D i g it a l Safe t y and Responsi bi lity. What is that? And Why should I care?

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Hart District Acceptable Use Policy Acceptable Use Policy.
PRESENTATION NAME Company Name. Title Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Vivamus et magna. Fusce sed sem sed magna suscipit egestas.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
 Problem Definition : Title Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Vivamus et magna. Fusce sed sem sed magna suscipit egestas. 
What you don’t know CAN hurt you!
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
6.2 Source Documents Accounting 11.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Online Safety 2.02 Remember the rules of online safety.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
IT security By Tilly Gerlack.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
DIGITAL CITIZENSHIP BY MAYSAA Stage 2 WHAT IS DIGITAL CITIZENSHIP? 0 Digital Citizenship is safely connecting with groups on the internet. 0 It involves.
Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Digital Citizenship Grade Create a map that shows all of the places your family goes online and with whom you connect With a parent, find three.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
MANAGING YOUR WEALTH Presented by the SWMNPIC’s Workforce Center.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
What is Spam? d min.
Online Safety 2.02 Remember the rules of online safety.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
What’s App’ening Around BRE Math & Reading. Mrs. Sudd’s Class Shopping with million dollar.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
CCVESA Carroll County Volunteer Emergency Services Association
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Essential Question: How do you express a series in sigma notation?
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
Spyware. By: Katheryn L. Gaston.
Staying safe on the internet
Internet Safety Vocabulary
EYES The Windows Of Heaven.LLC
Digital Footprints.
PRESENTATION NAME Company Name.
Digital Citizenship EIT, Author Gay Robertson, 2017.
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
ICT Communications Lesson 3: Internet Life and Privacy
PRESENTATION NAME Company Name 51PPT模板网 搜集整理.
Presentation transcript:

D i g it a l Safe t y and Responsi bi lity

What is that? And Why should I care?

A digital footprint is a trail of your activity online A new footprint is created each time you access the internet from any electronic device… computer, tablet, phone, gaming system, ATM, etc. …Think about it What does your digital footprint say about you?

No one can see what I’m doing, that’s a myth I’m safe. My information is safe That can’t be traced. No one knew it was me. That happened so long ago It was a snap chat, it’s gone now

Even if your social networking sites are private, universities and businesses are now asking potential students and employees to open these pages to get a sense of who they are. Nothing is private on the internet. Keep in mind: you can disable a Facebook account, but you cannot delete it. Facebook remembers everything and has the ability to sell everything you have ever posted to paying customers

Protect Yourself  Never post any sort of personal information on any public site  When shopping (or doing any activity with money) online only give personal information if the address URL begins with https or shttp or a small closed lock should appear in your browser status bar.  Ask friends not to tag you in photos. Tag yourself only in photos you want to share, you cannot guarantee your friend's accounts are private.

Malware, Spyware, Adware

Malware – Malicious Software  Used to damage or disrupt computer operation, gather sensitive information, or gain access to private computer systems.  Examples: computer viruses, worms, trojan horses, spyware, and adware are all examples of malware.

Spyware  Software the performs certain behaviors with getting user consent first…  Advertising  Collecting personal info  Changing configuration of your computer  Mostly used for tracking and storing internet users’ movements on the web; serving up pop-up ads to internet users (often associated with adware)

Adware Advertising-supported software  A way for shareware authors to make money from a product, other than by selling it to the users.

Cyberbullying Cyberbullying is defined as: “willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.” Basically, we are referring to incidents where adolescents use technology, usually computers or cell phones, to harass, threaten, humiliate, or otherwise hassle their peers.

Digital Citizenship Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Vivamus et magna. Fusce sed sem sed magna suscipit egestas.

Be Smart! Be safe online Be mindful of your activity Be aware of potential risks and consequences Be respectful of others Be thoughtful of the long term effects your online activity may have