YouMMe Movie: The Internet Never Forgets – Videos

Internet security

Background information

Rules and laws also apply on the Internet, nevertheless people or groups say or show things there that they would not say publicly in real life. (Cyberbullying, Shitstorm, Hatespeech). Many (often anonymous) users try to influence others this way. In addition, an increasing number of Internet users recklessly disclose personal information and data about themselves online. Risks and side effects when using the Internet are e.g. also:

Unsafe passwords
One of the most common causes of a security breach is overly simple passwords. Many mostly use the same simple passwords. A study by Virginia Tech (Virginia Polytechnic Institute and State University) reveals that 52% of users use the same password for different online accounts. There is also a large number of people who simply add a number or a letter to their usual password for the various accounts.

Unsuitable content (violence, extremism)
Again and again, particularly tasteless websites or pictures / stickers appear, the addresses of which are distributed in schoolyards. When using YouTube, children can suddenly come across violent representations. Right-wing radicals, left-wing radicals and Islamist groups are increasingly using the Internet to lure children and young people to their sites. The websites often look modern, youthful and harmless. But an anti-democratic, xenophobic and racist attitude is spread on them.

Malware, fraud and phishing
Computer viruses (“Trojans”) are often disguised as a useful application, but contain malware that can change or delete data and damage the computer.
So-called “phishing” is unfortunately omnipresent in the global network. It tries to find out personal and secret data such as passwords, access data for online banking or account connections. This happens e.g. through a wrong website that is very similar to the “right” URL and asks you to enter passwords, for example, or through fake e-mails that contain links or attachments.

Rip off
Ringtones, software, homework help or even free apps can turn out to be hidden cost traps. When you register, you buy a subscription or product without realizing it. If advertising is accidentally tapped on these apps, a fee-based contract can be concluded. Online games can often be used free of charge; in order to continue playing, however, virtual lives or products must be purchased. This is partly possible via the telephone bill.

Copyright infringement
Children and young people often use the Internet to download films, games and music. Here, too, there is a risk of catching viruses or Trojans when downloading. There can also be legal problems. Copyright law protects intellectual property and prohibits the unauthorized distribution of artistic or journalistic works.

The network forgets nothing!
What was once put online can often still be found later. Even deleted texts and photos or websites that have been switched off can be found again. In addition, it is never clear who has already passed on a text or a photo without the knowledge of the author. E.g. Employers often use various platforms and search engines to find out about the previous lives of applicants.


Practical tips

Internet users must be prepared to encounter one-sided, disturbing, or simply incorrect information or content, or to fall victim to fraud. Here are some tips for dealing with security issues in media education.

Find secure passwords

Password: You have to do two important things: Each online account should have a different password, with the differences between the passwords being large; A mere sequence of numbers or an alphabetical sequence of letters, a row of adjacent keys on the keyboard, a row of the same letters or numbers, your personal identification number, the date of birth, the telephone number, the name of the pet or other information relating to you are not suitable as passwords. Family-related passwords are also not suitable.

A strong password cannot be a word that appears in a dictionary. It should consist of random characters. An example of such a password would be czY3! 3ik or even a longer combination. There are password generators on the Internet, e.g. (please insert your language version here) The easiest way to remember a password is to come up with a sentence, e.g. I like Pizza, replace some letters with similar looking digits, for example you can make “Ilik Pizza” the password “1lik3Pizz @”. Basically, a good password should be at least eight characters long, contain upper and lower case letters, numbers and special characters.

Test the password strength: You can easily determine how secure your passwords are. On websites like you can find out in seconds how long it takes to crack your password.

Unsuitable content (violence, extremism)
Bans on internet use do not help your child develop safe handling of traps online. Rather try to find ways together how you and your child can recognize dangers and protect yourself. For example, for all contacts on the Internet that they may never pass on their personal data. If something seems strange to your child, they should tell you about it. If your child has encountered inappropriate content, do not blame them, but thank your child for their trust and courage to tell you about it. Report the page or post! E.g. with the providers of search engines, video platforms and operators of social networks. Or contact a registration and complaints office. Criminal law applies in cases of child pornography, neo-Nazi propaganda and violence videos.

Malware, fraud and phishing
Encourage your child to always use a nickname (nickname or fantasy name) on the web. Provide him with a second email address that he can use while surfing and that does not provide any clues as to your child’s actual identity. Warn your child not to be identified in communities and social networks. Make the installation of apps a matter for parents and limit the access rights during the installation. Talk to your child about not opening messages from unknown senders, clicking on links in such messages, or opening attachments. If something seems strange to him or if he is suddenly asked to pay money, provide bank details, credit card numbers, telephone numbers or other secret data, he should leave the page.

Rip off
Agree with your child to consult with you before joining a club, have gifts sent or subscribe to something. Protect your child’s smartphone from subscribing by activating the so-called third-party lock.

Copyright infringement
Be careful on websites and exchanges that offer music and videos or films for free. These offers are mostly illegal. In addition to exchanges, you don’t just download files, you also offer them to others (“file sharing”). Copying and uploading third-party files (e.g. pictures, music texts, etc.) can also constitute a copyright infringement. Make it clear to your child that they can be punished. Instruct him to only buy downloads from legal providers. If in doubt, make yourself knowledgeable whether a download platform is harmless.

The network forgets nothing!
Anyone who posts something should think beforehand. That applies to children and adults! Beach photos, pictures of embarrassing situations or extensive celebrations have lost nothing on the net. Even cute photos of the naked baby are private and should remain so.

How helpful was this article?

[Total: 1   Average: 4/5]

Share this: