2. 1. Take appropriate precautions to ensure own safety
and privacy.
2. Protect personal information online.
3. Carry out checks on others’ online identity.
4. Describe the forms and features of cyber bullying.
4. Charley
Privacy and safety online is a very big role associating with being on the internet.
Privacy and safety is something that is not put into place by some people online
and can lead to massive range of problems e.g cyber bullying, emails used as a
threatening message or harassment, unsafe pop ups and hacks, and can also range
to Trojans and viruses coming into your computer alongside a unsafe
advertisement and email.
The ranges of unsafe behaviour on a computer, laptop, or tablet can be quite
devastating and can also include blackmail. To ensure your security and privacy
online you must take precautions and avoid things what you might find harmful
and unsafe. Also if you find a website unsafe and you don’t find it trustworthy
don’t use it!!!.
5. The way how you can ensure privacy and safety protection online is by a very easy set of steps by using these steps you are
ensuring that you want absolute total control over your pc or laptop and don’t want any exposure when using the internet
online.
Step 1: Go onto www.filehippo.com and download Microsoft Security Essentials this is a great software to protect yourself
in a security-based way and also can help- you scan a malicious website.
Step 2:
After downloading Microsoft Security Essentials there is another programme which I highly recommend for protection head
back onto www.filehippo.com and then download Spyware Blaster after downloading Spyware Blaster this is a excellent
programme to use for blocking pop ups and malicious websites. Even though Spyware Blaster is mainly used for Spyware
protection it is still handy for scanning blocking and defeating malicious websites and can also block ActiveX pop ups as
well.
Step 3:
The final programme what you should decide to download is CCleaner Ccleaner is another great and trustworthy
programme to use for computer protection. This is one of the most trustworthy programmes used for protection against
malicious files serious malware and temporary internet files download from www.filehippo.com and you will be sorted!.
Step 4:
After downloading Microsoft Security Essentials, Spyware Blaster, and Ccleaner if you want more further protection while
browsing the internet there are certain options what you can put into place when browsing (e.g if you want to block a
website what you may find with full of malware or pop ups) then there are certain internet browsers which can help with this
option. If you use Internet Explorer there are certain options which can block malicious websites here are the steps..
6. Intro:
If you use Internet Explorer there are ways and methods to stop yourself
worrying about pop-ups advertisements and threats to security. There are
very easy ways that can help you and above all else protect you.
Step 1:
To stop pop ups incoming onto your pc first click onto the tolls option
and then click onto the
8. Many people don't shop online because they think that their bank details are not safe. Shopping online is just as safe as ordering
by the telephone as long as you follow these rules.
0 - Make sure that the company that your ordering from has a secure shopping server.
0 - Make sure that the website your using starts with “https:”
0 - Make sure that you don't send any bank details to anyone in an email.
0 - If you do receive an official looking email that asks you to send your financial
details, you should never replay because you could become a victim of identity fraud.
0 - If its a company that you have never heard of before , search their site for any
contact numbers and postal addresses. They would not mid you doing a quick call
asking few questions.
9. Take steps to protect your online privacy
Looking after your privacy online will help protect your personal
information from abuse.
0 Good computer security includes installing anti-spyware, anti-virus.
0 Keep these security tools up to date.
0 Make sure you are visiting secure web sites before handing over
personal information such as banking and credit card details.
10. When creating passwords there are some rules that you should follow:
Do
0 Make it at least eight characters in length.
0 Combine letters, numbers and upper and lower case letters.
0 Change your password regularly.
Don’t
0 Use pet names, birthdates, family or friends names.
0 Share passwords with others, even with friends.
0 Store them on the device or write them down.
12. 0 Cyber bullying is where people use computers to abuse or harm
someone else.
0 People use fake accounts to attack vulnerable individuals to
send offensive comments/content.
0 People harass someone due to an event.
0 People use social networking site to target people.
13. When using the internet you should be very careful of who
you chat and become friends to because the internet can be
used 24/7 and people become more vulnerable to fake
accounts and people can send messages to other people.
14. Cyber stalking > Is where people make other people scared and try to harm them and
threaten someone's privacy
Harassment > Is w>hen someone targets an individual or group by sending offensive
messages/content
Sending Spyware and/or Hacking Programs > Using technology to jeopardize or gain
unauthorized access to someone else’s computer.
Sending Pictures > Sending, posting, or altering compromising pictures of others whether
the images were taken with or without consent.
http://bullyingproject.com/curriculum/
15. 0 Can effect peoples confidence
0 Can affect peoples lives
0 Can lead to suicides and suicide thoughts
0 People will stress over the event
0 Can affect peoples attendance and punctuation