Loading...
Hello, my name is Ms. Powell, and welcome to Computing.
I'm so pleased that you decided to join me here today.
In today's lesson, we're going to be talking about how we can stay safe online.
Let's get started.
Welcome to today's lesson from the unit Online Safety.
This lesson is called Being Safe Online.
And in this lesson, we'll discuss the main safety concerns of being online and reflect on our own online activity from a safety perspective.
We'll be using these keywords throughout today's lesson.
Let's take a look at them.
The first word is prevention.
Prevention.
This means stopping something from happening.
The second word is phishing.
Phishing.
This means a scam conducted by sending fraudulent emails disguised as communication from reputable companies that ask the receiver to reveal personal information.
The next word is malware.
Malware.
This means malicious software, a programme designed to cause damage to computer systems, corrupt or change files, steal data, or cause disruption to services.
Lesson outline.
Being Safe Online.
This lesson is split into two sections.
In the first section, we'll discuss categorising different types of online threats.
In the second section, we'll discuss recognising proactive safety measures.
Let's get started with the first section, categorise different types of online threats.
The internet offers a wide range of information and opportunities for entertainment, communication, and education.
You probably have access to the internet recently.
I wonder what devices you've used.
Maybe you've used a laptop or a tablet.
This might have been for fun or for work at school.
Some of you might have smartphones and use that for social media.
Although the internet can be used in many positive ways, there can be negative effects of using the internet.
During this lesson, you'll think about the different types of online safety threats that can occur and how you can try to prevent them from happening to keep yourself safe.
Here are some keywords and phrases related to online safety.
Big data, online hate crime, censorship, personally identifiable information, online reputation, fake news, malware, targeted advertising, virtual private network, the Dark Web, phishing scam, right to privacy, filter bubble, obscene content, data analytics, encryption, digital personality, right to access.
Do you know what all of these words mean? Pause the video and have a look at the words.
See if you recognise any of them.
When we talk about online threats, it's important that we understand the terms used.
It can be helpful to recap the meanings of keywords and phrases to make them easier to recall in the future.
Here are some examples.
Malware.
Malware means malicious software.
If you take a look at the word malicious software, you can see that we've used the first part of malicious, mal, and the second part of software, ware, to create the word malware.
Malware is a programme designed to cause damage to computer systems, corrupt or change files, steal data, or cause disruption to services.
Phishing.
Phishing is a scam conducted by sending fraudulent emails disguised as communication from reputable companies that ask the receiver to reveal personal information.
Fake news.
Fake news means news that contains deliberate disinformation.
Targeted advertising.
This means adverts that are tailored to the buying history, demographic data, and behaviour of the customer.
Online hate crime.
This is a crime that occurs online that is motivated by hate or prejudice against someone because of their race, religion, disability, sexual orientation or gender identity.
The Dark Web.
This means websites that are hosted on the Dark Web and therefore are not indexed by search engines and can only be accessed through specific software.
Obscene content.
This is content that is considered to be depraved or has the potential to corrupt potentially because it depicts illegal acts or is sexually explicit.
I have a question here for you.
I'd like you to give it a try.
What is the definition of malware? Is it A, adverts that are tailored to the buying history, demographic data, and behaviour of the customer? Is it B, large datasets that are analysed in order to identify patterns and trends often used by organisations to better understand their customers? Or is it C, malicious software that is designed to break into and/or harm a computer system? Pause the video and have a quick look.
Do you think the answer is A, B, or C? What is the definition of malware? That's right, the answer's C.
Malicious software that is designed to break into and/or harm a computer system.
Do you remember malware comes from mal in malicious and ware from software.
I've got another question here for you.
I'd like you to give it a try.
What is the definition of a phishing scam? Is it A, a deception conducted by sending fraudulent emails disguised as communication from reputable companies that ask the receiver to reveal personal information? Is it B, a process of converting data into code in order to protect information and prevent unauthorised access? Or is it C, content that is considered to be depraved or has the potential to corrupt potentially because it depicts illegal acts or is sexually explicit? Pause the video and have a quick think.
What is the definition of a phishing scam? Is it A, B or C? Well done.
The answer is A.
A phishing scam is a deception conducted by sending fraudulent emails disguised as communication from reputable companies that ask the receiver to reveal personal information.
There are actually several forms of phishing.
For example, spear phishing.
Spear phishing targets specific individuals in an organisation to steal login credentials.
Phishing is when someone uses a phone to steal information, pertaining to be a friend or a relative.
Email phishing is when you send emails that look legitimate.
However, they're sent for fraudulent reasons.
HTTPS phishing send out links to fake websites.
Pop-up phishing use pop-ups on your phone or device to get you to download files and enter information.
Well done.
Let's try another one.
What is the definition of fake news? Is it A, a phenomenon created when the algorithms in online spaces such as search engines and social media platforms predominantly only provide users with content that they agree with and do not expose them to different ideas or opinions? B, news that contains deliberate disinformation? Or C, the rights one has under the law to request a copy of one's personal data? Pause the video and have a quick think.
What is the definition of fake news? Is it A, B, or C? Fantastic.
It's B.
Fake news is news that contains deliberate disinformation.
I'd like you to try one more.
What is the definition of targeted advertising? Is it A, a network that operates using public infrastructure but uses security mechanisms such as encryption to restrict access to authorised users? Is it B, techniques used to extract meaning from data, often with the objective of improving a company's productivity? Or is it C, adverts that are tailored to the buying history, demographic data, and behaviour of the customer? The answer is C.
Targeted advertising are adverts that are tailored to the buying history, demographic data, and behaviour of the customer.
I'd like you to try one more.
What is the definition of the Dark Web? Is it A, websites that are not indexed by search engines and can only be accessed through specific software? Is it B, any information that can either by itself or in combination with other data uniquely identify you? Or is it C, the persona created from the content you have shared online? Pause the video and have a quick think.
Is the answer A, B, or C? Well done, it's A.
Websites that are not indexed by search engines and can only be accessed through specific software.
Let's try one more.
What is the definition of obscene content? Is it A, the suppression, prohibition, or withholding of information that is considered unacceptable or dangerous, for example, because it is obscene or a threat to national security? Or is it B, content that is considered to be depraved or has the potential to corrupt? Or is it C, a network that operates using public infrastructure but uses security mechanisms such as encryption to restrict access to authorised users? Pause the video and have a quick look.
What is the definition of obscene content? Is it A, B, or C? Fantastic.
The answer is B.
Obscene content is content that is considered to be depraved or has the potential to corrupt.
This is the last one I'd like you to try.
What is the definition of online hate crime? Is it A, the rights one has under the law to keep data about oneself confidential? Is it B, a crime committed in digital spaces driven by prejudice or biassed against someone's race, religion, disability, sexual orientation or gender identity? Or is it C, the reputation of a person, company, or product created by the content they produce and the way they behave online? Well done for giving that a try.
It's B, a crime committed in digital spaces driven by prejudice or bias against someone's race, religion, disability, sexual orientation, or gender identity.
Categorise different types of online threats.
Online threats can be categorised into different types of safety threats.
For example, number one, data theft or data misuse.
Number two, legal or illegal.
And number three, a common occurrence or quite rare.
For example, do you think that phishing is? A form of data theft or a form of data misuse? Data theft is the unauthorised acquisition of data, often with malicious intent.
Data misuse, on the other hand, is the use of information in a way it's not intended to be used.
This could be due through negligence or purposely.
Pause the video and have a quick think.
Is phishing a form of data theft or a form of data misuse? This is Lucas, and Lucas says, "I think phishing is a form of data theft, but it can lead to data misuse depending on how the stolen data is used." Do you think the Dark Web is legal or illegal? Pause the video to have a quick think.
This is Sam.
Sam says, "I don't think the Dark Web is illegal, but some people use it to do illegal things." Did you know the CIA has an official presence on the Dark Web for people who want to contact them and not be traced? This is a legal reason to use the Dark Web.
However, there are also ways to buy illegal things on the Dark Web.
Do you think fake news is a common occurrence or a rare occurrence? Pause the video and have a quick think.
This is Jacob.
Jacob says, "I think fake news is a common occurrence.
I often hear stories in the news about it." You've probably noticed online that now there's a lot of AI images used in fake news, which can make it really hard to detect.
I have a task here for you, and I'd like you to give it a try.
Which of the safety threats in the lesson, A, could be a type of data theft, or B, could be a type of data misuse? Pause the video and have a quick think.
Which of the safety threats we've discussed in the lesson could be data theft or data misuse? I have another task here for you.
I'd like you to try it.
Which of the safety threats in the lesson, A, could be legal, B, could be illegal? Pause the video and have a quick try.
Now, I'd like you to think which of the safety threats in the lesson are A, a common occurrence, or B, could be quite rare? Pause the video to complete the task.
Which of the safety threats in the lesson are, A, something that has happened to you before, or B, is something that hasn't happened to you before? Pause the video to finish the task.
Which of the safety threats in the lesson is something you can protect yourself from or something you can't protect yourself from? Pause the video and have a quick think.
I'd like to give you some feedback on those answers.
Which of the safety threats in the lesson, A, could be a type of data theft? Malware and phishing.
Both can be used for data theft.
What could be used as a type of data misuse? Fake news, malware, obscene content, online hate crime, phishing, targeted advertising could be a type of data misuse.
Malware can include things such as viruses, worms, Trojans, ransomware, spyware, adware, wireless malware.
These can all lead to the theft of data.
After the data's been acquired, it will most likely be misused in some way.
Which of the safety threats in the lesson could be legal? The Dark Web is legal.
Fake news is legal, and targeted advertising is legal.
Which could be illegal? Malware, obscene content, online hate crime, phishing scams, and targeted advertising can also be illegal.
Having you noticed that targeted advertising can be both legal or illegal? Illegal targeted advertising might violate data protection laws.
They could mislead consumers.
They might use personal data without consent or be deceptive or aggressive.
Which of the safety threats in the lesson are A, a common occurrence? The Dark Web, fake news, malware, phishing, and targeted advertising all occur very commonly online.
Could be quite rare.
Obscene content and online hate crime can be quite rare.
Question four, is the threat something that has happened to you or something that hasn't happened to you before? This is Lucas.
Lucas says, "I've definitely been a victim of fake news, sometimes I get caught out.
I also think I've seen targeted advertising on my social media accounts." Number five, is the threat something you can protect yourself from or something you can't protect yourself from? This is Sam.
Sam says, "I know I can choose to avoid accessing the Dark Web and obscene content online.
I can try to protect myself from malware and phishing by doing things like installing virus checkers on my devices.
With fake news and targeted advertising, I think I just need to question everything online, and if it doesn't sound right, I can look into things further.
I can't control how other people behave towards me, but if they make any comments I don't like, I know how to report it." Well done, that brings us to the end of the first section, categorising different types of online threats.
Let's now try the second section.
Recognise proactive safety measures.
Using the internet.
What do you use the internet for? Think of as many ways as you can in which you might use the internet.
Pause the video and jot some of your ideas down.
Think about the ways in which you use the internet.
How does using the internet in that way expose you to online safety threats? Perhaps you use email.
Pause the video and have a quick think.
What kind of safety threats might occur if you're using email? Safety threats that you might see are phishing scams, malware, or targeted advertising.
All of these we can receive into our email inboxes.
How can you protect yourself online? Are there any precautions you can take when you are online to protect yourself from the online safety threats you identified? What do you think? If you are accessing your emails, how can you protect yourself from phishing scams, malware, or targeted advertising? Pause the video and have a quick think.
You can try to minimise the risk of targeted advertising by not sharing your email address with people you don't know.
Also, you can minimise the risk of phishing scams by only answering emails from trusted sources.
Likewise, if you read the email carefully, you might notice things like grammatical errors and spelling mistakes or dead links.
These are all clues that it could be a phishing scam.
How can you protect yourself and maintain a positive reputation when communicating online? Do you think it should be A, be mindful of what you share? B, check your privacy settings? Or C, keep software and apps updated? Pause the video and have a quick think.
How can you protect yourself and maintain a positive reputation online? I think all of these would be correct.
A, B, and C.
All of these are helpful ways to maintain a positive reputation.
How can you protect yourself in digital spaces and identify fake news when accessing content on social media? A, check the source.
B, check your privacy settings.
Or C, check if the story appears on other reputable sites.
Pause the video and have a quick think.
You can check the source of the news and also check if the story appears on other reputable sites.
Don't forget, anyone can make a webpage on the internet and can create fake news on it.
If you check the source and it looks suspicious, it's probably best to disregard it.
I have a task here for you.
I'd like you to think about the ways in which you use the internet.
For each of the different internet activities you thought of, list any potential online safety threats that the activity exposes you to.
Then think about the precautions you take to keep yourself safe online.
Pause the video to finish the task.
I've got another task here for you.
If you can, share your list of precautions with a partner.
Do they agree that the precautions you have planned will help to reduce the threat? Pause the video and try the task.
I'd like to give you some feedback.
Alex looked at his friend's piece of work and shared his opinion.
Searching the World Wide Web.
Potential threats are malware.
Precautions, don't click on links online.
Alex says, "When I'm online, I don't click on any links, so I'll be fine." Alex is incorrect.
Some online threats do not require you to click on a link or open a file.
What do you think? What could be another way that Alex could protect himself from.
What do you think is another way that Alex could protect himself from malware? Perhaps he could make sure that his antivirus software is updated and be mindful of the links that he clicks on.
There are many ways that you can keep yourself safe.
Prioritise strong passwords and change them regularly.
Try to use multifactor authentication when you can.
Keep your devices updated.
Be cautious about suspicious links and downloads.
Double check information as things can look legitimate and think before you click.
Be mindful of your privacy settings.
Choose secure internet connections.
And keep your information backed up securely.
Summary.
Being Safe Online.
The internet offers a wide range of information and opportunities for entertainment, communication, and education.
The internet exposes users to online safety threats.
Phishing is a tactic used by scammers to gather personal data and sensitive information.
Malware is malicious software designed to do harm to computer systems. There are a number of precautions you take to minimise the risks of online safety threats.