Internet safety v 4 slides and notes

2,407 views

Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

Internet safety v 4 slides and notes

  1. 1. INTERNET SAFETY October 2011
  2. 2. Household Internet Access <ul><li>The 2009 Queensland household survey of computer and internet usage revealed that: </li></ul><ul><li>83% of adult Queenslanders now have access to the internet at home </li></ul>
  3. 3. The Internet <ul><li>Positive </li></ul><ul><li>A place to learn </li></ul><ul><li>Connect with others </li></ul><ul><li>Improve skills </li></ul><ul><li>Negative </li></ul><ul><li>Numerous risks </li></ul>
  4. 4. Today’s Session <ul><li>Internet activities </li></ul><ul><li>Internet safety issues </li></ul><ul><li>Protection – Equipment and you </li></ul><ul><li>Scams, Phishing and Online Fraud </li></ul>
  5. 5. Today’s Session <ul><li>Privacy and Identity Theft </li></ul><ul><li>Social Networking </li></ul><ul><li>Cyber Bullying </li></ul><ul><li>Families and Young People </li></ul><ul><li>Smart phones </li></ul>
  6. 6. Today’s Session <ul><li>Is a guide </li></ul><ul><li>Conduct your own investigation </li></ul><ul><li>Ask for advice </li></ul><ul><li>Review Government sites relating to internet safety </li></ul>
  7. 7. INTERNET ACTIVITIES
  8. 8. WWW Activities <ul><li>Email </li></ul><ul><li>Chatting </li></ul><ul><li>IM </li></ul><ul><li>Gaming </li></ul><ul><li>Social Networking </li></ul><ul><li>Blogging </li></ul><ul><li>‘Surfing’ </li></ul>
  9. 9. Emailing
  10. 10. Social Networking
  11. 11. Chatting
  12. 12. IM
  13. 13. Gaming
  14. 14. Blogging
  15. 15. Web Surfing
  16. 16. INTERNET SAFETY ISSUES
  17. 17. Internet Safety Issues <ul><li>Malicious computer programs </li></ul><ul><li>Worms </li></ul><ul><li>Trojans </li></ul><ul><li>Adware </li></ul><ul><li>Spyware </li></ul><ul><li>Keystroke loggers </li></ul><ul><li>Viruses </li></ul>
  18. 18. Internet Safety Issues <ul><li>Hackers </li></ul><ul><li>Exposure to inappropriate material </li></ul><ul><li>Physical danger </li></ul><ul><li>Financial risks </li></ul>
  19. 19. Internet Safety Issues <ul><li>Harassment and bullying </li></ul><ul><li>Privacy </li></ul><ul><li>Unreliable information </li></ul><ul><li>Spam </li></ul><ul><li>Identity theft </li></ul>
  20. 20. Internet Safety Issues <ul><li>Don’t fear you can do two simple things to reduce your risk </li></ul><ul><li>Educate yourself </li></ul><ul><li>Protect your computer </li></ul>
  21. 21. Internet Safety Issues <ul><li>For children and young people </li></ul><ul><li>Empower through education </li></ul><ul><li>Provide supervision </li></ul>
  22. 22. PROTECTION
  23. 23. Computer Protection <ul><li>Ensure the best possible protection </li></ul><ul><li>Ask a range of people for advice </li></ul><ul><li>Internet service provider (isp) </li></ul><ul><li>Computer stores </li></ul><ul><li>Friends and family </li></ul><ul><li>Work colleagues </li></ul>
  24. 24. Computer Protection <ul><li>Government website with useful information for computer protection </li></ul><ul><li>www.staysmartonline.gov.au </li></ul>Government website with useful information for computer protection www.staysmartonline.gov.au
  25. 25. Computer Protection <ul><li>Anti-virus software </li></ul><ul><li>Anti spyware software </li></ul><ul><li>Firewall </li></ul><ul><li>Pop up stoppers </li></ul><ul><li>Reduce spam </li></ul><ul><li>Content filters </li></ul>
  26. 26. Computer Protection <ul><li>Anti-virus software </li></ul><ul><li>Assists to protect your computer from malicious computer programs </li></ul><ul><li>Viruses have the potential </li></ul><ul><li>to destroy files and prevent </li></ul><ul><li>access to your computer </li></ul>
  27. 27. Computer Protection <ul><li>Anti spyware software </li></ul><ul><li>Used to protect your computer from </li></ul><ul><li>spyware which takes </li></ul><ul><li>information from your </li></ul><ul><li>computer without </li></ul><ul><li>consent and passes </li></ul><ul><li>onto a third party </li></ul>
  28. 28. Computer Protection <ul><li>Firewall </li></ul><ul><li>Monitors what goes </li></ul><ul><li>in and out of your computer. </li></ul><ul><li>Blocks websites </li></ul><ul><li>you may not wish to view </li></ul>
  29. 29. Computer Protection <ul><li>Pop Up Blockers </li></ul><ul><li>Easily activated in </li></ul><ul><li>your internet browser </li></ul><ul><li>(mozilla firefox, </li></ul><ul><li>internet explorer) </li></ul>
  30. 30. Computer Protection <ul><li>Reduce Spam </li></ul><ul><li>Activate spam filters </li></ul><ul><li>Report spam </li></ul>
  31. 31. Content Filters <ul><li>Used to manage access to the internet </li></ul><ul><li>Adjustable settings </li></ul><ul><li>Individual user profiles </li></ul><ul><li>Can be restrictive </li></ul>
  32. 32. Content Filters <ul><li>Contact your internet service provider </li></ul>
  33. 33. Content Filters <ul><li>The Australian Internet Industry Association (IIA) maintains a list of Family Friendly internet content filters ( www.iia.net.au ) </li></ul>
  34. 34. Wireless Internet Connection <ul><li>Information relating to the protection </li></ul><ul><li>of your wireless internet </li></ul><ul><li>can be found at </li></ul><ul><li>www.staysmartonline.gov.au </li></ul>
  35. 35. Protecting Wireless Internet Connection <ul><li>Select a strong password </li></ul><ul><li>Turn off feature that constantly broadcasts your network name </li></ul><ul><li>Reduce power of transmission </li></ul><ul><li>Turn encryption on </li></ul><ul><li>Turn administrator access off </li></ul><ul><li>Turn off wireless connection whilst not in use </li></ul>
  36. 36. SCAMS, PHISHING AND ONLINE FRAUD
  37. 37. Person Fraud and Scams <ul><li>5% of Australians over 15 were victims of personal fraud in 2007. </li></ul><ul><li>Most common fraud was ID fraud. </li></ul><ul><li>20% of these frauds occurred through internet or email </li></ul>
  38. 38. Person Fraud and Scams
  39. 39. Scams <ul><li>Target all types of people </li></ul><ul><li>Examples include the well known Nigerian Bank scam, fake lotteries, employment and dating scams </li></ul><ul><li>If it appears too good </li></ul><ul><li>to be true </li></ul><ul><li>it probably is!!!! </li></ul>
  40. 40. Email Scam <ul><li>Hello my new friend! My name is Natalya! How are you? I hope you fine! I have found yours profile and e-mail on website I want to find the love. If you is real are interested, answer to me and we can begin our acquaintance. A little about me. I was born 15 OCT 1979. I want find someone man that can love me, and i can love him! i went through your profile and read information about you and what you want to see in a man of your choice. And i believe, i can have all part of what you want in soulmate, out of thousands of people that is on here, I find you to be my true choice and i hope that you should feel the same way too. It's really a wonderful moment as am writing this missive to you and i pray that i should hear a good and sweat reply from you. You may be in long distance to me, but i belief that there's nothing love can not do. I belief love can move mountain and love turn around man life to precious life and sweet one. Ok, i wish that you should write me in e-mail and lets meet to have more discussions and get to know more about each other. My new friend I ask you to write to me on e-mail: [email_address] because the Internet here is very bad, but on e-mail I can check my mail easily. I will be great to read a marvellous missive from you. Hoping in God of love and in power of love to hear from you. Thanks for the reading. Natalya. </li></ul>
  41. 41. Email Scam <ul><li>  </li></ul><ul><li>I wish to inform you that your payment is being processed and will be released to you as soon as you respond to this letter. Also note that from my record in my file your outstanding contract payment is US$25,500,000.00 (Twenty Five Million Five hundred Thousand United States Dollars). </li></ul><ul><li>  </li></ul><ul><li>Kindly re-confirm to me the followings: 1) Your full name. 2) Phone, fax and mobile number 3) Company name, position and address. 4) Profession, age and marital status. 5) Banking Information/address account number/ swift code </li></ul><ul><li>As soon as this information is received, your payment will be made to you in a certified bank draft or wired to your nominated bank account directly from Central Bank of Nigeria. </li></ul><ul><li>  </li></ul><ul><li>You can call me on my direct number 234-802-715-1173 as soon as you receive this letter for further discussion: [email_address] </li></ul><ul><li>REGARDS </li></ul><ul><li>  </li></ul><ul><li>Prof. Charles Soludo. Executive Governor, Central Bank of Nigeria [CBN] DIRCT LINE -234-802-715-1173 </li></ul><ul><li>  </li></ul>
  42. 42. Phishing <ul><li>Watch Video: Phishing in Plain English </li></ul><ul><li>Luring people to fake website by using emails that seem to come from a legitimate business </li></ul><ul><li>Impersonate the ATO, EBay, Banks, Pay Pal and email providers </li></ul><ul><li>Try and get personal data, usernames and passwords. </li></ul><ul><li>Steal identity, money or sell identity </li></ul>
  43. 43. Phishing
  44. 44. Email Scams and Phishing
  45. 45. Email
  46. 46. Email – protecting yourself <ul><li>Don’t give out personal information </li></ul><ul><li>Don’t click on links </li></ul><ul><li>Check for poor grammar and spelling </li></ul><ul><li>Change your email </li></ul><ul><li>password regularly </li></ul><ul><li>Have a strong password </li></ul>
  47. 47. Email – protecting yourself <ul><li>Report junk email to your service provider </li></ul><ul><li>Report unauthorised access to your email provider </li></ul><ul><li>Don’t sign up for emails you don’t </li></ul><ul><li>want to receive </li></ul><ul><li>Be wary of worst virus </li></ul><ul><li>emails </li></ul>
  48. 48. PRIVACY AND IDENTITY THEFT
  49. 49. Privacy and Identity Theft <ul><li>Take care to protect your privacy and reduce the risk of your identity being stolen </li></ul>
  50. 50. Privacy and Identity Theft
  51. 51. SOCIAL NETWORKING
  52. 52. Social Networking <ul><li>Social networking sites enable people to connect with others on the site through chat, sharing of photos and videos, blogging and discussion. </li></ul>
  53. 53. Social Networking
  54. 54. Social Networking <ul><li>The Risks </li></ul><ul><li>You can be whoever you want with no verification </li></ul><ul><li>Divulging of personal information </li></ul><ul><li>Time Wasting </li></ul><ul><li>Cyber Bullying </li></ul><ul><li>However it is great fun and </li></ul><ul><li>an excellent way to stay in touch with friends </li></ul>
  55. 55. Social Networking <ul><li>Take care to protect yourself </li></ul><ul><li>Find out as much as you can about the site before you join </li></ul><ul><li>Read privacy statements </li></ul><ul><li>Never display your full date of birth </li></ul><ul><li>Think before you post </li></ul><ul><li>Educate young people </li></ul><ul><li>Supervise young people </li></ul>
  56. 56. CYBER BULLYING
  57. 57. Cyber Bullying <ul><li>Cyber bullying is bullying carried out through an internet service. </li></ul><ul><li>16% of young people bullied on line </li></ul><ul><li>You should not say on line what you would not say in person </li></ul><ul><li>Serious cases should be reported </li></ul>
  58. 58. Cyber Bullying <ul><li>If cyber bullying occurs </li></ul><ul><li>Keep a record </li></ul><ul><li>Tell someone </li></ul><ul><li>Report to internet provider </li></ul><ul><li>Contact police </li></ul>
  59. 59. Cyber Bullying <ul><li>If cyber bullying occurs </li></ul><ul><li>Don’t reply to messages </li></ul><ul><li>If possible change your contact details </li></ul><ul><li>Keep your username and password secret </li></ul><ul><li>Cyber bullying can be a criminal activity </li></ul>
  60. 60. INFORMATION FOR FAMILIES AND YOUNG PEOPLE
  61. 61. Families and Young People <ul><li>Young people and children will encounter the internet at home, school, friends’ places and libraries. </li></ul>
  62. 62. What young people do on the internet <ul><li>Browsing </li></ul><ul><li>Social networking </li></ul><ul><li>Emailing </li></ul><ul><li>Downloading </li></ul><ul><li>IMing </li></ul><ul><li>Studying </li></ul>
  63. 63. Risks for young people <ul><li>Inappropriate content </li></ul><ul><li>Unwanted advertising </li></ul><ul><li>Financial risks </li></ul><ul><li>Harassment and bullying </li></ul>
  64. 64. Risks for young people <ul><li>Exploitation </li></ul><ul><li>Spam </li></ul><ul><li>Unreliable information </li></ul><ul><li>Viruses </li></ul><ul><li>Un-moderated chat rooms </li></ul>
  65. 65. Protecting Yourself and Your Family
  66. 66. Protecting Yourself and Your Family <ul><li>Consider and internet </li></ul><ul><li>safety contract </li></ul>
  67. 67. Protecting Yourself and Your Family <ul><li>Educate </li></ul><ul><li>Have computer in public area </li></ul><ul><li>Consider filters and security software </li></ul><ul><li>Use family friendly search engine </li></ul><ul><li>Encourage reporting of problems </li></ul><ul><li>Supervise young children </li></ul>
  68. 68. Protecting Yourself and Your Family <ul><li>Encourage good decisions </li></ul><ul><li>Increase responsibility with age </li></ul><ul><li>Teach children what is advertising and what is not </li></ul>
  69. 69. Families and Young People <ul><li>Free resources for parents, libraries, schools and young people can be downloaded from </li></ul><ul><li>www.cybersmart.gov.au </li></ul>
  70. 70. Families and Young People <ul><li>Hector’s world is designed for young children starting out on the internet. </li></ul>
  71. 71. Families and Young People <ul><li>The Australian Government CyberSmart website has some interesting information for schools which will also be useful for patents </li></ul><ul><li>www.cybersmart.gov.au/Schools.aspx </li></ul>
  72. 72. Families and Young People <ul><li>Cyberquoll is an internet safety interactive educational program for primary school children ages 8 to 12 </li></ul><ul><li>www.cybersmart.gov.au/cyberquoll/index.html </li></ul>
  73. 73. SMART PHONES
  74. 74. Securing Your Smart Phone <ul><li>Secure your smart phone by: </li></ul><ul><li>Setting and maintaining strong passwords. </li></ul><ul><li>Keep Bluetooth hidden. </li></ul><ul><li>Use and encrypted WiFi network that requires a password. </li></ul>
  75. 75. Securing Your Smart Phone <ul><li>Install security software from a reputable provider. </li></ul><ul><li>Be careful when downloading applications from the Web. </li></ul><ul><li>Back up your data regularly. </li></ul><ul><li>Encrypting your data. </li></ul>
  76. 76. Securing Your Smart Phone <ul><li>Don't open multimedia messages (MMS) or attachments in emails, or click on links in emails and SMS messages unless you are expecting them. </li></ul><ul><li>Check for updates to your phones operating system regularly. </li></ul>
  77. 77. CONCLUSION
  78. 78. Conclusion <ul><li>Learn </li></ul><ul><li>Improve skills </li></ul><ul><li>Meet new friends </li></ul><ul><li>Connect with old ones </li></ul>
  79. 79. Conclusion <ul><li>Educate yourself and your family </li></ul>
  80. 80. Conclusion <ul><li>If it appears too good to be true it probably is </li></ul>

×