Colchester Institute
The College supports individuals to launch or develop their careers, and local businesses to access the skills and talent they need to thrive.

Online session - Hacked off

Online session - Hacked off
1 / 21
volgende
Slide 1: Tekstslide
PdHigher Education (non-degree)

In deze les zitten 21 slides, met interactieve quizzen en tekstslides.

Onderdelen in deze les

Online session - Hacked off

Slide 1 - Tekstslide

Lesson objectives
  • Identify the potential risks of being online
  • Explain the key terms relating to the topic
  • Identify ways in which you can protect yourself from risk online. 

Slide 2 - Tekstslide

What do people use the internet for?

Slide 3 - Woordweb

There are a variety of different purposes for the internet:
  • Email (other forms of messaging)
  • Studying and research
  • Social media
  • Shopping
  • Streaming music / podcasts
  • Working remotely via internet
  • Searching for a job online 

Slide 4 - Tekstslide

Is it safe to be on the internet?
Yes
No

Slide 5 - Poll

What is a potential risk of sharing personal information online?
A
Higher social media engagement
B
Identity theft
C
Improved security measures
D
Enhanced privacy settings

Slide 6 - Quizvraag

Which of the following is a potential risk of online communication?
A
Cyberbullying
B
Enhanced digital skills
C
Increased collaboration opportunities
D
Positive reinforcement

Slide 7 - Quizvraag

What could be a potential risk of clicking on unknown links or attachments online?
A
Better device performance
B
Improved internet speed
C
Virus or malware infection
D
Access to exclusive content

Slide 8 - Quizvraag

Potential risks
There are many risks of being online such as:

  • Cyber bulling
  • Cyber-predators
  • Posting private information
  • Phishing
  • Falling for scams
  • Accidentally downloading Malware
  • Posts that come back to haunt you
  • Account hacking

Slide 9 - Tekstslide

On the next slide, you will need to match the term to the correct definition.

Slide 10 - Tekstslide

What is Cyber bulling?
What is a Cyber-predator?
What is Malware?
What is a scam?
What is account hacking?
What is Phishing?
Any form of bullying which takes place online or through smartphones and tablets.
Someone who uses the internet to exploit people; this might be for sexual or other purposes.
A cybercrime in which the target is contacted by email, phone or text with a fraudulent message designed to trick the target into revealing private information.
Software intentionally designed to cause damage to a computer, server, client, or computer network.
An attempt to get personal details or money from people by deceiving their target using false information.
Unauthorised access to your accounts; carried out through phishing, password guessing or using a compromised email account.

Slide 11 - Sleepvraag

Cyber predators
Cyber predators use the internet to exploit people; this might be for sexual and other purposes. 

Cyber predators target young people via social media; they also use online gaming as a means of making contact.

Slide 12 - Tekstslide

What steps can be taken to avoid oversharing on social media?
A
Ignore feedback
B
Think before posting
C
Adjust privacy settings
D
Share everything openly

Slide 13 - Quizvraag

How can you get hacked?
Seemingly innocent quizzes on social media sites can encourage us to share the sort of information which might be used for security purposes.

Slide 14 - Tekstslide

Think about it...
Think about it…. birth town, year of birth or similar details can be used to verify our identity; other security questions might be the make of your first car, the name of your first school etc.

If you enter these details into social platforms, you are sharing details which may provide access to online accounts; in other words, a gift for hackers.

Slide 15 - Tekstslide

How did this mum make it easier for the scammer?

Slide 16 - Woordweb

What is a common method to protect your online accounts from hackers?
A
Using strong, unique passwords for each account
B
Sharing your password with friends and family
C
Using the same password for multiple accounts
D
Keeping your passwords written down near your computer

Slide 17 - Quizvraag

Which of the following is a good practice to prevent falling victim to phishing attacks?
A
Ignoring any warning messages from email providers
B
Clicking on links in emails without verifying the sender
C
Being cautious of unsolicited emails and not clicking on suspicious links
D
Providing personal information in response to unknown emails

Slide 18 - Quizvraag

What is a recommended way to secure your personal devices from hackers?
A
Disabling all security settings on your devices
B
Using public Wi-Fi networks without a VPN
C
Downloading software from unknown sources
D
Keeping your operating system and software up to date

Slide 19 - Quizvraag

Think....
  • Creating complex passwords-AND never sharing these; use different passwords for different sites.
  • Checking web site addresses before entering information; the address should always start with “https,” instead of just “http,” and have a padlock icon in the URL field.
  • Never sharing personal information with people you don’t know-what what you post online. Are your privacy settings appropriate?



Slide 20 - Tekstslide