+ All Categories
Home > Documents > Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

Date post: 01-Apr-2015
Category:
Upload: jerome-pilley
View: 220 times
Download: 0 times
Share this document with a friend
Popular Tags:
24
Be safe, Be Secure, Be Smart.... Be in Control!
Transcript
Page 1: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

Be safe, Be Secure, Be Smart....Be in Control!

Page 2: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

Internet and e-mailTask 1

Page 3: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

1. What is E-Safety? Write what you think it covers in your own wordsE-Safety is about using ICT (Information and

Communication Technology) in a safe and responsible way.

To be safe on the internet

Page 4: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

2. What are the dangers of using the internet?VirusesHackersPhishingMalwareIdentity TheftInaccurate InformationEncounter with Paedophiles Chat RoomsPop-up

Page 5: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

3. What is phishing?An illegal activity where someone pretending

to be an organisation or someone they are not trying to get hold of personal information.

Examples Email sent to you asking you to update your

informationLinks on websites that take you to another

page asking for personal information

Page 6: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

4. What are the dangers of using e-mail?PhishingVirusesCyberbullyingPeople trying to meet you privatelySpam

Page 7: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

5. Tips you could give someone when using the internet and e-mail to keep them safeFirewallPop-up blockerAnti-VirusDelete junk e-mailNever visit untrusted websitesDo not click on links you are unsure ofNever give out personal detailsDon’t talk to someone you don’t know via e-

mail, chat room, Facebook...

Page 8: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

6. What should you do if you had been a victim of technology related problems?Tell your parentsTell your teachersReport it on CEOP websiteTell a responsible adult

Page 9: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

7. PosterA clear titleLogoPurpose of the posterImagesColoursRelevant information

Page 10: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

Mobile technologyTask 2

Page 11: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

List all the things a mobile phone can doMake phone callsText messagingUsing the internetTake photographsVideo recordingVoice recordingDownload

applicationPlay games

Check e-mailTime and dateSend and receive

dataBlue toothInfraredWi-Fi

Page 12: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

Mobile Phone researchTask 3

Page 13: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

What mobile phone are you researching?

Page 14: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

Mobile Phone FeaturesTouch ScreenCamera

5mpx, 2mpx etcQwerty keyboardDual band Wi-FiBluetoothMailbox/Blackberry

Enterprise Services

Video recordingHDVideo CallingMemory

8 GB, 2 GB etcMp3 player/RadioInstant messagingInternet

Page 15: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

How can the phone be used in a positive way?Making calls to your friends and families to

see how they areTo keep in touch with peopleKeep up to date with news on the internetHave e-mail set up on your phoneTaking pictures and video recording

important moments

Page 16: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

How can the phone be misused?To send messages to people that you should

notMake prank phone callsCyberbullying - Threaten someone, send

nasty messagesUse phone email to spam or phishingVideo recording happy slap or violence to

post on internet

Page 17: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

cyberbullyingTask 4

Page 18: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

1. What is Cyberbullying

Cyber bullying is when someone uses the internet or mobiles to deliberately upset someone else. This is a form of bullying and you shouldn’t have to put up with it.

Page 19: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

2. What happened to Kylie Kenney? What could she have done to get help?Two of Kylie’s class mates made a website,

called it ‘Kill Kylie Incorporated’ and threatened her.She could have reported the website and her

class mates to her class teacherTell her parents or guardianReport website on CEOP

Page 20: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

3. The Star Wars Kid!!!The class mates didn't have Ghyslain’s

permissionThey stole the videoPeople use the video to create their own

versionsPeople can mock Ghyslain

Page 21: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

4. Word DefinitionsFlaming

An intense argument that normally takes place in chat rooms, instant messaging and e-mail.

CyberstalkingA form of harassment through text messages and e-mail

MasqueradingCyberbullying where the bully pretends to be someone

they are not

OutingWhen you show personal information or messages to

someone that should not see it.

Page 22: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

5. Mediums that Cyberbullying takes place withinE-mailText MessagesSocial Networking Sites - MySpacePicture MessagesInstant MessagesChat roomsOnline PollsWebsites

Page 23: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

6. Notice boardProtect your number. Dial 1831 before you call to set

your number to private.Protect your phone's Bluetooth connection. Set

Bluetooth to 'hidden'.Switch your mobile off at night.Use the privacy settings in your social networking

site.Always use a free email address (like Gmail or

Hotmail) that you can get rid ofRemember that being online does not make you

anonymous.Treat others with respect, and expect the same of

them.If you don't want something to go around the world,

don't post it!

Page 24: Be safe, Be Secure, Be Smart.... Be in Control!. Task 1.

What is the best approach to cyber bullying?

Report abuse to police, parents, responsible adult.

What would you do?


Recommended