ICT4 Elderly/Secure Transactions

From Wikibooks, open books for an open world
Jump to navigation Jump to search

Module 1: Secure transactions during every unit

Contents of the module[edit]

• Protecting devices • Protecting personal data • Protecting health, wealth and well-being

Learning objectives[edit]

• Present the topic of secure transactions in each sections of the four previous modules • Participants will be able to recognise internet scams • Participant will be able to manage with personal information through safety protocols • Participant will be able to secure personal data and information

Learning outcomes[edit]

• Participants are able to establish secure transactions in every unit throughout four previous competence areas • Participant will understand how to avoid internet scams • Participants will know safety protocols for managing personal information • Participants will know how to secure personal information

Learning scenario[edit]

• Videos • Interactive demonstrations

Evaluation[edit]

First step: Participants will have to recognize internet scams or false offers; Second step: Participants will have to show how to successfully secure personal information


Training course scenario (template)[edit]

Introduction[edit]

In each piloting country, partners will be responsible for the organization of training lesson plans. Here below you can find a script to follow in order to conduct the training lessons. Please fill this document for each module. Each module should be between 1 and 2 hours long (depending on the complexity of the module and amount of information needed). The goal is to have the 19 modules (between 19h and 30h) described in this document with all the activities each lesson will have. Overall description This curriculum aims at training adult trainers in developing courses where they coach their audience (students/trainee...) to take actively part in their learning process.

Learning Concept Document: Competence area and Module Security and privacy Module 1: Secure transactions during every unit Title of the training Secure transactions during every unit Introduction of the training Internet safety or online safety or cyber safety means (1) trying to be safe on the internet and (2) is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.

As the number of internet users continues to grow worldwide, internets, governments and organizations have expressed concerns about the safety of children using the Internet. Safer Internet Day is celebrated worldwide in February to raise awareness about internet safety.

Information security Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequence such as identity theft, as well as theft of property. Common causes of information security breaches include:

Safety protocol

• Encrypt your data. • Backup your data. • The cloud provides a viable backup option. • Anti-malware protection is a must. • Make your old computers' hard drives unreadable. • Install operating system updates. • Automate your software updates.

Phishing Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.

Internet scams Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.


Malware Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as password, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file.

Personal safety The growth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed communication with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include: phishing, internet scams, malware, cyberstalking, cyberbullying, online predations and sextortion.

Cyberstalking Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.

Cyberbullying Cyberbullying is the use of electronic means such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, or overpower an individual or group.

Online predation Online predation is the act of engaging an underage minor into inappropriate sexual relationships through the internet. Online predators may attempt to initiate and seduce minors into relationships through the use of chat rooms or internet forums.

Obscene/offensive content Various websites on the internet contain material that some deem offensive, distasteful or explicit, which may often be not of the user's liking. Such websites may include internet, shock sites, hate speech or otherwise inflammatory content. Such content may manifest in many ways, such as pop-up ads and unsuspecting links.

Sextortion Sextortion, especially via the use of webcams, is a concern, especially for those who use webcams for flirting and cybersex. Often this involves a cybercriminal posing as someone else - such as an attractive person - initiating communication of a sexual nature with the victim. The victim is then persuaded to undress in front of a webcam, and may also be persuaded to engage in sexual behaviour, such as masturbation. The video is recorded by the cybercriminal, who then reveals their true intent and demands money or other services (such as more explicit images of the victim, in cases of online predation), threatening to publicly release the video and send it to family members and friends of the victim if they do not comply.

Keywords[edit]

Internet safety, Information security, Phishing, Internet scams, Malware, Personal safety, Cyberstalking, Cyberbullying, Online predation, Obscene/offensive content, Sextortion

Subject/Field[edit]

In the introductory part, the lecturer will start the lecture by asking the question what does it mean to be Internet safe? This question will open up a debate which will eventually address the main topic of this lecture - Internet security.

At the beginning of the lecture, the lecturer will describe the term internet security, personal data security, information security, internet abuse, internet scams. Even though Internet usage is fun and instructive, we must be alert to the potential for exposure to abuse while using the Internet. Personal and data security must be paramount, otherwise we may be exposed to various forms of extortion. During the lecture, participants will be presented with how to protect their personal information and other information that could expose our identity to abuse. It is very important that the participants, with the knowledge gained in the lecture, can detect potential Internet frauds and thus be able to protect themselves in advance.

Task - Each participant will have to search for an Internet scam and present it to other participants. It is important for each participant to become aware of as many types and forms of fraud as possible while using the Internet.

Task – Each participant will have to present one form of possible internet safety protocol (password security, etc.)

Finally, time will be devoted to a joint debate where participants can raise thoughts, questions, concerns about the topic being discussed.

Material required[edit]

  • Personal computer (Smartphone or tablet connected to the Internet)

●     Internet connection

●     Beamer

●     Paper and pens

●     Flipchart

●     Speakers

Context[edit]

Participants are able to establish secure transactions in every unit throughout four previous competence areas

·         Participant will understand how to avoid internet scams

·         Participants will know safety protocols for managing personal information

·         Participants will know how to secure personal information

Purpose of the session[edit]

Overview: the purpose of the session will be
- to provide an introduction to establish secure transactions in every unit throughout
- to facilitate safety protocols to manage personal information
- to discover how to avoid internet scams
- to motivate to secure personal information

Structure[edit]

Introduction[edit]


Timeframe of the session
10’ introduction : (Trainer) - (support: slides & video & web)

Description of the activity

In the introductory part, the lecturer will start the lecture by asking the question what does it mean to be Internet safe? This question will open up a debate which will eventually address the main topic of this lecture - Internet security.

35’ duration : (Trainer) - (support: slides & video & web)

Description of the activity

At the beginning of the lecture, the lecturer will describe the term internet security, personal data security, information security, internet abuse, internet scams. Even though Internet usage is fun and instructive, we must be alert to the potential for exposure to abuse while using the Internet. Personal and data security must be paramount, otherwise we may be exposed to various forms of extortion. During the lecture, participants will be presented with how to protect their personal information and other information that could expose our identity to abuse. It is very important that the participants, with the knowledge gained in the lecture, can detect potential Internet frauds and thus be able to protect themselves in advance.

25’ duration : (Trainer) - (support: slides & video & web)

Description of the activity

Everyone opens his/her laptop

Task - Each participant will have to search for an Internet scam and present it to other participants. It is important for each participant to become aware of as many types and forms of fraud as possible while using the Internet.

Task – Each participant will have to present one form of possible internet safety protocol (password security, etc.)

15’ duration : Everyone opens his/her laptop

Description of the activity

Finally, time will be devoted to a joint debate where participants can raise thoughts, questions, concerns about the topic being discussed.

Homework:

Watch videos and comment.

10 Online Scams You Might Get Fooled By!

https://www.youtube.com/watch?v=Ub4pmw7OEn0

This is what happens when you reply to spam email | James Veitch

https://www.youtube.com/watch?v=_QdPW8JrYzQ

Debriefing: To wrap up the session, the trainer will facilitate a debriefing moment where participants are encouraged to express their questions, doubts, ideas and feelings toward the topics discussed.
Evaluation: Participants will answer a small questionnaire to evaluate the form and the content of the session.
Overall duration of the session: 85 min