Monday, 30 November 2015

E-safety

                                              E-safety



                                                 Top eight E-Safety Tips



  • Always think of your personal safety first when using  your mobile phone. It is easy for anyone to lie about who they are online, so you can never really be sure about who you are talking to.
  • Do not give out any personal information about yourself online to people you do not know. This includes your full name, address, street name, postcode, or school name. 
  • Never give your contact number to anyone who you don’t know. 
  • It’s a good idea to use a nickname rather than your real name. 
  • Never give out pictures online or over a mobile unless you know the person in real life. 
  • Always use private settings whenever you are setting up a social networking page.
  • Anything you post or upload to the internet is there forever so be very careful what you put online.
  •  Never go onto webcam with people you don’t know in real life. 

Monday, 16 November 2015

computer security threats

                           Computer Security Threats 


Botnets

If you've never heard of a botnet, it's likely because they go largely undetected.

What they are:

A collection of software robot creates an army of infected computers are remotely controlled by the originator. 

What they can do:

  • Send spam emails with viruses attached.
  • Spread all types of malware.
  • Can use your computer as part of a denial of service attack against other systems.


Hacking

Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.

What it is:

The process by which cyber criminals gain access to your computer.

What it can do:

  • Find weaknesses in your security settings and exploit them in order to access your information.
  • Install a Trojan horse, providing a back door for hackers to enter and search for your information. 


Pharming

Pharming is a common type of online fraud.

What it is:

A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

What it can do:

  • Convince you that the site is real and legitimate by spoofing or looking almost identical to the actual site down to the smallest details. You may enter your personal information and unknowingly give it to someone with malicious intent.

Phishing

Phishing is used most often by cyber criminals because it's easy to execute and can produce the results they're looking for with very little effort.

What it is:

Fake emails, text messages and websites created to look like they're from authentic companies. They're sent by criminals to steal personal and financial information from you. This is also known as “spoofing”.

What it does:

  • Trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action.

Viruses

Most people have heard of computer viruses, but not many know exactly what they are or what they do.

What they are:

Malicious computer programs that are often sent as an email attachment or a download with the intent of infecting your computer, as well as the computers of everyone in your contact list. Just visiting a site can start an automatic download of a virus.

What they can do:

  • Send spam.
  • Provide criminals with access to your computer and contact lists.
  • Scan and find personal information like passwords on your computer.
  • Hijack your web browser.
  • Disable your security settings.
  • Display unwanted ads.


   Precautions:



Monday, 9 November 2015

Digital Citizenship

                          Nine Elements of Digital Citizenship


1.   Digital Access:   full electronic participation in society.
Technology users need to be aware that not everyone has the same opportunities when it comes to technology.  Working toward equal digital rights and supporting electronic access is the starting point of Digital Citizenship. Digital exclusion makes it difficult to grow as a society increasingly using these tools. Helping to provide and expand access to technology should be goal of all digital citizens.  Users need to keep in mind that there are some that may have limited access, so other resources may need to be provided.  To become productive citizens, we need to be committed to make sure that no one is denied digital access.

2.   Digital Commerce:   electronic buying and selling of goods.
Technology users need to understand that a large share of market economy is being done electronically. Legitimate and legal exchanges are occurring, but the buyer or seller needs to be aware of the issues associated with it. The mainstream availability of Internet purchases of toys, clothing, cars, food, etc. has become commonplace to many users. At the same time, an equal amount of goods and services which are in conflict with the laws or morals of some countries are surfacing (which might include activities such as illegal downloading, pornography, and gambling). Users need to learn about how to be effective consumers in a new digital economy. 

3.   Digital Communication:   electronic exchange of information.
One of the significant changes within the digital revolution is a person’s ability to communicate with other people. In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else. Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime. Unfortunately, many users have not been taught how to make appropriate decisions when faced with so many different digital communication options.

4.   Digital Literacy:   process of teaching and learning about technology and the use of technology. 
While schools have made great progress in the area of technology infusion, much remains to be done. A renewed focus must be made on what technologies must be taught as well as how it should be used. New technologies are finding their way into the work place that are not being used in schools (e.g., Videoconferencing, online sharing spaces such as wikis). In addition, workers in many different occupations need immediate information (just-in-time information). This process requires sophisticated searching and processing skills (i.e., information literacy). Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.  Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.

5. Digital Etiquette:   electronic standards of conduct or procedure.Technology users often see this area as one of the most pressing problems when dealing with Digital Citizenship. We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).   Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use. It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.

6.   Digital Law:   electronic responsibility for actions and deeds 
Digital law deals with the ethics of technology within a society. Unethical use manifests itself in form of theft and/or crime. Ethical use manifests itself in the form of abiding by the laws of society. Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime. There are certain rules of society that users need to be aware in a ethical society. These laws apply to anyone who works or plays online. Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.

7.   Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world.Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive. 

8.   Digital Health & Wellness:   physical and psychological well-being in a digital technology world.
Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there are inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training. 

9.   Digital Security (self-protection):   electronic precautions to guarantee safety. 
In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community. It is not enough to trust other members in the community for our own safety. In our own homes, we put loc

ks on our doors and fire alarms in our houses to provide some level of protection. The same must be true for the digital security. We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.


                                                                 

Monday, 2 November 2015

Cyber safety

                                               Cyber-Safety



What is cyber safety?

Cyber safety is the safe and responsible use of Information and Communication Technologies . Net safe's approach to cyber safety is founded on:
  • Maintaining a positive approach about the many benefits brought by technolog
  • Precautions from cyber safety:ies
  • Encouraging the public to identify the risks 
  • Putting in place strategies to minimise and manage risks
  • Recognising the importance of effective teaching and learning programmes.

  1. Always ask an adult if you’re unsure of anything when you are online.
  2. Don’t sign up for sites that are 13+ if you are not old enough. 
  3. Don’t add people as online friends unless you know them in real life or have parent permission. Never arrange to meet an online friend without talking to a parent.
  4. Remember that you cannot believe everything you read on the internet and you can’t trust everything online friends tell you.
  5. Choose sensible names for usernames, email addresses etc. 
  6. Talk to your parents about what you’re doing online and let them know when you’re going on the internet.
  7. Know what cyber bullying is and tell someone if you think it’s happening to you. Cyber bullying is when someone picks on you, annoys, embarrasses, or threatens you over and over again using technology, such as the internet or a phone.
  8. Protect your digital footprint: don’t put anything online that you wouldn’t want all your friends, family, teachers and future employers to see.
  9. Treat others online the way you’d like to be treated.