FJUHSD Teacher Librarian

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Phishing, what you should know L kout Initiative.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Phishing, what you should know L kout Initiative Office of Information Technology.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Cyberbullying Old Problem, New Playground. Bullies are no longer restricted to the school yard. They are often online, out of the sight and earshot of.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Internet Phishing Not the kind of Fishing you are used to.
Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cybersafety.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
What’s the Big Deal About Bullying?
By: Zach Oltmanns.
Children and teens are bullied everyday through , instant messaging, social networking and text messaging. Cyber Bullying By:Olivia Martin.
FATIN AFIQAH BINTI JUHARI AS
Cynthia Wynn- EDU 384 Important Internet Safety Rules.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Lauren Sayah, Abby Wills, Sara Stahl. What is Cyber Bullying?  Is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Cybersafety 4 Kids: Smart Moves in an Online World.
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Internet Safety.
Cyber and Internet Safety (Parents’ Night)
National Crime Prevention Council 2011
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
Digital Citizenship Middle School
ISYM 540 Current Topics in Information System Management
A Project on CYBER SECURITY
I S P S loss Prevention.
Phishing, what you should know
Electronic Aggression
Pics, Flicks, and Sexting
Working to Keep our Children Safe in a World Filled with Technology
Phishing is a form of social engineering that attempts to steal sensitive information.
Tips and Information for Parents
Social Media Cybersafety.
Appropriate Use of Technology
Information Security Session October 24, 2005
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
CYBERBULLYING References: Fund for Civility, Respect, and Understanding OK, Inc. Friends4Friends Campaign
Follow safety rules so that YOU: Avoid getting HURT.
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Bullying, Cyber-Bullying, Internet Safety
Cyberbullying: How Can I Protect My Child?
What do you see??.
What it is, how to spot it, and how to respond to it
Presentation transcript:

FJUHSD Teacher Librarian Day 3 Cybersafety Presented by FJUHSD Teacher Librarian

Cyberbullying What is Cyberbullying involves the use of electronic devices supports deliberate, repeated, and hostile behavior by an individual or group its intent is to harm others.

What is Cyberbullying According to a survey done in 2007 by the National Crime and Protection Council: 43% of teens report that they have experienced some form of cyberbullying that year. The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.

Why do teens cyberbully? 81% Because they think it is funny 64% Because they don’t like the person 45% Because they view the victim as a loser 47% Because they feel there are no consequences for cyberbullying 45% Because they don’t think they will get caught 58% of students surveyed don’t think cyberbullying is a big deal

Do you think it was a big deal to these students and their loved ones? Stop Cyber bullying Do you think it was a big deal to these students and their loved ones? Rachael was stalked online by anonymous bully. She died by suicide on October 9, 2006. Ryan, a 13-year old, who died by suicide as a result of bullying at school and online. A cruel online hoax by a neighbor led to the suicide death of Megan.

What is a cyber-predator? A cyber-predator uses the internet to hunt for victims to take advantage of them in some way: emotionally sexually psychologically financially A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.

What is a cyber-predator? 77% of the target for online predators are teens aged 14 and older. 33% of teens received an aggressive sexual solicitation online in the past year. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.

What is Phishing Phishing is the act of requesting confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

Phishing 15% of online teens have received a fraudulent message, compared with 22% of adults. Always check your URL when navigating in social networks like MySpace and Facebook. If you click on an application and the URL does not have www.facebook or has a URL that is just numbers like 10.263.18, immediately exit out of that page.

How to stop the bad guys Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT! Phisher emails are typically NOT personalized Valid messages from your bank or e-commerce company generally are

How to stop the bad guys 2. If you suspect an email message might not be authentic . . .Don't use the embedded links to get to another web page. Call the company on the telephone, or log onto the website directly by typing the URL into the address bar Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site

How to stop the bad guys 3. Avoid filling out forms in email messages that ask for personal financial information. Phishers make very good fake forms. Only communicate personal financial information via a secure website or the telephone.

4. Don’t email personal or financial information. Email is not a secure method of transmitting personal information No one indicator is foolproof Some phishers have forged security icons like the lock icon on an order form

5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser. Check the beginning of the Web address in your browsers address bar It should begin with "https://" rather than just "http://".

6. When shopping for an item on the Internet Be sure the site is secure (https: instead of http) before entering personal financial information!

Works Cited Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept. 2009 <http://safety.lovetoknow.com>. Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept. 2009 <http://www.forrester.com>. Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept. 2009 <http://www.makeadifferenceforkids.org>. National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept. 2009 <http://www.ncpc.org>. “Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept. 2009 <http://www.tweakspeed.com>.