware does this)
  • 37. Malware – how to avoid it  Don’t install software from unknown sources  Keep your internet security and antivirus up to date
  • 39. Phishing  Often promoted via links in emails  When clicked, takes you to a website that looks genuine  You then enter your login credentials as normal but cant login  You have just given your account details to a hacker!  Recently happened to Xbox Live customers which allowed the hackers buy games and online items  Take the test to see if you can spot the phishing sites https://www.staysecureonline.com/staying-safe-online/quiz/  Phishing scams in plain English http://www.freetech4teachers.com/2011/01/11-resources-for-teaching- learning-web.html#.UiDJzJKfiDv
  • 41. Where can I found out more?  UK Safer Internet Centre: http://www.saferinternet.org.uk/advice-and-resources  Google tips for staying safe on the web http://www.google.com/goodtoknow/online-safety/
  • 43. What have you learnt?  Play the Safety Land Game and print out your certificate if successful http://www.att.com/Common/images/safety/game.html  Do the questions on the “welcome to the web” site http://www.teachingideas.co.uk/welcome/3711.htm  Internet safety hangman http://www.quia.com/hm/40647.html  Games @ thinkyouknow.co.uk http://www.thinkuknow.co.uk/11_16/everything-else/games/
  • 44. Further reading  Ebook: “Own your own space – Keep yourself and your stuff safe Online” Digital lBook for teens by Linda McCarthy http://www.microsoft.com/en-us/download/details.aspx?id=1522  Website: “A thin line” created by MTV http://www.athinline.org/  Website: “Think you know” http://www.thinkuknow.co.uk/11_16/  Website: Childline http://www.childline.org.uk/explore/bullying/pages/cyberbullying.aspx

Hinweis der Redaktion

  1. Week 5 title slide
  2. Esafety title slide
  3. This first section is on Passwords
  4. Microsoft tool – demonstrate the tool; ask pupils to try and then get their feedbackHowsecureismypassword – again, demonstrate the tool; ask pupils to try and then get their feedbackWatch the video and discuss strong passwordsArticle – further reading for homework or those that have completed the work (a PDF copy is on SkyDrive)
  5. Discuss with pupils what is a digital footprint?
  6. Video – nice simple introduction to a digital footprint.Article – ask pupils to read this article (probably best for them to read it as a homework BEFORE the lesson as is quite long) and then discussDeleteyouraccount – is a website with information about how to remove accounts
  7. Title slide for cyberbullying
  8. Pretty hard hitting 6mins 31sec video about a secondary school pupil being cyberbulliedAdditional video is in the Yr7 Week 5 SkyDrive folder – 3mins 51 “14 yr old describes her experiences of cyberbullying” (less hard hitting but useful info)
  9. Discuss with pupils exactly what cyberbullying is
  10. Before showing this slide, get the pupils to write down how they could protect themselves from being cyberbulliedThen discuss this slide to see if they have the same ideas
  11. Again, before showing this slide, ask the pupils to write down some of their own tips (maybe discussing with a partner)Get the pupils to share their ideas with you and then see if they are the same as this slide
  12. Before showing this slide, ask the pupils to write down what could happen if they tell a parent or teacher that they are being cyberbulliedGet the pupils to share their ideasThen see if they are the same as this slide.
  13. Discuss with pupils what is a digital footprint?
  14. Tilted slide for Facebook section
  15. Theoretically the pupils shouldn’t event be on Facebook; however, some probably are.Make sure that they are aware of where to find the privacy settings using the links aboveDiscuss why you shouldn’t make private details public (refer back to the fact that once something is online it is their for ever)
  16. 1min 43secs video giving a light hearted view as to why you should only accept friends that you know in real life to be your online friends.Discuss the video afterwards
  17. 8mins 47 secs video which is more hard hitting showing how easy it is to find personal information on line and hoe predators could use it. (worth watching video yourself before lesson just to make sure it is appropriate to your pupils)Discuss the video afterwards
  18. Friendbook timeline is in the Y7 Week 5 Skydrive folder – ask the pupils to look at it and then answer the questions on this slideUsing the answers discuss what the pupils have written
  19. Discuss with pupils what is a digital footprint?
  20. Discuss how easy it is to chat with other online users and how in a relaxed “game mode” you are more likely to give away personal information such as your age, teams you play for and the school you go toThis information can be used as the start of grooming (you may need to explain what is meant by grooming)
  21. Similar to other slides, it is important that pupils understand that they should only accept real friends as their virtual friends3min 12secs video is quite hard hitting – watch and discuss.
  22. Find out how many people know what twitter is and how many use it in order to work out how appropriate this lesson is.Make sure that pupils are aware that it is a public platform and that tweets can potentially be seen by anyone
  23. 1min 47sec video by Miley Cyrus explaining why she left twitter in 2009 (although she still has an account!)
  24. Ask pupils to read the BBC article (if possible before the lesson as it is quite long) – alternatively you could summarise it?Discuss the article to get the pupils viewsThen ask whether they think that people should be arrested and sentenced for trolling or should people be allowed to post what they want (freedom of speech)
  25. Discuss with pupils what is a digital footprint?
  26. Discuss with pupils what is a digital footprint?