2.02 Remember the rules of online safety.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Let’s Talk About Cyber Security
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
INTERNET SAFETY.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Staying Safe Online Keep your Information Secure.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
IT security By Tilly Gerlack.
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
Agenda for August 27, 2014 Daily Prayer (Student will be chosen to read) Typing Teacher’s Lecture (Electronic Communication and Online Safety) –Student.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Information Security Sharon Welna Information Security Officer.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Talk to your child about what they’re up to online. Be a part of their online life; involve the whole family and show an interest. Find out what sites.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
I promise…. To always ask my parents before going online.
Safety and Security issues of using ICT Alys brooks.
Online Safety 2.02 Remember the rules of online safety.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Julie Latham Digital Citizenship: An Informational Guide.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Safety.
Internet Safety How to stay safe online.
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
Internet Identity, Safety, & Security
Unit 4 IT Security.
Digital Citizenship Middle School
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
How to build a good reputation online
Keeping safe and private on the internet
Remember the rules of online safety.
2.02 Remember the rules of online safety.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Follow safety rules so that YOU: Avoid getting HURT.
ICT Communications Lesson 3: Internet Life and Privacy
Internet Safety – Social Media
Student User Agreement and Policy 2022
Presentation transcript:

2.02 Remember the rules of online safety.

2.02 Rememberl the rules of online safety.

Never disclose personal information Full name Home address Phone number Social security number Passwords Names of family members Credit card numbers Your photograph Why? Watch the video Teens PSA: “Promises” at http://www.netsmartz.org/resources/psas.htm. Watch the video “Tracking Teresa” at http://www.netsmartz.org/resources/reallife.htm 2.02 Rememberl the rules of online safety. 2.02 Online Safety

Do you have a My Space account? According to the article published by Scott J. Cech, “ . . ., a significant percentage of colleges and universities sometimes dig into would-be undergraduates’ social networking profiles.” The article describes how some college admissions officers research a potential student’s Internet information to assist in the careful and limited selection of students. “No school wants to give a very prestigious scholarship to some [student] who’s going to show up in the newspaper the next day with pictures of [student] standing on a beer keg.” Employers are also investigating social networking profiles of potential employees. View the article at http://www.edweek.org/ew/articles/2007/12/19/16applicants.h27.html?tmp=582024897 2.02 Rememberl the rules of online safety. 2.02 Online Safety

Personal Safety – Warning Signs What does online yelling look like? What should you do if someone is yelling at you online? What is a cyberbully? What should you do if you are bullied online? What should you do if someone sends you explicit materials? Watch the cyberbullying videos at http://www.netsmartz.org/resources/reallife.htm View the article about the fatal result of bullying at http://stcharlesjournal.stltoday.com/articles/2007/11/26/news/sj2tn20071110-1111stc_pokin_1.ii1.txt 2.02 Rememberl the rules of online safety. 2.02 Online Safety

Safeguard against financial risk If purchasing something online, make sure that the site is secure. The URL should begin with https: A lock icon is displayed and is interactive – not just a graphic image. Does the site contain a site seal? Many, but not all sites will contain a seal that is highly visible and difficult to copy which indicates a safe site. 2.02 Rememberl the rules of online safety. 2.02 Online Safety

What are computer hazards? Viruses – software that attaches to programs installed on a computer or that are programmed to load when an email is opened. Spam – unwanted emails from advertisers and users that contain malicious and explicit material or try to sell products or services. Spyware – malicious software designed to take partial control of a computer’s operation without the knowledge or consent of the user. Often used to track a user’s browsing and spending habits while online and also to mine for personal information. 2.02 Rememberl the rules of online safety. 2.02 Online Safety

Protect against online hazards Beware of any emails or sites that promise you will get rich quick. These emails are usually a way for hackers to mine your computer for personal or financial information. Never open an email from someone you do not know. Never download programs unless you know they are safe and contain no hidden files. 2.02 Rememberl the rules of online safety. 2.02 Online Safety