Year 7 - Week 5 esafety


Published on

Year 7 slides for teaching about e-safety

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Week 5 title slide
  • Esafety title slide
  • This first section is on Passwords
  • Microsoft tool – demonstrate the tool; ask pupils to try and then get their feedbackHowsecureismypassword – again, demonstrate the tool; ask pupils to try and then get their feedbackWatch the video and discuss strong passwordsArticle – further reading for homework or those that have completed the work (a PDF copy is on SkyDrive)
  • Discuss with pupils what is a digital footprint?
  • Video – nice simple introduction to a digital footprint.Article – ask pupils to read this article (probably best for them to read it as a homework BEFORE the lesson as is quite long) and then discussDeleteyouraccount – is a website with information about how to remove accounts
  • Title slide for cyberbullying
  • Pretty hard hitting 6mins 31sec video about a secondary school pupil being cyberbulliedAdditional video is in the Yr7 Week 5 SkyDrive folder – 3mins 51 “14 yr old describes her experiences of cyberbullying” (less hard hitting but useful info)
  • Discuss with pupils exactly what cyberbullying is
  • Before showing this slide, get the pupils to write down how they could protect themselves from being cyberbulliedThen discuss this slide to see if they have the same ideas
  • Again, before showing this slide, ask the pupils to write down some of their own tips (maybe discussing with a partner)Get the pupils to share their ideas with you and then see if they are the same as this slide
  • Before showing this slide, ask the pupils to write down what could happen if they tell a parent or teacher that they are being cyberbulliedGet the pupils to share their ideasThen see if they are the same as this slide.
  • Discuss with pupils what is a digital footprint?
  • Tilted slide for Facebook section
  • Theoretically the pupils shouldn’t event be on Facebook; however, some probably are.Make sure that they are aware of where to find the privacy settings using the links aboveDiscuss why you shouldn’t make private details public (refer back to the fact that once something is online it is their for ever)
  • 1min 43secs video giving a light hearted view as to why you should only accept friends that you know in real life to be your online friends.Discuss the video afterwards
  • 8mins 47 secs video which is more hard hitting showing how easy it is to find personal information on line and hoe predators could use it. (worth watching video yourself before lesson just to make sure it is appropriate to your pupils)Discuss the video afterwards
  • Friendbook timeline is in the Y7 Week 5 Skydrive folder – ask the pupils to look at it and then answer the questions on this slideUsing the answers discuss what the pupils have written
  • Discuss with pupils what is a digital footprint?
  • Discuss how easy it is to chat with other online users and how in a relaxed “game mode” you are more likely to give away personal information such as your age, teams you play for and the school you go toThis information can be used as the start of grooming (you may need to explain what is meant by grooming)
  • Similar to other slides, it is important that pupils understand that they should only accept real friends as their virtual friends3min 12secs video is quite hard hitting – watch and discuss.
  • Find out how many people know what twitter is and how many use it in order to work out how appropriate this lesson is.Make sure that pupils are aware that it is a public platform and that tweets can potentially be seen by anyone
  • 1min 47sec video by Miley Cyrus explaining why she left twitter in 2009 (although she still has an account!)
  • Ask pupils to read the BBC article (if possible before the lesson as it is quite long) – alternatively you could summarise it?Discuss the article to get the pupils viewsThen ask whether they think that people should be arrested and sentenced for trolling or should people be allowed to post what they want (freedom of speech)
  • Discuss with pupils what is a digital footprint?
  • Discuss with pupils what is a digital footprint?
  • Year 7 - Week 5 esafety

    1. 1. WEEKS 5-8
    2. 2. LESSON 1
    3. 3. PASSWORDS
    4. 4. How strong is your password  Unless your password is strong, the it could be easier for Hackers to guess or crack.  Use this Microsoft tool to get an idea of password strengths checker.aspx  Use this tool to see how long it would take a hacker / computer to crack your password  Hints “Secure passwords explained by common craft” (video) learning-web.html  Read this article “The Ultimate Guide to Passwords”
    6. 6. Can you erase yourself from the internet  Video: Protecting reputations online in Plain English learning-web.html  Read the article “Can you erase yourself from the internet” which was published in February 2013 and be prepared to answer questions about it internet  Information about how to delete your social networking accounts
    8. 8. Cyberbullying
    9. 9. Protect yourself from cyberbullying
    10. 10. Tips for dealing with cyberbullying
    11. 11. What your parents / teachers can do …..
    12. 12. Lesson 2
    13. 13. Facebook  Regularly check the Privacy help page to make sure you know the latest changes  Although in Y7 you are officially too young to have a Facebook account it is worth familiarising yourself with the privacy settings  Never leave the settings at their default value  Never give away your ASL (Age, Sex, Location)  Know how to report things that you are unhappy with  Know how to report things you are unhappy with to CEOP
    14. 14. Facebook  Watch Little Red Riding Mood learn about safe Facebook Surfing
    15. 15. Facebook – who sees your information?
    16. 16. Facebook – Good / bad practice  Look at the Facebook Timeline and then answer the following:  Create a list of at least 5 SAFE features of the profile  Create a list of at least 5 potentially UNSAFE features of the profile  What types of information is important to keep safe / private online?  What information is appropriate to share publically?  How long does information stay online?  Who could potentially see your information now or in the future?  What are the implications of a user having 1,186 friends  Should you display your birthdate online? Why / why not?
    17. 17. WEEK 6 Lesson 3
    18. 18. ONLINE GAMING
    19. 19. Online Gaming  Legitimate games have “click here” buttons on the website  Downloads a RAT (Remote Access Trojan) giving the creator complete access of the machine  Other online users you chat to may not be who they say they are; do not give away personal information
    21. 21. Instant Messaging  Only use instant messaging for people you personally know.  Still be careful how much personal information you give away
    22. 22. TWITTER
    23. 23. Not everything is as it seems  Read this article to see how easy it is to pretend to be somebody else on twitter  If your account has been hacked, this can lead to your follows being spammed especially with attempted phishing  Make sure that you are familiar with the “Twitter Safety tips for Teens” guidelines/articles/20169990-safety-tips-for-teens#  Example twitter regrets: Rihanna:
    24. 24. Miley Cyrus left and came back!
    25. 25. Trolling  Who does it and why? BBC News Magazine:  Lots of recent publicity about trolls, leading to twitter apologising and adding a report button
    26. 26. WEEK 6-7 Lesson 4-6
    27. 27. Mini Project You have three lessons to write, choreograph, and record a rap for other Y7 pupils about online safety / dangers
    28. 28. WEEK 8 Lesson 7
    29. 29. MALWARE
    30. 30. Malware – how does it get on my computer?  Relies on malicious or hacked websites to download the payload directly onto your computer  If your browser isn’t up to date then you may get a “drive by” download which downloads the payload without you knowing as it can exploit gaps in older browsers  Most common is to convince you to download software that you think is genuine, for example antivirus as the same site has just told you that you have a virus! The chances are is that you will be downloading a Trojan As you have clicked on the download or accept button, your computer believes that it is genuine
    31. 31. Malware – nowhere is safe!  In August 2013 Steam, Konami, and Ubisoft gaming platforms were infected,news- 17426.html  In February 2011 The BBC 1Extra and 6Music websites had been hack to serve up Trojans 1Xtra-Websites-184546.shtml  In September 2010 the Radio 3 website was also infected 155980.shtml  In April 2009 Paul McCartney’s Official website was infected malware/
    32. 32. Malware – what does it do on my computer?  In the past it might pop up a message or shut down your computer  Modern ones monitor keyboard and screen in the hope of capturing banking details or passwords  Others may make your computer into a zombie operating as part of a botnet, allowing your computer to controlled remotely without your knowledge (often used to send Spam)  See the infographic “Anatomy of an online banking heist” to see how your money can be stolen
    33. 33. Malware - Macs  Macs are less prone to malware attacks but as their sales increases so does the threat.  In 2012 The Flashback Trojan infected over 600,000 Macs  In 2010 The OnionSpy malware hid in a screensaver and spied on network traffic  In 2009 The MacSweeper scareware demanded $39.99 to clean up fake infections
    34. 34. Malware – what does it do on my phone?  Malware is rare on iOS but becoming more common on Android devices  Might be downloaded as, for example, a ring tone downloader  Could send texts to a premium number giving profits to the creator at the same time as increasing your bill. (estimated that 44% of Android malware does this)
    35. 35. Malware – how to avoid it  Don’t install software from unknown sources  Keep your internet security and antivirus up to date
    36. 36. PHISHING
    37. 37. Phishing  Often promoted via links in emails  When clicked, takes you to a website that looks genuine  You then enter your login credentials as normal but cant login  You have just given your account details to a hacker!  Recently happened to Xbox Live customers which allowed the hackers buy games and online items  Take the test to see if you can spot the phishing sites  Phishing scams in plain English learning-web.html#.UiDJzJKfiDv
    39. 39. Where can I found out more?  UK Safer Internet Centre:  Google tips for staying safe on the web
    41. 41. What have you learnt?  Play the Safety Land Game and print out your certificate if successful  Do the questions on the “welcome to the web” site  Internet safety hangman  Games @
    42. 42. Further reading  Ebook: “Own your own space – Keep yourself and your stuff safe Online” Digital lBook for teens by Linda McCarthy  Website: “A thin line” created by MTV  Website: “Think you know”  Website: Childline