Internet Safety: Sharing Information Online. What are the risks of sharing information online? IDENTITY THEFT : steals your personal information and uses.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
Using internet and cell phones safely
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
What do I need to know?.   Instant Messages  Social Networking.
Information for Students and Families
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Company LOGO Internet Safety A Community Approach.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
Internet Safety Dr. Steve Broskoske Misericordia University.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Scams & Schemes Common Sense Media.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Donette Mullinix ED 505 UWA Clipart:
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
They Need You - to encourage them to make good choices. - to teach them about how to stay safe. - to help them to recognise scams. - to encourage good.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Internet Safety.
Internet Identity, Safety, & Security
Protecting Your Identity:
Protecting Yourself from Fraud including Identity Theft
CYBERSAFETY & Personal information
Internet Safety – Social Media
Presentation transcript:

Internet Safety: Sharing Information Online

What are the risks of sharing information online? IDENTITY THEFT : steals your personal information and uses it without your permission INTERNET FRAUD : tries to trick you into sending them money or account information in order to steal from you COMPUTER VIRUSES : infects your computer with software to do some type of harmful activity PHISHING : pretends to be someone they are not to fool you into sharing personal information PERSONAL ATTACKS : uses your shared information to monitor your movements CYBERBULLYING : uses the internet to harass you WIRELESS ‘SNIFFERS’ : accesses your open wireless network to steal bandwidth or access your internet activities

What can an internet predator do to you? Open a line of credit and damage your credit score Impersonate you Commit a crime Find revenge Steal your tax return Gain access to medical care and prescriptions

What type of information are they looking for? Social security number Mother’s maiden name Driver’s license number Credit card numbers Bank account information

How can you protect yourself? Do not share your Social Security number Shred any documents you discard If it is too good to be true, it probably is. Don’t fall for it. Use strong passwords Change your password often

What should you do? Cancel your credit cards or consider a credit freeze Place a fraud alert on your credit file Monitor all accounts for unusual activity Get your credit report and check for discrepancies

and chat room safety tips Use a spam filter Don’t reply to or unsubscribe from spam s Do not provide sensitive information Use ‘automatic reply’ only when needed Avoid ‘forwards’ and don’t open attachments on s from unknown sources Don’t trust that an message is from who it says it is from Use anti-ad and anti- spyware software protection

Tips to create strong passwords Use different passwords everywhere Treat your passwords like you treat your underwear Avoid common words and numbers spell a word backward Use a simple password but move your fingers on the keyboard one place to the left or right Substitute numb3rs f0r l3tt3rs Insert cAPital lettERs in unusuAL plAcEs Add ?special? ^character$ Think of a phrase you can remember and use the first letters of each word in the phrase Longer passwords are harder to crack

Online dating tips Ignore any requests for money or financial information Guard your personal and online access information Report any suspicious behavior Tell others where and when you are meeting your date Always meet in a public place for your first meet- up Carry a cell phone Don’t travel together– take your own car Choose the right site for the type of relationship you are looking for

Blogging Consider making your blog ‘invitation-only’ to view Leave detailed personal information out of the blog Keep information about other people private Pretend your boss is reading your blog Imagine your post as a news article in the local newspaper– would you still post it?

Social networking sites Use caution when you click links Read the fine print Don’t allow sites access to your address book Be selective who you accept as a ‘friend’ Be careful about installing extras Assume everything you post is permanent Think twice before using social networking sites at work Keep an eye on your child’s social networking activity

Chat rooms and forums, online quizzes and surveys Use a genderless screen name Never assume you are truly anonymous Report issues to site manager Teach children early how to be safe online Companies learn a lot about you from the quizzes and surveys you submit to them Read the fine print if you aren’t sure

Sharing images Choose a platform with privacy settings Choose images carefully Use the privacy settings Limit identifiable information associated with the image Be aware of the GPS coordinate information stored in digital photos

Gaming online Is it a reputable site? If it requires a credit card, be cautious and know what you are paying for Some games can carry viruses or spyware

Banking and finances Payment services Shopping online Spending and saving online Classified ads and auctions Investing

Cyberbullying – what to do if your child is being harassed or bullied online If you feel your child is in any way unsafe, contact the police immediately Report the activity to the website where the abuse is taking place Reputable companies have an easily discoverable ‘report abuse’ function. Investigate the possibility of ‘blocking’ the offender If the harassment is related to a school or work environment, report it to the school or employer. Do not respond to the person, but document the behavior in case activities escalate. Teach your children that it is not acceptable to harass others or to tolerate harassment, either for themselves or on the behalf of others.

Using public computers safely and identifying secure and trustworthy sites Remember to log out when you are finished using a public computer When using free wireless networks, remember that others could be ‘listening’ and monitoring your activities A secure connection is encrypted as a means to prevent others from reading or tampering with the information being transferred To verify that a connection is encrypted, look for the lock icon in or near the address bar. A secure connection is not a guarantee of safety. It is an important safeguard, however.

Network safety Secure your wireless network using WPA protocol on all devices Keep your wireless router central to your usage area Keep your operating system software updates current Keep your firewall turned on Use anti-virus and anti- spyware software

After hearing all of this information today, why would you share any information online? Easy and efficient It’s a great way to connect with your friends and family On rare occasions, it can create job or career opportunities You don’t have to leave the house and your items come to your doorstep You can save money, find deals, and locate items you can’t find locally It’s fun!

WAY TO GO! Thank you for joining us today!