online safety
online presence
Online presence!!
What is it?
Online presence refers to all activity and content that an entity—a person or a business—has under its name on the internet. This includes accounts, assets, interactions, and any pieces of information created by or about the person or business.
How it happens
Whenever you use the internet, you leave behind a trail of information known as your digital footprint.
How to prevent it
Delete old email accounts.
Limit social media accounts.
Skip the survey.
Create a spam email address.
Remove yourself from people's search sites.
Theas could help but fully deleting your footprint is impossible
because any activity you made online has traces of information linked to you already stored from third-party services, the government or other entities. You can, however, minimise your digital footprint and reduce what information is publicly available about you.
Top tips
Six Steps for Protecting Your Digital Footprint. ...
Enter your name into several search engines. ...
Double-check your privacy settings, but don't trust them. ...
Create strong, memorable passwords. ...
Keep all your software up to date. ...
Review your mobile use: if you don't need it, delete it.
Images
PSHE | Computing | GCSE | Digital Footprint | BBC Teach
Tap on this video to get an understanding of how it could affect your everyday life!
Sending or sharing indecent images of anyone who is under 18 is a serious crime. You risk being arrested and going to court.
And you could spend up to 5 years in jail
click to edit
skimming
click to edit
Skimming
What is it?
Illegal skimming is a white collar crime also known as a non violent crime.
Here are signs that it might be skimmer:
How to happens
Unusual damage to the card reader.
Glue or adhesive marks on or around the card reader.
Unusual brochure holders or plastic panels added above/near the card reader or PIN pad that could contain a camera.
Unusual feeling keyboard or a keyboard that sits higher than usual.
Someone has to be at least 10 feet away for someone to scan your card from your pocket,and get your details to enter your bank account.
phishing
click to edit
'Phishing when criminals use scam emails, text messages or phone calls to trick their victims.
click to edit
Know what a phishing scam looks like. ...
Don't click on that link. ...
Get free anti-phishing add-ons. ...
Don't give your information to an unsecured site. ...
Rotate passwords regularly. ...
Don't ignore those updates. ...
Install firewalls. ...
Don't be tempted by those pop-ups
censorship and filtering
identity theft
click to edit
How it happens Such as your number,and your social security number.
They can create accounts and use your information to buy thing and use your money(that is known as fraud)
How to prevent it? You can prevent identity theft by keeping your security details safe and locked away in a folder or on your notes.
You can also monitor your emails and your computer regularly to see if anything has changed.
Phishing
What is it ?Phishing is a cybersecurity attack. Where someone impersonates you via email or other online communication methods.
How it happens.
Phishing is a type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks text messages, to reveal sensitive information.
How can we prevent it?
If the URL of the website doesn’t start with “https”, or you cannot see a closed padlock icon next to the URL, do not enter any sensitive information or download files from that site. Sites without security certificates may not be intended for phishing scams.
Don't trust everything you see or read online
Don't give anyone any of your personal information if you don't know them.
click to edit
Censorship and Filtering
What is it?
hacker and Viruses
What is the difference between a hacker and a virus?
A ' hacker' is a human person who engages in activities to do with breaking into software security in any form. A virus is some form of coded to assist a computer hacker to damage a computer that has been 'hacked'.
Hackers create programs that search for unprotected ways. A Hackers gain access by infecting a computer or system with a Trojan horse( a type of malware that downloads onto a computer disguised as a legitimate program.), created by hackers to acquire and steal important data without the victim noticing.
How do you prevent a Trojan horse on your computer?
Make sure a Trojan antivirus is installed and running on your computer.
Never download or install software from a source you don't trust completely. Never open an attachment or run a program sent to you in an email from someone you don't know. Keep all software on your computer up to date with the latest patches.
top tips
Install antivirus or anti-malware software. ...
Keep your antivirus software up to date. ...
Run antivirus scans regularly. ...
Keep your operating system up to date. ...
Think before you click. ...
Keep your personal information secure. ...
Don't use unsecured Wi-Fi
Internet censorship, like all censorship, can take multiple forms, from filtering and blocking content to monitoring and penalising users who access certain content.
Censorship is the suppression of speech, public communication, This may be done on the basis that such: harmful, sensitive, or "inconvenient". Censorship can be conducted by governments, private institutions and other controlling bodies.
click to edit
Filtering can relate to the use of technology that blocks pages by reference to certain characteristics.
What is censorship and how is it destructive?
Censorship, the suppression of words, images, or ideas that are “offensive,” happens whenever some people succeed in imposing their personal political or moral values on others. Censorship can be carried out by the government as well as private pressure groups.
click to edit
What is it? Identity theft is when someone takes your personal information, and uses it against you to commit potential crimes and get away with it.
click to edit
click to edit
skimming and phishing are the same
Skimming is the in-person act of copying information or a device that fits neatly over a gas station pump or ATM. Both allow thieves to scan the account information off of your card's magnetic strip. Phishing, on the other hand, is conducted online.