• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Internet and computer safety

Extracts from this document...


Internet safety Internet Safety Day is a day to create awareness about the Internet and computer safety in general. 1. Discuss what can you do as a parent to create awareness about the Internet and computer safety? As a parent to create awareness about internet security, many measure can be taken to ensure safety for your children when using a computer as there are many risks which could occur which could either damage your computer or even your child. For example, there are viruses which can be harmful on your computer and if you use internet banking than, hackers can steal your details using phishing emails or websites and steal your identity, if your child or you click on a link or download a file which is harmful than your computer can be infected, however, this could be prevent by purchasing a good anti virus program, these will also protect the computer from other viruses which are harmful. Also if your children persistently use the internet then they can go on website which are inappropriate however there can be content filters on web browsers which can lower the risk of children going on bad websites. ...read more.


(ii) Evaluate a feasible solution to a problem identified in the news item. (150 words) A feasible solution to this topic and methods which could be taken out to help stop predators like this could be to make under 18 chat rooms, secure and make sure that users must go through an identity check, where personal details are filled out from something to help prove the child's identity, for example a child's passport number or some personal evidence which would not have a big impact of somebody was to get hold of the information also these would need to be incredibly secure. Also if a child is going to be meeting up with a person they had met online then they would need a responsible adult to accompany them when they meet, this would mean that children in schools would need to be educated on this matter more thoroughly. Finally making sure filters are more secure so that they cannot by bypassed. 3. Look for 3 examples of Internet abuse. ...read more.


Phishing began in 1995 where hackers would use AOL software to pose as workers and instead would have hacked the software and tried to gain a users password, there after Phishing would move onto financial purposes in 2001, where hackers would try to earn bank account details. Phishing is highly illegal and often people are unaware after being caught out by a hacker, and with the encouragement in society to get technical and use computer, more and more computer illiterate people are becoming victims to phishers and internet fraud. In present times, hackers are now very advanced and as you can see from the article have the ability to create a fake website, just so they could gather your bank account details, so you should always be aware of how to use the internet safely and securely. Also, in new antivirus software packs, they now often contain anti phishing software which helps protect e mails and certain spyware, which keeps you safe online. Nowadays there are many sources of information around for users if they wish to use the internet safely, and people should be encouraged to read these, to make sure they do not become a victim to a fraudster or phisher. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The History & Development of Reflexology

    The first Alzheimer's patient was diagnosed on May 16, 1850, which was the last year that shoes were made completely by hand. The following pictures are of habitually bare feet, and are from a study conducted over 100 years ago, and published in 1905 in the American Journal of Orthopaedic

  2. Communicating with children

    I also sang nursery rhymes and played finger rhyme games such as "peek-a-boo). He smiled and I knew he was having fun while he was learning too. M1 Communication is a two-way process. It involves trying to understand the thoughts and feelings the other person is expressing, and responding in a way that is helpful.

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    By comparison, Ocado sells 20,000 products, roughly a quarter of which come from Waitrose. Amazon already sells groceries online in the US and has recently launched a similar service in Germany. Analysts, however, said shoppers would find it difficult to rely on the website for their weekly food shops as

  2. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    morality due to what it bears, and their own moral code in light of the ignorance a person expresses when they are immoral. And through that, temperance is also valued for keeping moderation of the vices in life, such as wine and good food.

  1. A comparison and analysis of the speed and efficiency between Microsofts Windows XP and ...

    On the other hand, the Tiger has only one version for all users (v10.4), even though this is Apple's first Intel-based operating system. 1.2 Investigation introduction In this essay, the two operating systems will be tested in the areas of: startup and shutdown speed, CD burning speed, Internet Browsers (Safari vs.

  2. E-Commerce and Fraud

    a perpetrator has stolen someone's identity to make purchases from another person's account, open accounts with someone else's name, credit, or social security number, or, a person may even impersonate another when legal trouble arises. Other types of fraud outside an organization can include illegitimate businesses, most commonly occurring in

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    Using the HIT can cause many issues to come up without the individual knowing. Because using HIT can be so efficient and convenient for clients, they may easily forget the risks of using it and give personal information away. HIT is a communication system that can simply cause theft of

  2. GCSE Welsh Baccalaureate Completed Diary Pages

    Under first-past-the-post, the UK or local authority is divided into numerous voting areas, i.e. constituencies or wards. At a general or local election, voters put a cross (X) next to their preferred candidate on a ballot paper. Ballot papers are then counted and the candidate that has received the most votes is elected to represent the constituency or ward.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work