How To Keep Safe On The Internet!


Published on

Published in: Education, Technology
1 Comment
  • A greally good presentation and lots of interesting notes
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

How To Keep Safe On The Internet!

  1. 1. How To Keep Safe On The Internet! Ben Langley Donatas Vysniauskas Alex Clark Melisa Aslan
  2. 2. Coming Up… • Take appropriate precautions to ensure own safety and privacy • Protect personal information online • Carry out checks on other’s identity • Forms and features of cyber bullying.
  3. 3. Precautions to ensure safety and privacy Ben Langley
  4. 4. Safety and privacy the risks on the internet • Cyber bullying • Scammers • Hackers • Fake websites • Malware • phishing
  5. 5. Ensuring Your Own Safety on the internet • Content Filtering: restricting the type of content which can be viewed. • Proxy Servers: using systems to hid your true location. • Monitoring and Reporting User Behaviour: keeping an eye on the behaviour of other users and reporting anything inappropriate. • Withholding Personal Information: keeping the amount of information that can be viewed online to a minimum. • Using Non-trivial Usernames and Passwords: avoiding the use of easily-guessed or easily cracked passwords.
  6. 6. Always be cautious when using the Internet • Always be cautious about any information you give when using the Internet eg: if you join a chat room use a suitable nickname and never give any personal information out such as where you live. • Use throwaway e-mail addresses, eg: Gmail addresses that you can simply discard if anyone starts harassing you in any way. • Always assume that any information and pictures you put on the Internet can be viewed by the entire world.
  7. 7. Always be cautious when using the Internet • Beware of giving information about yourself out. The more information you put on the internet the more there is for someone to put together about you. • Always be suspicious of what you are being offered on the Internet, eg: gifts, prizes and money. There are many dangers. eg: hackers or Scammers. • Fake websites
  8. 8. Important to have a strong password A password is an important element of Internet defence. It is a secret code, known only to you, that will allow you to access certain resources. You should never tell anyone your password. • It is important to have a strong password that other people cannot easily guess. • Try not to use details that could be guessed by people who know you • Use a combination of letters, numbers and symbols • Never tell your friends or family your password • Never email your password to anyone • Keep your username and passwords safe
  9. 9. Protect personal information online Donatas Vysniauskas
  10. 10. How to protect your personal information online? • Never give out identifying information such as, name, address, school name or telephone numbers in a public message such as a chat room - Facebook. This is because they can use that information against you or share it on internet widely. Also, this could result in a scam because someone could use your information to find out your bank details. Donatas Vysniauskas
  11. 11. How to make sure your personal information stays safe? • Learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network (Keep your profile closed and allow only your friends to view your profile). Donatas Vysniauskas
  12. 12. Strong passwords • The use of strong passwords is therefore essential in order to protect your security and identity. • Make sure your passwords are long and hard to guess. This will help your social networking to stay private and invulnerable to other people. Donatas Vysniauskas
  13. 13. What is Phishing? • Phishing is an act of attempting to acquire information such as usernames, passwords and credit card details. • To prevent phishing don’t click on a malicious link or open a malicious attachment, in which case your financial information and passwords may then be stolen. Donatas Vysniauskas
  14. 14. Carry Out Checks On Other’s Online Identity! Alex Clark
  15. 15. Why Is It Important To Check Other’s Identity? • It is important to know who the people on the internet because they may be fake identity’s. • Also, they may find your information and details on credit/debit card’s, but they may also be sexual predators. • You will have to be very careful when using social networking, because you may not know the people or they may be adults pretending to be children, and you may meet up with them some time.
  16. 16. Ways To Check Other’s Identity! Profile Picture • If you do not know who the person is that is adding you as a friend on social networks, you should first go on there profile and see there pictures.
  17. 17. Mutual Friends • If you do not know the person that is trying to add you on social networks, you can always look at there mutual friends. Then you can see what friends he has got that you have also got.
  18. 18. Webcam • If you do not know the person that is adding you on social networks, you can always add them on Skype to see what they look like. Some people say that they don’t want to do webcam. They might be someone, that their not.
  19. 19. Forms and Features of Cyber Bullying. Melisa Aslan
  20. 20. What is Cyber Bullying? Cyber bullying is when a child or teen is getting threatened, harassed, humiliated or embarrassed by another child or teen using the Internet, digital technologies or mobile phones. Melisa Aslan
  21. 21. Forms of Cyber Bullying Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating that might make a person afraid for his or her safety. Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others. Melisa Aslan
  22. 22. Forms of Cyber Bullying Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post embarrassing material to/about others. Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety. Melisa Aslan
  23. 23. Features of Cyber Bullying Cyber bullying can be used to carry out various different types of bullying, including racist bullying or bullying related to disabilities. Instead of carrying out bullying in person, cyber bullies make use of technology, particularly the Internet and mobile phones to bully others. Melisa Aslan