Our Secure Digital World


This flyer will tell you about how to stay safe online, the measures you have to take, your rights, your responsibilities and general information about the Internet

Rights and Responsibilities Online


The basic thing you have to remember when you are online is never to share your password with anyone. It is essential that you are the only person who knows it. Even if you think that you can trust that person. Even if they would never use it, they might tell someone who could use it to harm you. If you are being abused, make sure not to delay contacting the proper authorities who can catch this person.

Along with your rights, come your responsibilities. Do not violate other people's privacy. People must know it is their responsibility not to impede the basic rights of others or in any way participate in behavior that is detrimental to others.

Big image

How to Behave Online

You always need to remember not put things on the internet or social media that you wouldn't want a stranger to see. Make sure your settings on social media pages are set to private so only people that are friends with you can see. To make this effective, you must not accept strangers as your friends; the smaller the account, the better.
Big image

How to make your account private on facebook


How to make your account private on Twitter


How to make your account private on Tumblr


How to make your account private on instagram

Taking Safety Measures

When making an account, it is best not to use your real name. Use a nickname that your friends will recognise, but strangers will not understand. You should also have an effective password that will be hard to guess

Click the link to find out how effective your password is


Social, Smart, Secure. Tips for Staying Safe Online

Wednesday, Sep. 23rd, 9-11pm

London Connected Learning Centre (CLC)

Forensic Computing

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
BSc (Hons) Forensic Computing

Biometric Scanners

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are separate and distinct from personal information. Biometric templates cannot be reverse-engineered to recreate personal information and they cannot be stolen and used to access personal information.
How to Fake a Fingerprint in a Biometric Device


A numerical code used in many electronic financial transactions. Personal identification numbers (PINs) are usually used in conjunction with usernames or other passwords. They are also usually required when using bank debit or credit cards, and most banks or financial institutions issue PINs separately from the cards through the mail.
iPhone ATM PIN code hack- HOW TO PREVENT