Colchester Institute
The College supports individuals to launch or develop their careers, and local businesses to access the skills and talent they need to thrive.

Online session - Hacked off

Online session - Hacked off
1 / 21
next
Slide 1: Slide
PdHigher Education (non-degree)

This lesson contains 21 slides, with interactive quizzes and text slides.

Items in this lesson

Online session - Hacked off

Slide 1 - Slide

Lesson objectives
  • Identify the potential risks of being online
  • Explain the key terms relating to the topic
  • Identify ways in which you can protect yourself from risk online. 

Slide 2 - Slide

What do people use the internet for?

Slide 3 - Mind map

There are a variety of different purposes for the internet:
  • Email (other forms of messaging)
  • Studying and research
  • Social media
  • Shopping
  • Streaming music / podcasts
  • Working remotely via internet
  • Searching for a job online 

Slide 4 - Slide

Is it safe to be on the internet?
Yes
No

Slide 5 - Poll

What is a potential risk of sharing personal information online?
A
Higher social media engagement
B
Identity theft
C
Improved security measures
D
Enhanced privacy settings

Slide 6 - Quiz

Which of the following is a potential risk of online communication?
A
Cyberbullying
B
Enhanced digital skills
C
Increased collaboration opportunities
D
Positive reinforcement

Slide 7 - Quiz

What could be a potential risk of clicking on unknown links or attachments online?
A
Better device performance
B
Improved internet speed
C
Virus or malware infection
D
Access to exclusive content

Slide 8 - Quiz

Potential risks
There are many risks of being online such as:

  • Cyber bulling
  • Cyber-predators
  • Posting private information
  • Phishing
  • Falling for scams
  • Accidentally downloading Malware
  • Posts that come back to haunt you
  • Account hacking

Slide 9 - Slide

On the next slide, you will need to match the term to the correct definition.

Slide 10 - Slide

What is Cyber bulling?
What is a Cyber-predator?
What is Malware?
What is a scam?
What is account hacking?
What is Phishing?
Any form of bullying which takes place online or through smartphones and tablets.
Someone who uses the internet to exploit people; this might be for sexual or other purposes.
A cybercrime in which the target is contacted by email, phone or text with a fraudulent message designed to trick the target into revealing private information.
Software intentionally designed to cause damage to a computer, server, client, or computer network.
An attempt to get personal details or money from people by deceiving their target using false information.
Unauthorised access to your accounts; carried out through phishing, password guessing or using a compromised email account.

Slide 11 - Drag question

Cyber predators
Cyber predators use the internet to exploit people; this might be for sexual and other purposes. 

Cyber predators target young people via social media; they also use online gaming as a means of making contact.

Slide 12 - Slide

What steps can be taken to avoid oversharing on social media?
A
Ignore feedback
B
Think before posting
C
Adjust privacy settings
D
Share everything openly

Slide 13 - Quiz

How can you get hacked?
Seemingly innocent quizzes on social media sites can encourage us to share the sort of information which might be used for security purposes.

Slide 14 - Slide

Think about it...
Think about it…. birth town, year of birth or similar details can be used to verify our identity; other security questions might be the make of your first car, the name of your first school etc.

If you enter these details into social platforms, you are sharing details which may provide access to online accounts; in other words, a gift for hackers.

Slide 15 - Slide

How did this mum make it easier for the scammer?

Slide 16 - Mind map

What is a common method to protect your online accounts from hackers?
A
Using strong, unique passwords for each account
B
Sharing your password with friends and family
C
Using the same password for multiple accounts
D
Keeping your passwords written down near your computer

Slide 17 - Quiz

Which of the following is a good practice to prevent falling victim to phishing attacks?
A
Ignoring any warning messages from email providers
B
Clicking on links in emails without verifying the sender
C
Being cautious of unsolicited emails and not clicking on suspicious links
D
Providing personal information in response to unknown emails

Slide 18 - Quiz

What is a recommended way to secure your personal devices from hackers?
A
Disabling all security settings on your devices
B
Using public Wi-Fi networks without a VPN
C
Downloading software from unknown sources
D
Keeping your operating system and software up to date

Slide 19 - Quiz

Think....
  • Creating complex passwords-AND never sharing these; use different passwords for different sites.
  • Checking web site addresses before entering information; the address should always start with “https,” instead of just “http,” and have a padlock icon in the URL field.
  • Never sharing personal information with people you don’t know-what what you post online. Are your privacy settings appropriate?



Slide 20 - Slide