ICT4 Elderly/Secure Transactions
Contents of the module
- Protecting devices;
- Protecting personal data;
- Protecting health, wealth and well-being.
Learning objectives
- Present the topic of secure transactions in each sections of the four previous modules;
- Participants will be able to recognise internet scams;
- Participant will be able to manage with personal information through safety protocols;
- Participant will be able to secure personal data and information.
Learning outcomes
- Participants are able to establish secure transactions in every unit throughout four previous competence areas;
- Participant will understand how to avoid internet scams;
- Participants will know safety protocols for managing personal information;
- Participants will know how to secure personal information.
Learning scenario
- Videos;
- Interactive demonstrations.
Evaluation
- Participants will have to recognize internet scams or false offers;
- Participants will have to show how to successfully secure personal information.
Following this module learners will:
- Participants are able to establish secure transactions in every unit throughout four previous competence areas;
- Participant will understand how to avoid internet scams;
- Participants will know safety protocols for managing personal information;
- Participants will know how to secure personal information.
Training course scenario
[edit | edit source]Introduction
[edit | edit source]In each piloting country, partners will be responsible for the organization of training lesson plans. Here below you can find a script to follow in order to conduct the training lessons. Please fill this document for each module. Each module should be between 1 and 2 hours long (depending on the complexity of the module and amount of information needed). The goal is to have the 19 modules (between 19h and 30h) described in this document with all the activities each lesson will have. Overall description This curriculum aims at training adult trainers in developing courses where they coach their audience (students/trainee...) to take actively part in their learning process.
Learning Concept Document
Competence area and Module Security and privacy Module 1: Secure transactions during every unit Title of the training Secure transactions during every unit Introduction of the training Internet safety or online safety or cyber safety means (1) trying to be safe on the internet and (2) is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.
As the number of internet users continues to grow worldwide, internets, governments and organizations have expressed concerns about the safety of children using the Internet. Safer Internet Day is celebrated worldwide in February to raise awareness about internet safety.
Information security Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequence such as identity theft, as well as theft of property. Common causes of information security breaches include:
Safety protocol
- Encrypt your data
- Backup your data
- The cloud provides a viable backup option
- Anti-malware protection is a must
- Make your old computers' hard drives unreadable
- Install operating system updates
- Automate your software updates
Phishing
Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.
Internet scams
Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.
Malware
Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as password, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file.
Personal safety
The growth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed communication with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include: phishing, internet scams, malware, cyberstalking, cyberbullying, online predations and sextortion.
Cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.
Cyberbullying
Cyberbullying is the use of electronic means such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, or overpower an individual or group.
Online predation
Online predation is the act of engaging an underage minor into inappropriate sexual relationships through the internet. Online predators may attempt to initiate and seduce minors into relationships through the use of chat rooms or internet forums.
Obscene/offensive content
Various websites on the internet contain material that some deem offensive, distasteful or explicit, which may often be not of the user's liking. Such websites may include internet, shock sites, hate speech or otherwise inflammatory content. Such content may manifest in many ways, such as pop-up ads and unsuspecting links.
Sextortion
Sextortion, especially via the use of webcams, is a concern, especially for those who use webcams for flirting and cybersex. Often this involves a cybercriminal posing as someone else - such as an attractive person - initiating communication of a sexual nature with the victim. The victim is then persuaded to undress in front of a webcam, and may also be persuaded to engage in sexual behaviour, such as masturbation. The video is recorded by the cybercriminal, who then reveals their true intent and demands money or other services (such as more explicit images of the victim, in cases of online predation), threatening to publicly release the video and send it to family members and friends of the victim if they do not comply.
Keywords
[edit | edit source]Internet safety, Information security, Phishing, Internet scams, Malware, Personal safety, Cyberstalking, Cyberbullying, Online predation, Obscene/offensive content, Sextortion.
Subject/Field
[edit | edit source]In the introductory part, the lecturer will start the lecture by asking the question what does it mean to be Internet safe? This question will open up a debate which will eventually address the main topic of this lecture - Internet security.
At the beginning of the lecture, the lecturer will describe the term internet security, personal data security, information security, internet abuse, internet scams. Even though Internet usage is fun and instructive, we must be alert to the potential for exposure to abuse while using the Internet. Personal and data security must be paramount, otherwise we may be exposed to various forms of extortion. During the lecture, participants will be presented with how to protect their personal information and other information that could expose our identity to abuse. It is very important that the participants, with the knowledge gained in the lecture, can detect potential Internet frauds and thus be able to protect themselves in advance.
Task - Each participant will have to search for an Internet scam and present it to other participants. It is important for each participant to become aware of as many types and forms of fraud as possible while using the Internet.
Task – Each participant will have to present one form of possible internet safety protocol (password security, etc.)
Finally, time will be devoted to a joint debate where participants can raise thoughts, questions, concerns about the topic being discussed.
Material required
[edit | edit source]- Personal computer (Smartphone or tablet connected to the Internet)
- Internet connection
- Beamer
- Paper and pens
- Flipchart
- Speakers
The purpose of the session will be:
- to provide an introduction to establish secure transactions in every unit throughout</nowiki>
- to facilitate safety protocols to manage personal information</nowiki>
- to discover how to avoid internet scams</nowiki>
- to motivate to secure personal information</nowiki>
Introduction
[edit | edit source]In the introductory part, the lecturer will start the lecture by asking the question what does it mean to be Internet safe? This question will open up a debate which will eventually address the main topic of this lecture - Internet security.
Lecture
[edit | edit source]At the beginning of the lecture, the lecturer will describe the term internet security, personal data security, information security, internet abuse, internet scams. Even though Internet usage is fun and instructive, we must be alert to the potential for exposure to abuse while using the Internet. Personal and data security must be paramount, otherwise we may be exposed to various forms of extortion. During the lecture, participants will be presented with how to protect their personal information and other information that could expose our identity to abuse. It is very important that the participants, with the knowledge gained in the lecture, can detect potential Internet frauds and thus be able to protect themselves in advance.
Exercices
[edit | edit source]Everyone opens his/her laptop
Task - Each participant will have to search for an Internet scam and present it to other participants. It is important for each participant to become aware of as many types and forms of fraud as possible while using the Internet.
Task – Each participant will have to present one form of possible internet safety protocol (password security, etc.)
Debate
[edit | edit source]Finally, time will be devoted to a joint debate where participants can raise thoughts, questions, concerns about the topic being discussed.
Homework
[edit | edit source]Watch video and comment.
Debriefing
[edit | edit source]To wrap up the session, the trainer will facilitate a debriefing moment where participants are encouraged to express their questions, doubts, ideas and feelings toward the topics discussed.
Evaluation
[edit | edit source]Participants will answer a small questionnaire to evaluate the form and the content of the session.
Overall duration of the session
[edit | edit source]1 hour and 25 min