Please enable JavaScript.
Coggle requires JavaScript to display documents.
Internet. Safety and responsability (DIGITAL RESPONSABILITY: We must be…
Internet. Safety and responsability
HOW DOES INTERNET WORKS?
The Internet is a network of thousand of computers and devices around the world connected by copper wires, fibre optics, wireless connections and other methods.
The Internet of Things is a revolutionary concept that describes the connection of everyday obejects to the Internet so that we can interact with them.
INTERNET BASICS:
We type the full adress of a web page in the browser. This adress is also called the uniform resource locator (URL) and is unique for each web spage. For example: www.google.es, www.rae.es, etc.
A server is a computer with special features, prepare to provide uninterrupted services simultaneously to lot of users.
We can acces information on the Internet with the help of 2 basic elements: the browser and the search engine.
A browser is a programme that displays the content of web pages. For example: Internet Explorer, Google Chrome, Mozilla Firefox, Safari, Opera, etc.
A search engine is a computer system that indexes files stored on website. Search engines keep their results up to date by continually crawling Internet. For example: Google, Bing, Yahoo!, etc.
HOW INTERNET WORKS:
a) Users can connect to Internet if they have a contract with an Internet service provide (ISP). When we switch on a computer and connect to the Internet, our ISP (for example. Movistar) assigns an adress to our computer, called an IP adress.
b) A router is a device that lets us connect to the Internet. Once connected, we open our browser and type the adress of a page in it. At this point, information starts to travel in the form of packets.
c) The next step in the information's journey are the DNS. DNS servers simplifies the IP adress of every website for us.
d) Our computer communicates with other computer following a common set of rules called a protocol.
The packets of informations follow the TCP/IP control (transfer control protocol/Internet protocol).
Servers use the HTTP protocol (hypertext transfer protocol) to send and receive documents over the Internte.
e) The DNS server sends the request to the server that hosts the web page we want to visit. The server sends us the information packets that make up the page.
f) Finally, the packets reach our computer and are reassembled. The page is then displayed in our browser.
PERSONAL SAFETY AND MACHINE SECURITY: We can classify the risks of the Internet as: - Threads to the machine, i.e our computer. -Threads to individuals. Damage to machines is only material damage but when people are hurt, it stays with them and affects other aspects of their lifes.
TO THE INDIVIDUALS
THREADS
Spyware. Software that tries to obtain data from users. Not all spyware is malicious; sometimes it is designed to make searching easier.
Black hackers. Computer experts who attempt to baypass Internet security systems to make Money from it.
Viruses and Trojans. Programms that install themselves on a computer without the user's permission for the purpose of causing damage. They can self-replicate and infect other computers. Trojans are often hidden inside seemingly harmless elements like an image or music file and are installed on the system when the file that contains them is opened.
SOLUTIONS
Our attitude, the best protection.
SOLUTIONS
White hacking. Activity carried out by people who help individuals and business to discover how secure their systems are against malicious hackers.
Cryptography. The encryption of information to protect files, communication and passwords.
Firewall. A defence system that controls and filters the incoming and outgoing traffic of a network through our computer ports.
Passwords. These can enhance the security of a file, folder or computer on a local network or the Internet.
Antivirus. Is a programm that can protect our computer from attacks by viruses and Trojans if it's kept up to date.
THREADS
Loss of privacy.
Damage to our identity or image.
Phising. A type of computer fraus that uses trikery to information about the user in order to use it fraudulently.
Cyberbulling. A type of harassment that uses threats, blackmail, etc., between peer son the Internet, mobile phones or video games.
Identity theft.
TO COMPUTERS
DIGITAL RESPONSABILITY: We must be digitally responsable. When we use Internet tools, we need to keep in mind our own safety and respect fo others. The law is here to protect us. Examples include.
The Civil Protection Honous of Act
The Data Protection Act
Talk to your parents about your Internet browsing; they can always help if you are unsure about anything. If you receive something unusual or unpleasant, talk to an adult about it or report it.
Do not ask for or give out data such as addresses, passwords, telephone numbers or any other information that could identify you. Use aliases and nicknames that do not contain infromation about you.
Do not talk to stranger. Be wary of anybody who wants to know a lot of information about you. Remember that are safety ways to make new friends.
Turn your webcam to a dead angle or put a sticker over it when you are not using it so that it cannot record images. Webcams can be operated remotely by malicious software. the police have been warning us for years that the images we think they came from the webcam of another person are often actually images that they have facked.
Think before you publish photos or videos of yourself. Remember not to post pictures of anybody without their consent. Be respectful to others.
Keep up to date with technology and limit how long you spend on the Internet.
Make sure that you are on the minimun age require to enter a site. You will find this age in the terms of use of the site. You must read this terms before clicking on ''I agree''. If you don't read them, you may be allowing the site owners to use your date, pictures, etc.
Inform yourself about sites. On some sites you cannot ''unsubscribe'' so we must be careful about what we post on them; we can sometimes give away our data forever.