Online Safety in IT

6
Online Safety Understanding safety and security practices when working online

Transcript of Online Safety in IT

Page 1: Online Safety in IT

Online SafetyUnderstanding safety and security practices when working online

Page 2: Online Safety in IT

What you need to know…

Threats to user safety

Minimising Risks

Safety precautions

Information security

Laws, guidelines and procedures

Page 3: Online Safety in IT

Threats to user safety

‘Cyberbulling’

Cyberbullyingis the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner.

It can be done via e-mail, chat rooms, forums, etc

False Identity

Someone can assume a false identity and pretend to be someone they’re not. People can ‘mask’ their identity and trick others into thinking they’re interacting with the real person.

Financial Deception

Some online users may attempt to trick others out of their money through nefarious means. For example, pretending to be from a bank or an important organisation, asking for your financial details.

Page 4: Online Safety in IT

Minimising Risks & Precautions

Virus ScanningRunning a software package to detect potential viruses on your workstation.

FirewallsThese devices stop unauthorised data from being sent or received from a workstation. Correct configuration can help prevent unauthorised access from occurring.

Checking messages from unknown sourcesMake sure you know who sent the message. Double check the sender’s details and avoid clicking on any links or opening any attachments until you’re sure.

Reporting inappropriate behaviourThis will help prevent the same problem from occurring multiple times. Reported problems can be solved, whereas unreported behaviour can be left to go by unchecked.

Avoid disclosing important or sensitive informationDon’t give out your important information unless you’re sure who you’re giving it to. Giving out information may lead to someone exploiting it. E.g. credit card details, usernames, passwords

Page 5: Online Safety in IT

Information Security

Usernames, passwords and PINsMake sure they’re not too easy to guess, or are commonly used words or phrases.

Disclosing your identity or real nameThink about where you offer up this information freely. E.gFacebook. By altering the security settings in your profile you can restrict who can see your details.

Pseudonyms and avatarsYour online alter-egos aren’t necessarily safe or unique. Remember, people can copy these and pretend to be anyone. Use common sense when conversing with these unknown elements.

Page 6: Online Safety in IT

Laws/Guidelines/Procedures

College guidelines and Health & Safety

Where can you find out about these rules? College handbook, Noticeboards, study centres, etc

Downloads

Where are your downloads coming from? Are they from a reliable, authorised source?