• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet and computer safety

Extracts from this document...

Introduction

Internet safety Internet Safety Day is a day to create awareness about the Internet and computer safety in general. 1. Discuss what can you do as a parent to create awareness about the Internet and computer safety? As a parent to create awareness about internet security, many measure can be taken to ensure safety for your children when using a computer as there are many risks which could occur which could either damage your computer or even your child. For example, there are viruses which can be harmful on your computer and if you use internet banking than, hackers can steal your details using phishing emails or websites and steal your identity, if your child or you click on a link or download a file which is harmful than your computer can be infected, however, this could be prevent by purchasing a good anti virus program, these will also protect the computer from other viruses which are harmful. Also if your children persistently use the internet then they can go on website which are inappropriate however there can be content filters on web browsers which can lower the risk of children going on bad websites. ...read more.

Middle

(ii) Evaluate a feasible solution to a problem identified in the news item. (150 words) A feasible solution to this topic and methods which could be taken out to help stop predators like this could be to make under 18 chat rooms, secure and make sure that users must go through an identity check, where personal details are filled out from something to help prove the child's identity, for example a child's passport number or some personal evidence which would not have a big impact of somebody was to get hold of the information also these would need to be incredibly secure. Also if a child is going to be meeting up with a person they had met online then they would need a responsible adult to accompany them when they meet, this would mean that children in schools would need to be educated on this matter more thoroughly. Finally making sure filters are more secure so that they cannot by bypassed. 3. Look for 3 examples of Internet abuse. ...read more.

Conclusion

Phishing began in 1995 where hackers would use AOL software to pose as workers and instead would have hacked the software and tried to gain a users password, there after Phishing would move onto financial purposes in 2001, where hackers would try to earn bank account details. Phishing is highly illegal and often people are unaware after being caught out by a hacker, and with the encouragement in society to get technical and use computer, more and more computer illiterate people are becoming victims to phishers and internet fraud. In present times, hackers are now very advanced and as you can see from the article have the ability to create a fake website, just so they could gather your bank account details, so you should always be aware of how to use the internet safely and securely. Also, in new antivirus software packs, they now often contain anti phishing software which helps protect e mails and certain spyware, which keeps you safe online. Nowadays there are many sources of information around for users if they wish to use the internet safely, and people should be encouraged to read these, to make sure they do not become a victim to a fraudster or phisher. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The History & Development of Reflexology

    Surgery, which looked at the feet of native people in the Philippines and Central Africa, who had never worn shoes21. Dr Hoffman's studies show that a line can be drawn through the heel, ball, and big toe of a regularly bare foot.

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Dorgan said the product mix was "crazy" but that the breadth of the range demonstrated the weakness of the Ocado model and "would not be helpful" for the flotation. An Amazon spokeswoman said it was "early days" and that the groceries range would continue to expand over time.

  1. Proyecto Personal - Anorexia y Bulimia

    Esto se debe a que, al hacer cada uno de los pasos para completar el trabajo, aprendimos diversas maneras de hacer una investigaci�n, redactar un informe, entre otros. As�, nos hemos empezado a familiarizar con estos trabajos, lo cual nos ser� muy �til dado que en el futuro, cuando nos

  2. Communicating with children

    I tried to do my best with David. I listened to him, was patient, talked directly to him. I read stories to him. I showed him picture books provided by the nursery. These picture books had images of objects with which babies are familiar with such as an apple, a banana...

  1. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    Q1: A virtue is defined as "a conformity of ones life and conduct to moral and ethical principles; uprightness; rectitude." With knowing that, what are your DEFINING virtues? Then list 5 virtues you'd wish to have. Out of all ten interviews, 16 different virtues were generated; the virtues with the

  2. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    As it can be seen in the table, the Front Side Bus (FSB), which is the bus that connects the CPU to other hardwares 4, is double in XP. Plus, the RAM is double and the Intel chip in XP is the successor to that in the Mac.

  1. E-Commerce and Fraud

    auction fraud where a person makes an auction sale and the consumer is delivered inferior goods or nothing at all. Web site hijacking occurs when a web page or site is created to resemble that of a legitimate business and consumers may be taken for payment or personal information believing

  2. GCSE Welsh Baccalaureate Completed Diary Pages

    Under first-past-the-post, the UK or local authority is divided into numerous voting areas, i.e. constituencies or wards. At a general or local election, voters put a cross (X) next to their preferred candidate on a ballot paper. Ballot papers are then counted and the candidate that has received the most votes is elected to represent the constituency or ward.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work