By Lloyd and Jamie Brought to you by I safe. How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address,

Slides:



Advertisements
Similar presentations
How to stay safe on the internet 5S e-safety assembly.
Advertisements

Cyber Time First Grade.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Cyber Bullying: Not a Pretty Picture! By: Baylee Reller.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
Internet Safety & Cyber Bullying
CYBER SAFETY & CYBER BULLING BY GEORGIE. CYBER SAFETY THINGS YOU SHOULD NEVER SHARE ON THE INTERNET ARE Username password full name Address phone School.
Cyber bullying Lara Climer and Michele Fesenbek. Interesting Tidbits  Over 87% of teens age use the internet  95% of parents do not understand.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Digital Access Digital access is the equal ability for people all over the globe to access digital internet. The digital divide is a gap that continues.
Cyber Bullying “All Cruelty Springs from Weakness.” – Seneca, 4BC-AD65.
Mrs. Kinsler’s Class.  With a table partner, make a list of some of the things you do on the Internet.  Be ready to share your list with the class!
Submitted by: Donna Rembert Instructor: Dr. Laurie Fowler ED508 Technology Portfolio.
Internet Safety Mrs. Oliver Technology
Cyber Bullying "All cruelty springs from weakness. " (Seneca, 4BC-AD65)
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
We want this Internet, this global cyberspace, to be completely free, completely open. Everyone does. I do. But we also want to conduct business there,
Internet Safety & Online Citizenship
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Do pictures always give truthful information? Can publishing it be hurtful??
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
Information System Security. Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
INTERNET SAFETY TIPS BY: STACEY BUCY. PERSONAL INFORMATION Never send your personal information to anyone that you do not know. DO NOT SEND A PICTURE.
38% Of all aged girls Are bullied online. 26% of all aged boys are targeted online.
Internet Safety Tips for to Remember o Don’t give out any personal information to people you don’t know o Check with a trusted adult before.
 Don’t respond when a cyberbully is saying something mean about you online. Just block it.
Cyber Bullying Kristina 5VN. What is Cyber Bullying? Cyber Bullying is when a form of bullying, which is carried out through an internet service such.
Security CS Introduction to Operating Systems.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
E-safety By Nicholas + Jamie. What is E-safety  E-Saftery stands for electronic safety. Its all about staying safe on your elctronic divices. It is concerned.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Tips To Stay Safe Online By Aayush Hanson Pharaoh.
By: Whitney Cannon. What are binary Numbers Binary numbers are the way a computer thinks. The computer see’s thing in zero’s and ones. We used.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
Internet Safety Mrs. Coots May 2010 Middle School Presentation.
Internet safety By Kyle Allan. Top tip No:10 Don’t give out personal information such as a : Phone numbers and also addresses.
E-safety is when children like you get bullied on the computer. We want this to stop. People use the internet all the time for school homework, speaking.
E - safety By Jacob Jack Luca. How to stay safe on the internet.  Only speak to people that you know and if you don’t know them don’t contact them in.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
By: Krupa and Anisha * When someone cyber bullies you, save the messages. You can show a trusted adult the evidence you have been sent.
Who Wants To Be A Millionaire? Safer Internet Day 2016 edition Created by John Khan & the Bullying Intervention Group.
Cool Kids Online (Be safe) By Alan L. and Kevin L.
Cyber Bullying Get The Facts! Kindness What is kindness? Share some examples. Why is it important?
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Bullies R Us Cyber-Pals Security Blanket
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
“Doing the Right thing online” Online Safety. Questions How many of you have like to go off by yourself and get on the internet? What do you like to use.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Internet Safety How to stay safe online.
Follow safety rules so that YOU: Avoid getting HURT.
Ch9 E-commerce Security
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

By Lloyd and Jamie Brought to you by I safe

How to keep from being bullied (online) 1 don’t give out personal info such as passwords, pins, address, phone #, school name, or names of friends or family 2 don’t believe everything some one tells you They could say they are 15 but really could be a 3 toothed 40 year old fat guy Don’t bully do not send a message when you are angry

TELL SOMEONE!!! Don’t keep it to yourself Don’t open or read a message from a cyber bullies Tell your internet provider DON’T ERASE THE MESSAGE they may be needed to take action

A bully wants power, control, and domination and a since of accomplishment Bullies can be boys or girls Bullying is NOT outgrowing. Those who demonstrate those characteristics tend to grow up more violent and commit more crimes When one bullies another the bully often has problems at home

Worms spread through computer networks They use the network to replicate from machine to machine 1 famous example of a worm is the code red worm It replaced itself over 250,000 times In approximately 9 hours on July 19, 2001

These are programs that claim to do 1 thing such as a game, but when run do other things Trojan horses can erase your hard drive for example. However they cannot replicate themselves. They have to be sent or copied by a user

This info should not be giving out over the internet to maintain your safety 1. Name 2. Age 3. Phone number 4. Social security number 5. Address 6. School 7. Friends’ name 8. Family names

By Lloyd and Jamie Brought to you by I safe