Are you safe online?

What is this flyer about?

I have designed this flyer to make sure that you know all the information that you need to know about the internet. You will read about: Your rights and responsibilities online, how to stay safe on the internet, How your supposed to behave online/social media. We will also be covering the definitions of: Pin numbers, Biometric scanners, Encryption, Forensic computing and how these things can help you stay safe online.

Your Rights and Responsibilities online

(for more information visit) http://themodernparent.net/rights-and-responsibilities-online-safer-internet-day-2013/

Your main responsibility online is making sure you are safe. The number one and most important rule is to never share your password(s) with anyone, not even someone you trust with important information. You also need to respect other on the internet, make sure you treat people the way you would like to be treated. It is equally important to make sure that you are being treated properly, if you are a victim of abuse online, make sure you do something about it, don't just sit there and do nothing, if the social media that you are being abused on has a way to report people make sure you do it,because if you don't, that person will never stop. If you don't do something they will keep on abusing you.

Rights and Responsibilities on the internet

How to behave in social media

You've probably used at least one internet forum in your time on the internet. Forums can be a great place to chat, as it's often easier to carry conversations online then in real life. However, they can also be a source of many problems, hateful attitudes, and hate, all aspects of cyber-bullying. In fact, it has been reported that cyber-bullying had been experienced by more than half of the teenage population. Here are some steps at making sure you are doing the right thing. Step one, make sure you know what website you are on, especialy if its a site that requires you to sing up and give your personal details, for example: your email or your name and surname... Step two, be extremely cautious about how you behave towards other people, don't forget, you are not the only one with feelings, be helpful and act with the appropriate behaviour towards others. Step three, don't do things that you know will irritate other people, e.g. spamming, swearing..., not only can you get banned by the site, you will be that person that everyone dislikes. The fourth and most important one is you need to make sure that everyone in your community/follower are people you know and not random people that you found through social media, because what someone might say about their identity could possibly not be true.
How to Behave Professionally on Social Media

Pin Numbers

You most probably have heard the phrase 'Pin Numbers' before, this term is mostly used as a password for a credit card or a phone number but thats not always the case, a pin number can be referred to as a password for anything, from social media to your computer password. It can also be referred as a password/passcode. A pin number is a way of identifying and making sure that the person who is claiming to be who they are is actually that person and not someone else. It is a way of keeping your stuff safe.
Big image

Biometric scanners

A Biometric Scanner is again a type of password for keeping your personal data safe. It uses unique features of the body like an eye or even better your fingerprint and takes remembers it so that when you try and 'log on' and you put the correct 'body feature' that you have chosen it can identify you. In some cases biometric scanners might require you to enter basic information like your name and surname if it is given to handle more than one person. The most common used body feature to use for a biometric scanner is a fingerprint. The problem with biometric scanners is that when you enter your fingerprint it can't be changed so once someone gets your fingerprint they can use advantage of it in many different ways.
How Secure Are Fingerprint Scanners?


Encryption is a way of keeping things safe from one place to the next. Encryption is used in emails, encryption is how only the people who are supposed to receive the email can read it, It is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as 'cipher text'. Encryption can help you keep things secret and visible only to the people you choose to see it.
What is Data Encryption?

Forensic Computing

Forensic computing probably makes you think of crime investigation and evidence on computers, but thats not only the case, it can be used for civil and government use. Its is a way of identifying, recovering and preserving different types of data on the computer. Forensic computing and help bring to light evidence from cyber bullying to theft and crime releated plots. Forensic computing requires a lot of skills which are cracking passwords, recovering deleted files... but the most important skill of all is concentration, because if you are not concentrated and your mind is on something else, you can miss a lot of important data.
What is Computer Forensics?