Remember the rules of online safety.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
The Internet.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Digital Citizen Project Katie Goodall Educational Technology 505.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Agenda for August 27, 2014 Daily Prayer (Student will be chosen to read) Typing Teacher’s Lecture (Electronic Communication and Online Safety) –Student.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Information Security Sharon Welna Information Security Officer.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Internet Safety Internet Safety LPM
I promise…. To always ask my parents before going online.
Safety and Security issues of using ICT Alys brooks.
Online Safety 2.02 Remember the rules of online safety.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Cyber Safety Jamie Salazar.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Any criminal action perpetrated primarily through the use of a computer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Safety.
Internet Safety How to stay safe online.
DIGITAL CITIZENSHIP What You Should Know!.
2.02 Remember the rules of online safety.
Learn how to protect yourself against common attacks
Internet Identity, Safety, & Security
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
How to build a good reputation online
2.02 Remember the rules of online safety.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
Internet Safety Vocabulary
Understanding Browsers
HOW DO I KEEP MY COMPUTER SAFE?
Follow safety rules so that YOU: Avoid getting HURT.
Rules To Help You Navigate the Internet Safely
Unit 4 IT Security Kerris Davies.
ICT Communications Lesson 3: Internet Life and Privacy
Internet Safety – Social Media
Presentation transcript:

Remember the rules of online safety.

Never disclose personal information Full name Home address Phone number Social security number Passwords Names of family members Credit card numbers Your photograph Why? Watch the video Teens PSA: “Promises” at http://www.netsmartz.org/resources/psas.htm. Watch the video “Tracking Teresa” at http://www.netsmartz.org/resources/reallife.htm 2.02 Online Safety

Do you have a Facebook account? According to the article published by Scott J. Cech, “ . . ., a significant percentage of colleges and universities sometimes dig into would-be undergraduates’ social networking profiles.” The article describes how some college admissions officers research a potential student’s Internet information to assist in the careful and limited selection of students. “No school wants to give a very prestigious scholarship to some [student] who’s going to show up in the newspaper the next day with pictures of [student] standing on a beer keg.” Employers are also investigating social networking profiles of potential employees. View the article at http://www.edweek.org/ew/articles/2007/12/19/16applicants.h27.html?tmp=582024897 2.02 Online Safety

Personal Safety – Warning Signs What does online yelling look like? What should you do if someone is yelling at you online? What is a cyberbully? What should you do if you are bullied online? What should you do if someone sends you explicit materials? Watch the cyberbullying videos at http://www.netsmartz.org/resources/reallife.htm View the article about the fatal result of bullying at http://stcharlesjournal.stltoday.com/articles/2007/11/26/news/sj2tn20071110-1111stc_pokin_1.ii1.txt 2.02 Online Safety

Safeguard against financial risk If purchasing something online, make sure that the site is secure. The URL should begin with https: A lock icon is displayed and is interactive – not just a graphic image. Does the site contain a site seal? Many, but not all sites will contain a seal that is highly visible and difficult to copy which indicates a safe site. 2.02 Online Safety

What are computer hazards? Viruses – software that attaches to programs installed on a computer or that are programmed to load when an email is opened. Spam – unwanted emails from advertisers and users that contain malicious and explicit material or try to sell products or services. Spyware – malicious software designed to take partial control of a computer’s operation without the knowledge or consent of the user. Often used to track a user’s browsing and spending habits while online and also to mine for personal information. 2.02 Online Safety

Protect against online hazards Beware of any emails or sites that promise you will get rich quick. These emails are usually a way for hackers to mine your computer for personal or financial information. Never open an email from someone you do not know. Never download programs unless you know they are safe and contain no hidden files. 2.02 Online Safety

The End What was the issue? How could it have been prevented? Assignment: Look up and find 3 examples of online safety issues. Type them up or write them down. Answer the following questions about each issue: What was the issue? How could it have been prevented? What would you have done if you found yourself in that situation? 2.02 Online Safety