SlideShare a Scribd company logo
Lesson 1: An
introduction to online
safety
Key Stage 4 – Online safety
How many words about online safety can you define?
Starter activity
Big data
Censorship
The Dark Web
Data
analytics
Digital
personality
Encryption
Fake
news
Filter
bubble
Malware
Obscene
content
Online
hate
crime
Online
reputation
Personally
identifiable
information
Phishing scam
Right to
access
Right to
privacy
Target
advertising
Virtual
private
network
In this lesson, you will:
● Discuss the main safety concerns of being online
● Reflect on online activity from a safety perspective
Lesson 1: An introduction to online safety
3
Objectives
From the keywords in the previous exercise, how many are online safety
threats?
For each threat, is it:
● A form of data theft or data misuse?
● Illegal or legal?
● A common occurrence, or quite rare?
● Something that has happened to you, or something that hasn’t happened
to you before?
● Something you can protect yourself from, or something you can’t protect
yourself from?
How many online safety threats can you think of?
4
Activity 1
Do you think that phishing is...
For example
5
Activity 1
A form of data
theft?
A form of data
misuse?
Do you think that the Dark Web is...
For example
6
Activity 1
Legal? Illegal?
Do you think that censorship is...
For example
7
Activity 1
A common
occurrence?
A rare
occurrence?
Get into groups of four.
What do you use the internet for?
In your groups, list as many ways as you can in which you (or someone
else) might use the internet.
You have five minutes!
Using the internet
8
Activity 2
Share your work.
Choose one person from your group to be your group ambassador.
If you are a group ambassador, move to the group on your left. Did this group
have any ways of using the internet that your group missed?
Repeat.
Using the internet
9
Activity 2
For each of the different internet activities your group came up with, list any
potential online safety threats that the activity exposes you to.
How does using the internet expose you to online safety
threats?
10
Activity 2
Using
email
Phishing
scams
Malware
Targeted
advertising
Are there any precautions you take when you are online to protect yourself
from the online safety threats you identified?
How can you protect yourself online?
11
Activity 2
Using
email
Phishing
scams
Malware
Targeted
advertising
(and only
answer emails
from trusted
sources.)
(Not share my
email address with
people I don’t know)
How confident are you in your knowledge of online safety?
Fill out the questionnaire. There are no wrong answers, so answer honestly.
You have five minutes.
What do you know about online safety?
12
Activity 3
Over the next week, keep a log of any online safety threats you encounter.
These could be something that...
● Happened to you
● Happened to someone else
● You read about in the news
Homework: Online safety threats log
13
Homework
Due: Next lesson
In this lesson, you…
Started thinking about your online
activities from a safety perspective
Next lesson
14
Next lesson, you will…
Consider your online reputation, how
it might be threatened, and how to
protect it
Summary

More Related Content

Similar to L1 Slides – Online Safety – KS4.pptx

SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
pixvilx
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
CakraWicaksono3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ncell
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit pptapieper
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Scott Wright
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
Rahil Foundation
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
G10 Cybersecurity Lesson 2.pptx
G10 Cybersecurity Lesson 2.pptxG10 Cybersecurity Lesson 2.pptx
G10 Cybersecurity Lesson 2.pptx
yousefsafi2
 
Simulating Real World Attack
Simulating Real World AttackSimulating Real World Attack
Simulating Real World Attack
tmacuk
 
Cyber safety
Cyber safetyCyber safety
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology Conference
Evan Francen
 
Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3
Steve Bishop
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
Excellence Foundation for South Sudan
 
Security Awareness Program
Security Awareness ProgramSecurity Awareness Program
Security Awareness ProgramDavid Wigton
 
Anti-Phishing Phil
Anti-Phishing PhilAnti-Phishing Phil
Anti-Phishing Phil
Jasmine Dixon
 

Similar to L1 Slides – Online Safety – KS4.pptx (20)

SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Users guide
Users guideUsers guide
Users guide
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Cyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdfCyber Bullying & How to Stay Safe Online.pdf
Cyber Bullying & How to Stay Safe Online.pdf
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
G10 Cybersecurity Lesson 2.pptx
G10 Cybersecurity Lesson 2.pptxG10 Cybersecurity Lesson 2.pptx
G10 Cybersecurity Lesson 2.pptx
 
Simulating Real World Attack
Simulating Real World AttackSimulating Real World Attack
Simulating Real World Attack
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology Conference
 
Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3Forensic Science Informatics P3 M3 D3
Forensic Science Informatics P3 M3 D3
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Security Awareness Program
Security Awareness ProgramSecurity Awareness Program
Security Awareness Program
 
Anti-Phishing Phil
Anti-Phishing PhilAnti-Phishing Phil
Anti-Phishing Phil
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 
Security Awareness Training Summary
Security Awareness Training SummarySecurity Awareness Training Summary
Security Awareness Training Summary
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

L1 Slides – Online Safety – KS4.pptx

  • 1. Lesson 1: An introduction to online safety Key Stage 4 – Online safety
  • 2. How many words about online safety can you define? Starter activity Big data Censorship The Dark Web Data analytics Digital personality Encryption Fake news Filter bubble Malware Obscene content Online hate crime Online reputation Personally identifiable information Phishing scam Right to access Right to privacy Target advertising Virtual private network
  • 3. In this lesson, you will: ● Discuss the main safety concerns of being online ● Reflect on online activity from a safety perspective Lesson 1: An introduction to online safety 3 Objectives
  • 4. From the keywords in the previous exercise, how many are online safety threats? For each threat, is it: ● A form of data theft or data misuse? ● Illegal or legal? ● A common occurrence, or quite rare? ● Something that has happened to you, or something that hasn’t happened to you before? ● Something you can protect yourself from, or something you can’t protect yourself from? How many online safety threats can you think of? 4 Activity 1
  • 5. Do you think that phishing is... For example 5 Activity 1 A form of data theft? A form of data misuse?
  • 6. Do you think that the Dark Web is... For example 6 Activity 1 Legal? Illegal?
  • 7. Do you think that censorship is... For example 7 Activity 1 A common occurrence? A rare occurrence?
  • 8. Get into groups of four. What do you use the internet for? In your groups, list as many ways as you can in which you (or someone else) might use the internet. You have five minutes! Using the internet 8 Activity 2
  • 9. Share your work. Choose one person from your group to be your group ambassador. If you are a group ambassador, move to the group on your left. Did this group have any ways of using the internet that your group missed? Repeat. Using the internet 9 Activity 2
  • 10. For each of the different internet activities your group came up with, list any potential online safety threats that the activity exposes you to. How does using the internet expose you to online safety threats? 10 Activity 2 Using email Phishing scams Malware Targeted advertising
  • 11. Are there any precautions you take when you are online to protect yourself from the online safety threats you identified? How can you protect yourself online? 11 Activity 2 Using email Phishing scams Malware Targeted advertising (and only answer emails from trusted sources.) (Not share my email address with people I don’t know)
  • 12. How confident are you in your knowledge of online safety? Fill out the questionnaire. There are no wrong answers, so answer honestly. You have five minutes. What do you know about online safety? 12 Activity 3
  • 13. Over the next week, keep a log of any online safety threats you encounter. These could be something that... ● Happened to you ● Happened to someone else ● You read about in the news Homework: Online safety threats log 13 Homework Due: Next lesson
  • 14. In this lesson, you… Started thinking about your online activities from a safety perspective Next lesson 14 Next lesson, you will… Consider your online reputation, how it might be threatened, and how to protect it Summary

Editor's Notes

  1. Last updated: 16-06-21 Resources are updated regularly — the latest version is available at: ncce.io/tcc. This resource is licensed under the Open Government Licence, version 3. For more information on this licence, see ncce.io/ogl.
  2. Phishing is a scam designed to steal data, and therefore a form of data theft.
  3. The Dark Web is legal to use, but facilitates lots of illegal activity.
  4. There is no correct answer; you can prompt learners by asking them if they think they have encountered censorship.