ESAFETY

  • OBJECTIVES: 

    - to grow aware of the need to work safely online

    - to improve the students' digital competence

    - to make students interact on a current topic.

    EXPECTED RESULTS: 

    - creation of a collaborative glossary with the students' own definition 

    ASSESSMENT: 

    - participation in the discussion below

     

    Not only school children, but also adults have to pay a lot of attention to esafety:

    • Are you taught about esafety at school? 
    • Do you have any school protocol? 
    • If you have a question, who do you ask?

    There are so many opinions on this tricky subject, but what we need is information and facts, so let's make an esafety glossary together.

    These are the steps to follow: 

    - Do some research, preferably with your teacher, and think about an esafety-related expression.

    - Add an item in the Twinboard. If necessary, include a link, an image or a video. REMEMBER IT HAS TO BE CREATIVE COMMONS.

    - Share your impressions and doubts in the discussion below.

  • Our glossary

    CYBER SAFETY

    Different measures and protocols to ensure safe work between pupils

    Social Networking

    The use of internet-based social media sites to stay connected with friends, family, colleagues, customers, or clients.

    Spyware

    It's a malware, a type of software used to collect information from a computer or computing device and transmit the information to an external entity without the permission of the owner of the computer.

    Phishing

    Phishing is a cybercrime technique that uses fraud, deception and scam to manipulate its victims into revealing sensitive personal information.

    Spam

    It is a form of unsolicited communication that is sent in bulk, for example, by email. Many frauds are produced through spam.

    Password

    Password is a sequence of characters used for secure access.

    Password strenght

    How difficult is it to guess your password? (top one 2021: 123456). Check this simple tip to boost your online security.

    Misinformation

    'Cambridge's Defence Against the Dark Arts' teacher invites you to "walk a mile in the shoes of a manipulator to get to know their tactics from the inside". Play this award-winning 5-minutes game and learn how to resist misinformation.

    Vishing

    Vishing is a combination of telephone call and phishing, consisting of obtaining information from de victim with a voice call in order to obtain money from their accounts.

    SOFTWARE

    Software is used to control a computer. There are different types of software that can run on a computer: system software, utility software, and application software.

    Cookies

    Cookies are parts of data memorized from the website for personalize the experience of the user, this exchange of informations allows the website to recognize your computer and send to it personalized informations.