Chapter 2 Digital Literacy
Chapter 2 Digital Literacy
Chapter 2 Digital Literacy
Chapter 2
Staying safe online
Topic 2.1
Collecting data
Online data Collection
Internet/website Cookies
Play Time
https://www.youtube.com/watch?v=_zZ6dnW5Nic
How data is collected online
Online registrations
Online shopping
Is this site secure?
Cookies
What is a cookie?
1. Essential cookies
2. Performance cookies
3. Functionality cookies
4. Advertising cookies
What are the Cookies used for?
Cookies and the law
Cookie
policy
Activity pg. 37
Good Uses of Cookies Bad Uses of cookies
Topic 2.3
Danger Online
Cybercrime
Course Content
• Cybercrime and • Virus
cybercriminal • Trojan
• Cybercrime Methods • Ransomware
1. Identity Theft • Spyware
2. Phishing • Adware
3. Scamming
4. Hacking
• Types of hacker
• Test: What type of hacker he
is?
• Malware
Cybercrime and cybercriminal
• Cybercrime is any illegal activity done using computer or
a network.
• Cybercrime is criminal activity that either targets or uses
a computer, a computer network or a networked device.
Most, but not all, cybercrime is committed by
cybercriminals or hackers who want to make money.
Cybercrime is carried out by individuals or organizations.
• Rarely, cybercrime aims to damage computers for reasons
other than profit. These could be political or personal.
(www.kaspersky.com)
Cybercrime Methods
1. Identity Theft
2. Phishing
3. Scamming
4. Hacking
1. Identity theft
• Identity theft is the crime of obtaining the personal or
financial information of another person to use their
identity to commit fraud, such as making unauthorized
transactions or purchases. Identity theft is committed in
many different ways and its victims are typically left with
damage to their credit, finances, and reputation. Types of
Identity theft are
• Financial identity theft
• Social Security identity theft
• Medical identity theft
• Synthetic identity theft
2. Phishing
• White Hat
• Black Hat
• Gray Hat
• A Trojan acts like a bona fide application or file to trick you. It seeks
to deceive you into loading and executing the malware on your
device. Once installed, a Trojan can perform the action it was
designed for.
Ransomware
• Ransomware is a type of malware used to extort money
by holding the victim’s data or device to ransom.
WannaCry is type of ransomware which targeted a
vulnerability in computers running Microsoft Windows.
• When the WannaCry ransomware attack hit, 230,000
computers were affected across 150 countries. Users were
locked out of their files and sent a message demanding
that they pay a BitCoin ransom to regain access.
• Worldwide, the WannaCry cybercrime is estimated to
have caused $4 billion in financial losses.
Spyware
• Spyware is loosely defined as malicious software designed to enter
your computer device, gather data about you, and forward it to a
third-party without your consent. Spyware can also refer to
legitimate software that monitors your data for commercial purposes
like advertising.
• Step-by-step, spyware will take the following actions on your
computer or mobile device:
1. Infiltrate — via an app install package, malicious website, or file
attachment.
2. Monitor and capture data — via keystrokes, screen captures, and other
tracking codes.
3. Send stolen data — to the spyware author, to be used directly or sold to
other parties.
Adware
Firewall
Anti-virus
Using your computers safely
Test: What should we do
A B C D
That’s Right
Harassing someone is a common method of online bullying.
Participating in text wars or text attacks, which occur when bullies
gang up on the victim and send thousands of texts.
Posting rumors, threats, or embarrassing information on social
networking sites such as Facebook, Twitter, and Instagram.
Wrong Answer
Harassing someone is a common method of online bullying.
Participating in text wars or text attacks, which occur when bullies
gang up on the victim and send thousands of texts.
Posting rumors, threats, or embarrassing information on social
networking sites such as Facebook, Twitter, and Instagram.
Describe the picture
Intellectual Property
Intellectual property (IP)
refers to creations of the
mind, such as inventions;
literary and artistic works;
designs; and symbols, names
• Intellectual property (IP) is a
and images used in
category of property that
commerce. (www.wipo.int) includes intangible creations
of the human intellect.
(https://en.wikipedia.org)
Types of Intellectual Property
• Copyright
• Means we have the right to copy our work.
• Other people must ack permission before they can use it.
• It helps the copyright owner to control reproduction,
performance, adaptations, and distribution of the work.
Examples of such works are- literature, drawings, paintings,
songs, music, computer software, films, photos, web content,
etc.
• We automatically have the copyright of any work we create
• Like I have the copyright of this powerpoint.
Types of Intellectual Property
• Trade mark
• It protects brands.
• Under the law, a trademark is anything by
which customers recognize a brand or the
source of a product.
• A trademark offers legal protection for logo,
Credits: Legalwiz
design, symbol, phrase, wordmarks, or a
combination of those that represents a source
of goods or services.
Types of Intellectual
Property
• Patent
• Inventors use patents to
protect their inventions.
• A patent stops other
people form copying
and invention and
claiming it as their own
idea
Types of Intellectual Property
• Registered design
• This is used to protect designs like wall papers and
carpet patterns.
• Registered Design refers to the configuration, pattern,
or ornamentation which when applied to a product
gives the product a unique appearance.
• we can register a design but it must be new and
distinctive.
• The Coca Cola bottle, even without any text or
branding was registered in 2009 in Japan being the
first of its kind.
What could be the trade mark of
Cadbury?
• https://www.malwarebytes.com/adware
• https://searchsecurity.techtarget.com/definition/firewall
References
• https://www.helpguide.org/articles/abuse/bullying-and-cybe
rbullying.htm
• https://www.educationalappstore.com/blog/common-ways-
cyberbullying/
• https://www.stopbullying.gov/cyberbullying/what-is-it
• https://www.wipo.int/about-ip/en/#:~:text=Intellectual%20p
roperty%20(IP)%20refers%20to,and%20images%20used%20i
n%20commerce
.
• https://justcreative.com/copyright-patents-trademarks-registered-des
igns/
• https://openoregon.pressbooks.pub/wrd/chapter/crediting-your-sour
ces/
•