video

Lesson video

In progress...

Loading...

For today's lesson, you will need an exercise book or some paper, and a pen.

You may choose to have an alternative colour pen to improve your work following feedback given in this video.

Hello, my name is Mrs. Ford.

Welcome to our unit, online in the media harmful contact.

In today's lesson, the first lesson of our unit, we will learn about the potential risks of being online.

This includes people pretending to be somebody that they are not, or people being abusive.

We will also learn about malicious software, missharing of information and exposure to misinformation.

We will continue to build up a toolkit of strategies to help to manage any online issues.

Before you started today's lesson, you will have been asked to complete an introductory quiz.

If you haven't done that yet, I suggest you pause the video, go back complete the quiz and then come back into this point.

In today's lesson, we're going to explore how we can protect ourselves from stranger danger and online abuse.

We'll then move on to looking at how we can protect ourselves from malware and misinformation.

We'll be looking at how we can manage online issues and reduce the risks that could be posed by using the internet.

And finally, you'll be asked to complete an exit quiz.

What key words do you need to know for today's lesson? The first of the three keywords is risk.

And risk means the possibility that something bad might happen.

And we navigate these risks every day in your life.

Here are a few examples.

We've got the kitchen, we have somebody sat with a hot drink and their socks on, and we have a living room.

I'd like to in a second to pause the video and think about which of these situations causes which risks.

So one example, if you're stood in the kitchen and you're in front of an oven, there is a risk that you may get burnt.

I want you to pause the video now and think of the risks in each of these situations please.

Now let's have a look at what you got.

Did you think about kettles and kitchens, another reason that you may burn? There may be steam burns if you put your arm over a kettle, or if you spill from the kettle, that could cause burns as well.

As we said, with the use of the oven, when you're taking food out of the oven, you could burn yourself.

There's also the rest that your food might not be fully cooked.

There are risk about the floor being slippy.

If you spill some water as you carry in something over to somewhere else, you could slip and fall on that.

There's the bleaches and the other chemicals that your parents or you might be using or your carers to clean the house, usually kept under the sink.

That's one of the most dangerous places for younger children especially to go to.

What about the liquids or the capsules that might be used in a washing machine? There's risk with that as well.

There are knives in the kitchen, there's electricity in the kitchen, there's water in the kitchen.

But every day you manage that risk and you keep yourself safe.

Also putting on socks.

Did you know that nearly 12,000 people a year end up in hospital just by putting their socks on? Every day you will wake up and you will put your socks on but you will manage that risk, even though you don't know that it's a risk probably, but you will manage it.

You might choose to sit down before you put your socks on so you're less likely to fall over.

Also in living rooms, there are fires in living rooms or heating in living rooms, might be slippery floors again.

It might be that you might have the television with a lot of other things plugged in at the same time and so the electricals might not be safe enough.

It might be that you have blinds with blind cards and if they're not correctly fixed to the wall, that can cause some serious accidents as well.

But every day of your life, you manage these risks, you navigate around these risks.

Going to school if you have to cross the road.

You have worked out how to keep yourself to reduce the chances of something bad happening even though there are risks in place.

What we're going to do today is we're going to look at how you can reduce your risk of something bad happening online.

A lot of being able to reduce risk is having knowledge and understanding and information.

And that's why units like this on Oak National are really important at reducing your risk in everyday life.

Two other key words I'd like you to know about.

These are examples of risk.

Malicious software.

Malicious software is any programme that is used to intentionally cause harm to your computer or a network of computers.

An example in this image is a computer virus.

It causes harm and they are intentionally sent out to cause damage.

Another example of risk is fake news.

So this means misinformation.

And it refers to false or misleading information that is presented to people as news.

What's I'd like you to do to have a reflection on these risks is I'd like you to think about these six things.

And I want you to pause it in a second after we've spoken about them and try and work out which you think is most risky all the way down to which you think is least risky.

You might choose to give each one a number.

You might choose one to be the most risky, all the way down to six, being the least risky.

You're going to look at making toast, lighting fireworks, using social media, putting on your socks, crossing the road, and playing rounders.

You are rating those from most to least risky.

Pause the video and do that now please.

So what did you think? I would argue that it all depends on the safety measures that you put in place.

For each one of these activities, there are things that you can do to make things safer.

Making toast, it could burn you, but if you push down the lever and you step away, and then when it pops off, you can take the toast down.

You can buy special toast grippers.

They're like tweezers, but big ones for toast.

You could even, when you're deciding to take the toast out on plug from the socket so there's no more electricity going through to the toaster.

Use your toast grippers to take it out and then put them down for a couple of seconds until the cooling off is able to spread.

Lighting fireworks.

It is a dangerous activity which is why it's for adults to be doing.

What if you put in certain safety mechanisms to light the fireworks then it can reduce the risk of something serious happening.

Same for social media.

Putting your socks on we've already talked about.

Crossing the road.

I hope that none of you cross the road without putting the safety measures in place that youe trusted adults have taught you and your schools.

If there's a traffic island, use the island.

If there's a green man, traffic lights use those.

Make sure that you're not stood in between two cars when you were looking left and right.

Make sure you give yourself enough space for somebody to see you and for you to see them.

Make sure you're listening and you're hearing for things that could be coming close to you.

Playing rounders.

It's an innocent thing.

It happens all the time when we're playing at school.

I remember in year six, after my sax we used to play rounders all the time in the summer holidays.

But there are dangerous playing rounders but we all put these safety measures in.

Every activity could be seen as a risk and so we need to make sure that we are putting safety measures in place to reduce that risk.

We're going to start to look at stranger danger and abusive behaviour online.

We're going to have a bit of a reflection really of our current use if we're using the internet.

And I'd like to think about who people really are.

How do you know who you are talking to online? When you meet somebody in person, you can see what they're all like, you can hear what they sound like.

And we have something a bit like an intuition where something in our body will tell us if somebody's not quite being truthful to us.

But when you meet someone online, they could have a fake account.

They could be using a fake name.

They could have used somebody else's profile picture, and they could be using somebody else's family pictures.

So like I said, I want us to complete a reflection.

I want you to think about how you interact with people online and who you do.

What safety measures have you put into place that ensures that you know who you are actually adding to your social media profiles or gaming profiles, and who you are talking to online.

Would you know if a trusted person's account was hacked? Would you know if one of your friends had a social media account that you trusted and you interacted with all the time and somebody took over that account and was talking to you? You didn't know who they were, they were an unknown person or a stranger and they were talking to you, how would you know the difference between the fact that you might be talking to your friend online or somebody else who might have had that account? And I'd like you to think about what you would do if you were suspicious, if you suspected that you had been talking to somebody that you didn't know, what would you do about it? Pause the video and have a think about those questions please.

The key things to know, there are three key things that you need to take away from this unit.

If at all you feel suspicious, uncomfortable, or you feel like you kind of weigh in over your depth here, you need to talk to a trusted adult.

You need to block the account of the person and you need to report it.

Even if it's proven that you were incorrect, you are keeping yourself safe by blocking until you definitely know that you are talking to the right people.

So talk to a trusted adult.

That may be in school, that may be family members, that may be parents of friends.

Block the accounts that are making you uncomfortable and report the activities.

We're going to think a bit more here.

And I want you to think if you have social media, think about your social media pages, bearing in mind that most social media platforms expect you to be at least 13 years old.

That's where they say it is safe enough for you to have awareness to keep yourself safe and to follow the settings.

If you have a social media page, does your social media profile give personal information easily away to strangers? Can people who aren't your friends easily see images of you? And do you know how to change your setting to provide more security to your accounts? Pause the video and have a think about those things please.

My advice to you is to check your settings.

But also when you think your settings are at the right point for you, ask a trusted adult to check again.

It is so easy even if your account is locked down and people can't add you, or can't see the majority of it, it is so easy that strangers can see your profile picture.

Sometimes they can see your date of birth if you've put your birthday in.

Sometimes there are some posts where you've tagged other people that aren't private to anybody outside of your trusted circle.

Sometimes your friends have tagged you into one of their pictures or one of their posts and strangers can see that as well.

So ask a trusted adult to check your social media profile settings.

We're also going to look at the idea of online abuse.

There are many types of online abuse.

And online abuse is abuse that happens on the internet.

This can range.

This can include cyber bullying, emotional abuse, social exclusion online.

So not including people in group chats, not adding people to certain pages that are set up about other people or to celebrate people, flaming people online, and sexual abuse, grooming and exploitation.

If you know somebody who is abusing you online or somebody else, the first thing you can do remember I told you the three things I wanted you to remember, speak to a trusted adult.

In most situations or instances, any abuse will not go away just by ignoring it, or responding and reacting to it.

You need to speak to a trusted adult.

You also then need to block the user that is abusing you or somebody else and report their activity.

You can report their activity to the platform that they're on, but also report it to the trusted adults, and in some cases you can report it to the police.

There are helpful websites for you to be able to go to.

If you go on to Childline website, you will find more information about what to do if somebody is abusing you online or your friends.

And there's another website called ThinkUKnow as well.

They're both reliable websites that can help you through this.

Let's have a look at malicious software.

So malicious software can be shortened to the term malware.

So you've taken the mal from the malicious, the ware from the software, putting them both together and it's called malware.

And it's any software that's something on your computer, sent to your computer that's introduces harm to that computer or network.

There are so many types of malicious software.

These include worms, spyware or hardware, wipers, viruses, Trojan horses, scareware, ransomware, rogue software and rootkits.

As you can see, there are lots of different types.

And their aim is to usually to steal protected data, to add software without the user's consent, or to delete confidential files.

To reduce our risks of this, we need to know what we can do and what we can be thinking about.

The key thing here is to be wary of opening emails.

This is the most popular way that is used to spread malware.

They are usually disguised and look authentic so they look like they are coming from genuine bodies or companies that you may use.

And the disguise might be in the form of your bank, HMRC, that's a government body, mobile phone companies, or even a friend.

If an email ever asked you to provide passwords or personal details, you must phone the company directly.

Don't use the phone number link on the email.

Go into a search engine, type in the company's name, get the phone number for that if you don't have a document in your house already.

Phone them up and ask them, is this email authentic? I'm being asked to put my date of birth and my full name, my address, my passwords.

Any of those things, you should be checking that that is correct and that company is asking for it.

Most companies will not ask that, will not take you to a link where you have to provide those details.

You may also receive emails from a friend.

Their email system might've been hacked, and then they will send an email out to everybody in their address book, asking them to click on a link.

You then click on the link and then that downloads the malware to you, and sometimes they can hack your emails and continue sending to all of your email address list, et cetera.

So let's look at Joe's first email.

This is from Ellie, one of his friends.

And the headline for this is, check this out.

And it just says, "Hey Joe.

"Check out this cool website, "www.

coolwebsite.

com." Always have a think, is this email suspicious or not suspicious? I'll give you five seconds.

If you said suspicious, then you will be correct.

Even though it's from Ellie's email, she doesn't sign it off.

It isn't asking him how he is, or saying what a great day they've had at school.

It is telling him straight away, go to this website.

It doesn't give any details or description about the website, it doesn't sign off in any way.

So this email would be suspicious.

And if he clicked on this link, it might take him to a website that could download some malware.

Next one.

From your bank account.

And it says, password needed.

Dear Joseph, someone is trying to take money from your bank account.

Click here to stop this from happening now.

You must have your bank account details and password ready.

Is this email suspicious or not suspicious? I'll give you a few seconds to think about it.

If you said suspicious, then you will be correct.

No emails would include, will be sent from banks.

Banks would send an email that would say, "Give us a call please." It says, click here.

You can't even see what link you clicking.

Straight away it's a hack.

You don't know what website it's taking to you.

They would contact you either through email or with a PDF attached that you have to open, or they might send a letter and ask you to come in to the bank if something like this is happening.

You won't have to give details over the phone and you won't have to give details over email because these are your personal information details.

And usually even if you go to a bank, you don't hand your password over to the person, they would ask you to type it directly into a keyboard when they aren't looking because it is that precious to keep a hold off.

Let's have a look at the next one.

So this is a text message.

And this is from mom.

Hi Joe.

Just reminding you about our meal out tonight with granny and grandpa.

Don't forget to put your meal from this menu before we go because the table isn't booked for long.

And then there's a website address.

Do you think that this text message is suspicious or not suspicious? I'll give you a few seconds to think about it.

If you said not suspicious, you'd be correct.

It's from mom's number, and yes that could be hacked in, but it gives details about the fact they're going for a meal, that is tonight, that they are going with granny and grandpa.

It's a naggy one as well.

Some parents might be a bit more naggy when they text message you.

And it gives a website to go to.

Now this sounds like mom's already nagged Joe and said, "Call mom, go pick your meal before we go." So Joe can click on that link, or if he wanted to, he could go into a search engine and type in, eatouttonight.

co.

uk and it might load up there.

And then you can check if that website is something that will be shown on a search engine.

So how can we further reduce the risk of malicious software? You are supposed to add malware protection to your device.

Sometimes even downloads from genuine sites can include malware.

And this means that you need to have an extra layer of protection other than relying solely on your own vigilance.

So you having a look and checking through emails and checking anything that you're being asked to download.

A good antivirus will protect you.

There is a massive range of antivirus software.

You can get free antivirus, you can get antivirus for 10, 15 pounds that download.

Some of them will have ads to show you for the reason that they are free, or you can buy more expensive antivirus that won't have any adverts.

But if you search into the search engine, reliable antivirus software, it will show you a range of reviews from reputable companies and you can download an antivirus that way.

It helps you by checking links that you are opening before they open.

So when you click on a link, it will do a scan of the website and it will pop up and say, this link is suspicious.

Would you like to continue? And it makes you think about it, and then you might choose to back out.

They also safeguard your bank account details.

They provide password management tools, searching for hidden malware threats.

So even if you're just working online, they will do background searches to see if there's any malware being sent to your computer and they will block them.

They're a good shield for anything that might be coming through.

And they also warn you about suspicious websites.

We know that we have the rights to be protected but we also have the responsibility to protect other people from these things happening.

You should, if you get any suspicious messages, report these.

Show them to an adult first and then that adult can forward it on to the suspicious email reporting service.

And this is run by the government department who are trying to reduce scamming and tackle the crimes online.

There is an email address and it's reports@phishing.

gov.

uk.

Any websites with.

gov.

uk are run by the government and so you know that this is safe.

You can forward the email directly or you can take screenshots of the email.

Any suspicious text messages could also be forwarded for free to 7726.

That then sends it to your mobile provider so the person that you pay your mobile phone bills to, and then they will investigate it.

And if it is malicious, they will take action against the people that are sending the messages.

So that was quite a lot of information.

I want you to think about that information.

And I want you to think about the benefits to installing antivirus and malware protection to your devices.

You're going to create a spider diagram to show your thoughts.

And here's one example of how you might set it out.

In the centre I've included benefits of malware protection because that's what we're thinking about.

And one example of this, is that they will block spam and adverts to your computers.

I'd like you to pause the video and have a think and answer that mind map now please.

So if you come back, that's because you've had a real good going, you've had a think about the work that you've been doing.

I'm going to give you some more information and then you'll pause the video and add to your mind map.

So we started off with blocking spam and adverts.

They also protect you from potential malicious websites.

They protect your data and the files that you are creating from being hacked or deleted.

They protect you from spyware and phishing attacks.

They defend you against hackers and data thieves.

It protects your passwords and login details.

They also protect your computer from any removable devices.

So if you plug an external hard drive, or a memory stick in, or an SSD card, all those things your computer will be protected from because the malware protection will search those things to see if there's anything dangerous on there before it allows you to open it.

Finally, it helps to keep the speed going in your computer.

Your computer speed can reduce massively if there is a malware attack.

So it keeps your computer going at speed.

I would like you to pause the video and add anything that you have missed from your list please.

Let's move down now to misinformation.

Another risk of the internet is misinformation.

Remember this means that something is inaccurate or completely false.

And then this information is spread but it's made to look like it's true news and accurate.

You might've heard this being called fake news.

And its aim is to intentionally deceive people which causes harm to some.

When have you heard the term fake news before? Pause the video and have a think.

So we're going to look a bit further about misinformation.

Misinformation isn't just founding articles online or news reports.

It can also be seen in memes and videos that people share online.

But how does that misinformation gets spread? So usually someone will read an article, look at a meme, or watch a video, and either reacts to it in a way that it confirms something that they already think.

They think, "Oh this really shows my belief." Or it's something horrifying and they think, "Oh people need "to see this because this is weird." And then they will share this on with their family and friends.

People react in different ways.

So like I've just said, they might agree with that, or they might be shocked by it, which usually leads them to then share it again with other people out of that immediate friends and family circle.

There are also bots that are used to spread the misinformation and they then retweet things and share posts.

Have a pause And think about times when you might have shared an article, a video, or a meme that you either were horrified by, shocked by, or that you fully agreed and thought you needed to share it with other people.

Now, after that, the story then might get picked up by a famous person.

So remember they both share it on quite a wide scale.

And so somebody famous or somebody with a wide audience might pick up that story, video, meme, et cetera, and then they will share it.

And because they are famous, they will have a wider audience and more people will read it.

Then because the story is becoming more popular, or because somebody famous has shared it, websites might pick up that information because they want to receive more clicks to their website.

They want to attract people to their page so they pick up that story.

And then usually there are trusted sites who will fact check the story and they'll print the factual understanding of the misinformation.

However the trusted sites and the fact-checking gets to fewer people than the people who have already seen the message that has been shared online.

I'd like to think about what you can do to stop the spread of misinformation.

The first thing that you need to do is pause before you share something.

Read a story, and some social media sites for example Twitter will ask you to check.

Have you read this article? Would you like to read this article before you share it? So make sure that you read a story first.

What questions might you think about when trying to work out if a story is truthful or not? Pause the video and have a think please.

Here are some questions that I will be thinking about.

Who is the story aimed at? Who's the audience that's being asked of this? You'll be asked this when you're in English lessons or history lessons or RE lessons.

You might also be asked when you are examining in media, who is this story? Who is the audience? What does the author want to say? Is it a joke? Is it an advert? Can you also find the same story somewhere else and does it give the same information? Can you find trusted sites, like the BBC website and is it on there? If it's not, if it's not in any of the major news outlets, it's likely that it might not be a truthful story.

You need to find out about the author.

Most websites will have links to the details of the author of the person who's created the article or the meme or the video.

If it's not provided, be wary.

Do you really want to be sharing something that can't be linked back to the original person? When you do get the information, look at which pieces have already written before and the intention behind the piece.

Is the information based on their opinion or is it based on facts? I'd like you to pause the video and think about how you might be able to spot fact from opinion.

The next tip after reading the piece, learning about the author is to check out the website.

Is the URL a trusted one? Examples such as.

com,.

net,.

gov.

uk,.

org,.

edu and.

co.

uk are more likely to host trusted sites.

It's not guaranteed.

Another question to think about is, is there any spelling or grammatical mistakes in this? Usually that's key to lock in for misinformation too.

You should also check the date that it was posted.

How long ago was the story, the meme, the video, or the pictures posted? Are you reading something that is outdated or something that happened years ago? Because not everything that you see shows what is happening today.

During the coronavirus pandemic, there have been videos or pictures sent out of something that's claimed to be happening today.

However, it was something that was happening four years ago.

When you look further into it, you can do an image search.

You can take the image and drop it into a search engine.

And the image search will tell you where that image is from.

Sometimes it might throw up news reports from a few years ago, and you can find out clearly where the images come from.

Finally we're looking at managing online issues.

So we've talked about these risks and about how you can reduce your risk to make your life safer.

What are the key things that you can do to protect yourself online? We need to discuss safety rules as a family.

So with your parents or carers, you need to sit down and talk about what are our boundaries as a collective group? What do we think helps to keep us safe? Are the settings on my device set to a high standard? And are the settings on individual websites also set to a high standard? You need to ensure that you're also following the expected behaviour rules online.

This is something again that you can explore in the previous units, online and the media rights responsibilities and keeping safe.

You need to make sure that you are blocking users and that you are reporting anything that makes you feel upset or uncomfortable.

Going back to our three key things, tell a trusted adult, block, and then report.

You could also mute conversations or particular words or phrases on your social media profile.

If there's something that's triggering to you, you can mute those words and then they won't be able to see them on your wall.

And also increase your privacy settings and keep your personal information just that, personal.

Quick reflection task.

I'd like you to think back over the learning that we've had in this lesson.

And I want you to create a guide for all the pupils that explores ways in which that they can reduce their own risks online.

Quick thing about what we've explored during this lesson just to give you a recap, we've looked at stranger danger online.

We've looked at online abuse, malicious software, malware, we've looked at misinformation, and also managing online issues.

You might choose to turn it into a leaflet like the image on the slide.

But it should be a guide to explain to all the pupils about how they can reduce their online risk.

And finally you can also share your work with Oak National.

If you'd like to share the work that you've completed today, you can ask a parent or carer to share your work on Twitter adding @OakNational and #LearnwithOak.