Social Media Cybersafety.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Phishing, what you should know L kout Initiative.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Phishing, what you should know L kout Initiative Office of Information Technology.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Internet Phishing Not the kind of Fishing you are used to.
Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cybersafety.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Cybersafety 4 Kids: Smart Moves in an Online World.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Identity Thefts: Opinion of the Lithuanian Population Dr. Zita Čeponytė 1.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Cyber and Internet Safety (Parents’ Night)
National Crime Prevention Council 2011
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
Introduction to Web Safety
Digital Citizenship Middle School
ISYM 540 Current Topics in Information System Management
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
I S P S loss Prevention.
Phishing, what you should know
Electronic Aggression
Pics, Flicks, and Sexting
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Tips and Information for Parents
Appropriate Use of Technology
Information Security Footprint.
Information Security Session October 24, 2005
Jeopardy iT Final Jeopardy iT $100 $100 $100 $100 $100 $100 $200 $200
Follow safety rules so that YOU: Avoid getting HURT.
Cyberbullying: How Can I Protect My Child?
What is Phishing? Pronounced “Fishing”
What it is, how to spot it, and how to respond to it
Presentation transcript:

Social Media Cybersafety

Social Media

Cyberbullying What is Cyberbullying involves the use of electronic devices supports deliberate, repeated, and hostile behavior by an individual or group its intent is to harm others.

What is Cyberbullying According to a survey done in 2007 by the National Crime and Protection Council: 43% of teens report that they have experienced some form of cyberbullying that year. The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.

Why do teens cyberbully? 81% Because they think it is funny 64% Because they don’t like the person 45% Because they view the victim as a loser 47% Because they feel there are no consequences for cyberbullying 45% Because they don’t think they will get caught 58% of students surveyed don’t think cyberbullying is a big deal

What is a cyber-predator? A cyber-predator uses the internet to hunt for victims to take advantage of them in some way: emotionally sexually psychologically financially A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.

What is a cyber-predator? 77% of the target for online predators are teens aged 14 and older. 33% of teens received an aggressive sexual solicitation online in the past year. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.

What is Phishing Phishing is the act of requesting confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

Phishing 15% of online teens have received a fraudulent message, compared with 22% of adults. Always check your URL when navigating in social networks like MySpace and Facebook. If you click on an application and the URL does not have www.facebook or has a URL that is just numbers like 10.263.18, immediately exit out of that page.

How to stop the bad guys Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT! Phisher emails are typically NOT personalized Valid messages from your bank or e-commerce company generally are

How to stop the bad guys 2. If you suspect an email message might not be authentic . . .Don't use the embedded links to get to another web page. Call the company on the telephone, or log onto the website directly by typing the URL into the address bar Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site

How to stop the bad guys 3. Avoid filling out forms in email messages that ask for personal financial information. Phishers make very good fake forms. Only communicate personal financial information via a secure website or the telephone.

4. Don’t email personal or financial information. Email is not a secure method of transmitting personal information No one indicator is foolproof Some phishers have forged security icons like the lock icon on an order form

5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser. Check the beginning of the Web address in your browsers address bar It should begin with "https://" rather than just "http://".

6. When shopping for an item on the Internet Be sure the site is secure (https: instead of http) before entering personal financial information!

Works Cited Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept. 2009 <http://safety.lovetoknow.com>. Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept. 2009 <http://www.forrester.com>. Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept. 2009 <http://www.makeadifferenceforkids.org>. National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept. 2009 <http://www.ncpc.org>. “Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept. 2009 <http://www.tweakspeed.com>.