internet safety – do’s and dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers....

12
68 Internet Safety – Do’s and Dont’s In this lesson you will learn: How to maintain information privacy. How to take necessary precautions while browsing. Email etiquette. m A Jyoti: I heard that a leopard was sighted near your house yesterday night. Did you see the leopard? Tejas: No. e Security officer gave us instructions not to come out. So we stayed inside. Jyoti: Today I saw a notice from the Security officer called “Be smart and stay safe”! Moz: It is good to observe the rules of safety. On Internet too, you should follow some safety rules. Be SMART and make best use of the Internet. Tejas: What does the acronym SMART stand for? It is easy to remember though. Does the first letter ‘S’ stand for Safe? Moz: You are right. S stands for “Keep Safe”. Let us look at the information that you should keep safe. Jyoti: One safety rule that we know is to keep our password secret. We should not share the password even with our friends. Tejas: We never give our address or our phone number to people whom we do not know. is rule can apply to Internet too. Moz: Both of you are correct. Jyoti: Are photos personal? Moz: Photos too are personal. So think carefully before you share a picture of yourself, your friends or your family. Why should you not give personal information to strangers? Tejas: We do not know whether they are good or bad. Jyoti: ey can contact us. Moz: Yes. On Internet they can also pretend to be you and get you into trouble. So never give personal information to strangers. Jyoti and Tejas were discussing about the leopard sighting in their campus. 7 Lesson

Upload: others

Post on 09-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

68

Internet Safety – Do’s and Dont’sIn this lesson you will learn:How to maintain information privacy.How to take necessary precautions while browsing.Email etiquette.

mA

Jyoti: I heard that a leopard was sighted near your house yesterday night. Did you see the leopard? Tejas: No. The Security officer gave us instructions not to come out. So we stayed inside.Jyoti: Today I saw a notice from the Security officer called “Be smart and stay safe”! Moz: It is good to observe the rules of safety. On Internet too, you should follow some safety rules. Be SMART and make best use of the Internet.Tejas: What does the acronym SMART stand for? It is easy to remember though. Does the first letter ‘S’ stand for Safe?Moz: You are right. S stands for “Keep Safe”. Let us look at the information that you should keep safe.Jyoti: One safety rule that we know is to keep our password secret. We should not share the password even with our friends.

Tejas: We never give our address or our phone number to people whom we do not know. This rule can apply to Internet too.

Moz: Both of you are correct. Jyoti: Are photos personal?Moz: Photos too are personal. So think carefully before you share a picture of yourself, your friends or your family. Why should you not give personal information to strangers?Tejas: We do not know whether they are good or bad. Jyoti: They can contact us.Moz: Yes. On Internet they can also pretend to be you and get you into trouble. So never give personal information to strangers.

Jyoti and Tejas were discussing about the leopard sighting in their campus.

7Lesson

Page 2: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

69

Jyoti: Do people hide their age and talk to us like they are our age?Moz: Yes. This is one of the biggest masquerading that happens. An old devil can pretend to be a young saint. They can trick you into giving all the information and harm you, your family or friends.Tejas: How can they harm?Moz: Let us understand this through an example. Let us call this person who is pretending to be a person of say 45 years old, Devil. He says that he is 12 years old and makes friends with Jwala who is 11 years old on the web.

Jyoti: I will never forget this rule. Tejas: Then we should not give our School name and city where we live in.Moz: You are right and never tell about the whereabouts of your family, friends etc. Never tell anyone that you are alone at home.

Here is how the conversation goes.Jwala: Hello. Devil: Hello. My name is Sweta and I am 12 years old.Jwala: I am also 12 years old.

After a few such conversations:Devil: Today I am going for the movie xxx.Jwala: I have not yet see this movie. Devil: Will tell you all about it tomorrow. By the way here is my photograph. I am eager to see how my friend looks like.

Jwala send her photograph too. After a few such conversations:

Devil: I stay in Hyderabad. Where do you stay?Jwala: We stay in Sion, Mumbai.Devil: So do you go to St. Xavier’s in Sion.Jwala: No. I go to Navnit near the station.Devil: Do you have a play ground near your house to play in the evening.Jwala: No. We play at my friend’s place as all our parents are working. No one is at home after we come home.

So the conversation continues and one day the person comes home to Jwala’s place when her parents are not around and harms her.

SMART - Keep SafeIt’s important to keep your personal information safe and secret. •Do not reveal your personal information to strangers through email or •any other internet application. Passwords should be kept secret. Passwords should not be given to even •your best friends.

personal information

Full name

Email Id

Password

Home address

School name

Phone numbers

Upload photo

Page 3: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

70

Moz: Internet is a medium through which you can easily keep in touch with friends and relatives. You may also make an online friend.Tejas: My brother has made some online friends. But he says that we should not meet these people as we do not know who they are.Moz: Correct.Tejas: But why should we not me them? They are friends. Moz: On internet people can pretend to be what they are not. You have not seen them before making friends. The person can say that he or she is ten years old but can be an adult with not so good intentions. So you should be careful. Tejas: Our parents instruct us not to talk to strangers. Sometimes the strangers can pretend to be very nice but they may not be.Moz: Right. The same can happen on the internet. Best is, never arrange to meet an online friend.

Tejas: Look. In my inbox there are a few mails from someone I do not know.Moz: Do not open the mails and do not reply to emails from strangers. Tejas: See one of the mail subjects says, “Happy Birthday”. The name of the attachment is “Gifts”. Can I please open this mail?

SMART - Do not Meet upThe Internet is a great way of keeping in touch with friends and family. You •might also make new friends online.However, you should never arrange to meet an online friend because it can •be dangerous.No matter how well you think you know people, they might be pretending.•

What is personal information?Full name, email Id, password•Home address, school name, phone numbers, photos•Details of your daily schedule.•Details of whereabouts of you, your family and friends at any time of •day or night.Details of your holiday plans.•

Why should you not give personal information?The information can be used to contact you. •Someone can pretend to be you or not someone that he or she claims to be •and possibly get you into trouble and harm you.

Page 4: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

71

Moz: Is this email from a friend or a person you know? Is it your birthday today?Tejas: No I do not know the person. And my birthday is not today but next month. What will happen if I open this mail?Moz: Yesterday it was reported in the news papers about such a mail that is causing problems to many computers. There was also a warning not to open the mail. The screen can go blank if the attachment has a virus. Jyoti: Does it destroy everything on the computer?

Jyoti: Does it destroy everything on the computer?Moz: Yes. The computer will not start and you may have to reinstall everything. Jyoti: Oh! That means if we had our files on the computer they would have been lost.Moz: Correct. The virus is transferred through attachments to the computer. So, do not open attachments from people whom you do not know.

Tejas: Can other attachments also have problems like this.Moz: Yes. It is possible. The computer can be safeguarded against these viruses. You will learn more about this later. Jyoti: Look. I got an email which says, “Forward this mail to ten more people. Do not break the chain”.Moz: You should not believe in such mails and never forward such mails to others.Jyoti: What happens if we forward the mails?Moz: Well. First, you do not know the person. Second, do not believe in such mails. Third, such mails create unnecessary traffic on the internet which is called SPAM. Finally, if everyone starts forwarding such mails then our mail boxes will be flooded with junk mails and important mails will be missed out.

Jyoti: What is SPAM?Moz: The mail you mentioned says “Forward to ten more people”. Suppose you forward the mail. Then each of the ten people to whom you forward, again forward the mails. So now how many mails have been sent?Jyoti: 10 times 10 that is 100 mails.Tejas: Oh! No. I send to 10 people, each of whom sends to 10 more, each of whom send to 10 more. So in just three levels of forwarding, 1 mail becomes 10,000 copies!Moz: Correct. You got the point. Also never believe the predictions in such mails, which usually say, “Good things happen if you forward and bad things happen if you delete”. Tejas (with an expression): Millions of these junk mails are going around on the network. What a waste of network!

Page 5: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

72

SMART - Do not Accept emails from strangers and do not open Attachments.Email is a quick and easy way to send messages and share pictures etc with •people whom we know.However, Accepting emails, or opening Attachments, which contain pictures •or texts from people you don’t know or trust can lead to problems. The Attachments in an email, especially from a stranger, may contain viruses •or nasty messages.The viruses can harm the computer. You can loose all the files on the •computer.Do not forward or reply to mails that you receive from strangers and do not •believe anything in these mails. Chain mails that say “Good things will happen if you forward and bad things •will happen if you delete” should not be believed at all. Never believe in such mails and do not forward such mails. The exponential increase in number of such mails floating around the internet only cause internet traffic congestion and crowd an individual’s mailbox.

Tejas and Jyoti do some exercises for a break and then they start searching for information about earthworms from the internet. They find some information which they could not believe is true.

Tejas: This web page says “earthworms live for more than 5 years. If you cut the earthworms into two or more pieces each piece will grow into a worm.” Can’t believe it!Jyoti: I have seen earthworms in our garden. Especially in rainy season. But I wonder if they can grow back into worms again.Moz: Good thinking. When you feel that you cannot trust some information that you find on internet, ask your elders like teachers, parents.Tejas: Does it mean that on internet, people can even write information which is not true?Moz: Yes. It is possible. Anyone can publish on the internet. Internet does give us a lot of good and wide range of information. However, when we come across information that we feel may not be true or we have doubt about the information, then we need to think carefully before trusting such information. Jyoti: Not only information, sometimes we cannot trust messages in mails too. I got a mail which said “You have won a gold set worth Rs. 10, 000. Pay Rs. 1000 when you receive the gift towards delivery charges.” My friend also received such a mail. When she received the packet they found that it is junk jewellery worth about hundred rupees.Moz: Correct. Never trust such messages and advertisements. They are not reliable.

!?

Page 6: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

73

SMART - Check for Reliability of information and messages on the internet. Internet is full of useful and amazing information. However, sometimes the •information is not reliable. People might say or write things which are untrue, so you should always think •carefully before trusting what you see or hear. Sometimes you might see adverts telling you that you’ve won one million •pounds or a free computer. These types of adverts are definitely not reliable and you shouldn’t believe them.

SMART - Tell your parents, elders or teachers about any information or message that you do not trust.

Internet is full of fun and interesting things. But when you find something •that you do not like or disturbing then you must tell your parents or elders whom you trust.A message in a mail for meetings etc. should be discussed with your parents.•

Tejas: Today our family is going for a movie. Can I search for information about the movie on the internet?Moz: Yes. Go ahead. Tejas enters the movie name and finds out about the movie and shows it to Jyoti.Tejas: Jyoti, Would you like to join us? It is a nice movie.Jyoti: I have to ask my parents. If they give me permission I will come.Moz: Similar to taking permission when you go out you should also ask your parents when you want to use the internet.Jyoti: My mother sits with me whenever I want to use internet. She not only helps me but we also discover interesting information together.Tejas: I too browse the internet with my elder brother and sometime my father. Once Dad and I beat the computer in chess. It was fun.Moz: Good. Tejas: Once when my dad had some work I was browsing. Then I misspelled the word “Lego”. I got some weird sites. I called my dad. My dad told me to just ignore such sites and correct the spelling and search again. Moz: You have done the right thing. There must be some places where your parents might say that it is not safe for you to go. Similarly on internet too there are some web pages which are not good. Remember to inform your parents if you come across information which you are not happy about or something which you do not like.Tejas: Once we got a mail saying that all our friends are meeting in the park. It looked like it was from my friend. But none of us decided to meet. So, I told my parents about the same. They checked the email address and found out that it was not my friend’s email id. Moz: Correct. This is what you should do. Always inform your parents about such emails and also about information that you cannot believe in.

Page 7: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

74

Make an agreement with your children about how long can they use Internet per •weekandforwhatpurposes.Letthemsignitsothattheyfeelcommittedtorespecttheir promise. Inform your children that what ever we do on Internet, we can get the record for it. •This will make them more responsible and accountable.Regularly track history of the Internet application. To do this, click History at the top •ofthewindowtoopentheleft-sidehistorybartotrackbrowsinghistory.You can use Internet safety tools like kidlogger, refog, spicewprks to limit access to •content.Always sit with your kids when they are online. Encourage them to share with •you information about whom do they communicate with and for what purposes. Encourage them to use the Internet mainly for educational purposes. Assist them to create online nicknames. Insist that your children not share personal •information. Instruct your children not to download programs, music, or files without your•permission. Be a positive role model. All family members are role models for young children who •are just starting to use the Internet. Your children learn more by observing what you do on the Internet rather than telling them to follow the rules.Remember that Internet can be addictive and kids need to be guarded against this. •Encourage them to play outdoor games rather than get hooked onto the computer. Keep computers in the family room and/or place the monitor such that you can get a •quick glance at the activities on the monitor while passing by. Be alert to sudden changes in your child’s behaviour. Some pointers that should •alarm you are: Does your child spend more time on the computer? Has he/ she become suddenly more secretive? Does he/ she try to keep the screen turned away so that others cannot look what he/ she is doing on the computer?Encourage your children to tell you, if something or someone online makes them feel •uncomfortable or threatened. Stay calm and assure them that they are not in trouble forbringingsomethingtoyourattention.Praisetheirbehaviorandencouragethemto come to you again if the same thing happens. Install anti-virus software and scan your computers regularly. Take backup of•important data at least once a fortnight.

Lesson

Outcome

Browse internet safely.

Maintain information privacy.

Be aware of computer virus , spam and

data backup.

Parents’Corner

Moz: These are the rules which you should follow while browsing the Internet. Strictly follow them and browse safely. Chin Chinaki...

Page 8: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

75

WORKSHEETSBook V Lesson 7

There were a series of burglaries in the 1. neighbourhood of Sarika. A spy was engaged to find out how these burglaries happened. The houses of all the friends of Sarika were burgled. Sarika has recently made a few friends online. The spy found out that two of the online friends of Sarika were the burglars. Sarika is a very nice girl. She was aghast at the information that the spy found out. What was Sarika’s mistake? What did she unknowingly reveal to the online friends?

Mitu monkey liked to sit on the rose apple tree by the river side and eat the apples. 2. Crocky the crocodile observes this from the river. To make friends with the monkey Crocky talks with Mitu and expresses its wish to eat the apples. Mitu picks a few apples and throws them into the river for Crocky. Mitu sitting on the tree, Crocky in the river, eat apples, chat away and become friends. After a few days, Crocky talks about the sweet ripe mangoes on the other side of the river. Mitu’s mouth waters when it hears about the mangoes. Mitu also gets tempted by the offer of Crocky, to take Mitu to the other side on its back. So Mitu climbs down the apple tree and climbs on Crocky’s back. Crocky talks very sweetly with Mitu while swimming. When they were half way from the other side of the river Crocky turns upside down so that Mitu loses balance and drowns in the river. Crocky thus gets a monkey’s heart for his wife. What does this story tell you? What is the rule that Mitu the monkey did not follow?

______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________

______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________

Page 9: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

76

WORKSHEETSBook V Lesson 7

Sonu, Monu and Savani formed a team for a School project. For this project they had 3. to gather information from various sources and prepare a report about the topic. All three friends worked hard and started preparing the report on the computer using a word processing application. The report was completed in a week’s time and they had to take a print out. Savani’s brother said that he will take a print out the next day. They saved the document. Later Savani’s brother and brother’s friends checked mails on the computer. Next day when Savani’s brother started the computer an error message “Computer infected by virus” was displayed. Savani and his friends could not retrieve their project file for printing. Savani’s brother, who was also a computer science engineer, investigated and found how the computer got infected by the virus. How did this happen? What was the rule of internet that was not followed? What was the result of flouting the rule?

A one day cricket match between India and South Africa is to be played in the city 4. where Bholu, Shamu, and Venky live. All three wanted to buy tickets for the cricket match. An acquaintance of Bholu, Shamu and Venky informs them by word of mouth, that free tickets are available at the stadium from 9.00 am to 11.00 am on Tuesday. Bholu reads sports magazines. He reads the announcement in the magazine about the place where tickets for the cricket can be bought. Venky watches sports channel on TV regularly. While watching cricket he finds out the place where tickets are being sold from an advertisement in the sports channel. Bholu and Venky buy the tickets. Shamu did not find ticket counters at the stadium. What was the mistake of Shamu?

______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________

______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________

Page 10: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

77

Aliah, Sweta and Sahiti planned to go to the beach directly from school. They went to 5. the beach and met some more friends there. All of them together went into the sea. Some of them knew swimming but Sweta and Vinay did not know how to swim. It was high tide time and there were warnings to people about drowning. The children did not listen and they were caught in the waves. Sweta was drowning. The life guard saved her but she had to be hospitalised. Her parents were searching for Sweta as she was not home after school and they could not believe that Sweta went to the beach. What was the reason of this accident? Why could Sweta’s parents not believe what they heard?

Salman and Janet have been getting emails 5. from a stranger about a competition in chess as both of them were chess enthusiasts. Both started communicating with the stranger about the competition. They asked the stranger to register them for the competition. The day of the competition both of them went to the venue of the competition which was just a few blocks away from their homes. There was no competition at the venue. They not only did not find the person who was communicating but lost their watches, jewellery and the money that they had with them. What rules did they not follow?

WORKSHEETSBook V Lesson 7

______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________

______________________________________________________________ ______________________________________________________________ ______________________________________________________________ ______________________________________________________________

Page 11: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

78

Book V Lesson 7

Explore!Find out the different names of Virus that can 1. attack your computer.Find out the different anti virus software available.2. Observe how an antivirus software scans your 3. computer.

Virus Killer: 1. Aim of the game is to score as many points by destroying viruses and with bonuses at the end of each round. Viruses will stream in each round and begin to make their way towards your directories. Viruses can be destroyed by firing your kernel laser at them.

Group ActivityIn this lesson we have learnt the various rules you have to follow while browsing the Internet. Similarly, while driving on the road, you have to follow certain rules. Form groups of two and make poster with the various traffic signs with its relevant explanation.

Page 12: Internet Safety – Do’s and Dont’svijaya/ssrvm/dokuwiki/media/cm5_l7_11ma… · to strangers. Sometimes the strangers can pretend to be very nice but they may not be. Moz: Right

79

Teacher’sCornerThe purpose of this lesson is to teach the students how to safeguard oneself while using Internet and email services. While, earlier lessons have asked the students to be cautious whilesurfing,thislessonprovidesexplicitguidelines.

Narratea story thatgives informationonwhathappens ifone isnot safe.Forexample,Nafisamadefriendsatasocialnetworkingsite(e.g.Facebook)andtheyaskedhertocomeoverforacupofcoffee.Shewasabductedandreleasedwiththehelpofpolice.Emphasizeonnotsharingpersonalinformation.Youcangiveexamplesofwhatispersonal sothatit becomes clear to them that sharing snaps, videos, address, details of family members, phone number are all personal information. Tell the students that strangers may not have good intentions and therefore they should be cautious. Instruct them to use the Internet under the supervision of an older family member/ teacher.

Educatethestudentsabouthowaviruscanattacktheircomputer.Mentionthatattachmentsreceived in email and pen drive are the most common ways of acquiring it. Inform them about what a virus does and that one needs to protect the computer from it.

Tell the students that not all the information available online and received in email is reliable. Usetheexamplementionedinthelessonaboutwinningaprizemoneytoteachthis.

Emphasizethattheyneedtobringtonoticeoftheirparents/teachersaboutmailsreceivedfromstrangers,anyothermaterialthatisdisturbing.Usethisopportunitytosensitizethestudents about the possible abuse that can happen while using Internet.

You can make a poster of SMART guidelines and put it in the computer room to remind thestudentsaboutsafeonlinebehaviour.EmphasizethatInternethastobeusedmainlyforeducational purposes and for not more than a couple of hours per week.

Further Reading:http://home.disney.go.com/guestservices/safetyhttp://www.wiredkids.org/http://www.connectsafely.org/safety-tips.htmlhttp://www.badguypatrol.ca/default.htm

Book VLesson 7