INTERNET SECURITY.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

The Internet: Educates Us Entertains Us Connects us False information
Developed by Technology Services 1:1 Laptop Initiative
Ebinport Students Encourage Internet Safety. “Doing the Right thing online.” January 2012.
Web sites should always post a privacy policy, where they tell you why they need information from you and what they will do with it. If you're not sure.
Internet Safety for You and Your Students A presentation for the North Woods Partnership By Edie Miles February 7, 2007 The quote below is adapted from.
Internet Safety For Our Children Courtney Ryan, Scott Gray, Christina Ellefsen, Jessica Wheeler, Courtney Witmer.
Internet Safety MSTI 131 3/23/10 Leanne Merchant, Janeanne LePage, Samantha Duffy.
Helping your family to stay in control Living with technology.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
Internet Safety Portage Department of Public Safety.
CYBERSAFETY Presentations Keeping Safe on the Internet.
Stay Safe on the Internet!
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Your Guide to Internet Safety Family Learning Service 2015 Family Learning Service Top Tips for Parents 1.Introduce children to the CEOPS button Clicking.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
INTERNET AND HOW TO USE IT SAFELY By: Josh Cooper.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
“Taking care of myself while surfing the Internet” Children’s Experiences & eSafety Rules.
Students using a proxy? Then block everything!. What is a Proxy A Proxy server is a server that takes requests from clients, fulfill the requests and.
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
Internet Security and Your Computer Welcome to Boot Camp.
INTERNET SAFETY & POWERFUL PASSWORDS For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.
For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.  Educate Us  Entertains Us  Connects Us  False Information  Opens Your Home to the Outside World  Bad.
Parent SOL and Internet Guide. The Internet is an amazing educational tool. There are an incredible amount of SOL remediation websites that you can use.
Internet Safety Wendy Varner. Internet Safety –The goal is to educate students on how to avoid dangerous, inappropriate, or unlawful online behavior.
Cyber Safety Ms. Grenier.
MSTI 131 November 6, 2008 Meghan Hynes Katy Kincade Nichole Enos Brittany Hollenbeck Samantha Hook.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
E-safety Technical Advice for Parents Nick Hockin Information Manager, Priory School.
Teaching Safety Practices. TV Safety Guidelines Limit the number of TV-watching hours Keep TVs out of kids' bedrooms. Turn off the TV during meals. Use.
Welcome to Week 2 in the computer lab. Last week you learned step 1 of the morning routine. Today we will learn how to complete the entire routine!
Internet Safety.
INTERNET SAFETY FOR EVERYONE
Cyber Info Gathering Techniques
Internet Safety Years 1 to 3
Internet safety Student Name 6th grade.
Safer Internet Day.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Viruses & Destructive Programs
What Is Tapestry? An Online learning journal system.
What they are and how to protect against them
E-Safety – Staying Safe On-line
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
Working with Google Applications Gmail, a popular
Welcome to Week 3 in the computer lab
What Is Tapestry? An Online learning journal system.
Internet Safety.
What Is Tapestry? An Online learning journal system.
Appropriate Use of Technology
STOP. THINK. CONNECT. Online Safety Quiz.
Bluffs School 1:1 Digital Conversion Orientation for Parents August 2015.
Internet Safety for Everyone
What Is Tapestry? An Online learning journal system.
Backtrack Metasploit and SET
Welcome to the Computer Lab.
Rules for Being Safe on the Internet for Kids
Internet Safety for Everyone
The bios.
Internet Safety for Everyone
Internet Safety for Everyone
Online Safety Evening 2019.
Presentation transcript:

INTERNET SECURITY

Using K9 Web Protection Home website: http://www1.k9webprotection.com/ FAQ's: http://www1.k9webprotection.com/support/faq.php Support Forum: http://forums.bluecoat.com/viewforum.php?f=13 How to Translate Websites from English to Spanish: http://www.google.ca/language_tools?hl=es

The More You Know: Translations and Hacks How to Translate Web Sites from English to Spanish Watch Video How to ByPass Home and School Systems Ping or traceroute method Cache method Proxy Server method Live CD/USB method

How Students Hack: Ping and Traceroute Methods Our school's server blocks these methods, but your home might not. Students Hack #1 Students Hack #2 One more trick is that students will type into google: “cache:www.myspace.com” and bring up the google cached version of myspace or xxx.com. Try it to see how easy it is to do.

Cache Hack Watch Video Use “cache:www.xxx.com” to bypass computer security systems. With this hack, you can work your way around many sites.

Watch Video Proxy Server Hack Subscribe to an email list like those at yahoo mail for a list of new proxy sites every day – then just cut and paste. Easy.

Live CD/USB/IPod Hack Using and “Live” version of a CD from Ubuntu Linux, Puppy Linux or any of the hundreds of other “Live” CDs from Linux or BSD, anyone can boot up from a “Live” Desktop O/S that will bypass any security you put on your home computer. Unless....

Protect Yourself! You password protect your BIOS with an administrator password. Set your BIOS to boot from the Hard Drive and ONLY the hard drive. Allow NO OTHER boot devices, unless you change your BIOS settings after inputting the correct password. Even this can be “hacked” but requires opening up of the computer case and removing the battery or CMOS... so buy a case lock for 2$ at http://www.computer-security.com/

Review Use a program like K9 to as a first line of defense. Educate yourself about HACKS like the Ping/Traceroute, Cache and Proxy Server hacks. Ask yourself why would someone use a LIVE CD, unless they are very interested in Linux Operating Systems. Set a BIOS password and LOCK your computer case to avoid tampering.

More TIPS 1) Keep computers out of the bedroom. Have children work in a common, open area. 2) Secure the wireless router and TURN IT OFF by UNPLUGGING it when you do not want wireless internet access. 3) Monitor your child's online activity and talk to them about it. Let them know how dangerous online predators can be. 4) In most cases, the child will be much more technologically sophisticated than the parent. Children will almost always find ways around any method you use to block access. Talk to your kids, trust them, BUT verify.

This power point you can download and distribute freely at: Thanks for watching... This power point you can download and distribute freely at: http://eisschool.pbwiki.com/hack -and- http://docs.google.com/Presentation?id=dd447n2s_47d7g9bzgv David Schult, © 2009