Protecting Yourself from Virtual Threats. Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Internet Safety 9th Grade Health.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Cyber Safety Assessment Review
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Bullying and Protecting Children in the Virtual World Dan Wilchek Exeter Township School Distirct
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
What is Personal Publishing? If you’ve ever written a blog entry, posted a comment or reply on a website, uploaded a video to YouTube, posted a picture.
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
Today’s Quiz 1. The most popular social networking site among young people is Twitter. 2. Nothing is private once it is posted on the Internet. 3. Teens.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Cyber and Internet Safety El Rodeo School September 11, 2013.
Technological Awareness for Teens and Young Adults.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
INTERNET SAFETY FOR STUDENTS
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.
Digital Citizenship By: Miranda Scorver.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Sexting Criminal Teen Trend
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 Facebook  Twitter  MySpace  Windows LiveSpace.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Tips for Students 1 Prepared by Tina Dixon School Counselor Geneva High School.
Cyber Bullying. ~ instant messaging ~ digital photos ~ cell phones ~ computers ~ web pages ~ social networks ~ ~ instant messaging ~ digital.
Cyberbullying Brindetta Cook CSIS 200 April 29, 2013
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
INTRODUCTION & QUESTIONS.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Safety.
Cyber and Internet Safety (Parents’ Night)
Remember cyber Bullying can also lead to death!!!
“Cyber-Bullying, Sexting, Social Networking and the Law”
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Appropriate Use of Technology
Cybersecurity Awareness
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Online Safety Assembly.
Presentation transcript:

Protecting Yourself from Virtual Threats

Who We Are 2008 LLHS Graduates –BBA with a focus in Operations/Marketing –MBA in Marketing and MIS –BBA with a focus in Accounting –MAACT with a focus in Information Assurance

Internet Safety

Student Internet Usage

Internet Safety

Protect Yourself from Online Predators 1 in 5 teenagers ages 10 to 17 have received unwanted sexual solicitation online Predators utilize the Internet to target teenagers By posting personal information about yourself, you are providing them with what they need to start a conversation.

Protecting Your Identity from Predators It is important to protect your personal identity by not posting or listing any information that an individual can use to locate you or gather too much information on you. This includes: –Posting Pictures (partying pictures, provocative pictures, etc.) –Listing personal information (phone number, address, interests, etc.) –Listing information about your whereabouts (checking in on Facebook, allowing location services on your smart phone, etc.)

Protecting Yourself from Identity Theft Since 2004, individuals ages 14 to 29 have the rate of identity theft. This is due to the credit reports of teens and young adults being clean and therefore the fraud takes longer to identify. How to Protect Yourself: –Use anti-virus software –Use strong passwords –Be cautious when using cloud computing –Be aware of the security of your WIFI –Do not share too much information online

Your Online Reputation Have you ever Googled yourself? –Look at the information that comes up and determine if you would want other individuals to see it. Everything that you put online is traceable by universities and potential employers. –This can have an impact on your future and reputation.

How to Avoid Damaging Your Reputation With employers, universities, and scholarships checking your online print, it is important to make sure it is clean. You can do this by: –Not posting provocative pictures –Not posting pictures of you taking part in illegal activity (drugs, underage drinking, etc.) –Thinking twice about the comments and statuses that you post about others – Always consider the consequences of what you post!

Not Everything Online is True It may be difficult to distinguish who is a predator online. In chat rooms or social networking sites, a predator may appear to be a 16 year old female but is actually a 50 year old male. Predators use fake information, pictures, and interests to gain your trust and then make contact with you.

NOTECARD ACTIVITY Notecard Activity

NOTECARD ACTIVITY Facebook Experiment

Outcome of FB Experiment Results of Friend RequestsHow we created the account Created the Profile on October 29 th Added a fake picture and cover photo Included education info, contact info, etc. ‘Liked’ things that fit the targeted age group Sent friend requests to 40 LLHS students/alum Out of the 40 requests we sent only ONE student asked if we knew each other

Cyber Bullying

Harm on the Internet Cyber Bullying –“When a child or teenager is harassed, humiliated, embarrassed, threatened or tormented using digital technology.” –Cyber bulling can only happen between minors. Cyber Harassment –“When an adult harasses children, teenagers, or other adults.”

Statistics on Cyber-Bullying Around half of teens have been the victims of cyber bullying Fewer than 1 in 5 cyber bullying incidents are reported to law enforcement Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Girls are somewhat more likely than boys to be involved in cyber bullying

Cyber Bullying Sexting: “sending nude pictures via text message.” –20% of teenagers admit to engaging in sexting Messages can be forwarded to unintended recipients Could be embarrassing if pictures were seen by unintended parties

Jessica Logan

Survey Results Have you, or someone you’ve known, been the victim of cyber-bullying?

How To Protect Yourself Don’t share personal information or photos –Even if it seems like a good idea at the time! Make a copy of the message, photo or video –Screen shots File a report with local police department Don’t give the bully any reaction

Password Safety

Survey Results

Passwords “First line of defense against cyber- criminals” Phishing –“Phishing is a technique of fraudulently obtaining private information.” Sending s Making Phone calls Creating links to false websites

Passwords

How to Detect a Phishing Site Fake websites whose look and feel are almost identical to the legitimate site –Generic greetings –Threats to your account and requests for immediate action –Requests for personal information –Suspicious links –Misspellings and poor grammar

Passwords Social Engineering Attack –“The art of manipulating people into performing actions to gain confidential information.”

Passwords Social Engineering –Hackers may probe for information that can lead to your security being compromised Be careful what information you give out to whom –Mother’s maiden name? –Where you were born? –What was your favorite pet’s name? –Retrieving information from social networking profiles

Survey Results Do friends and family know your passwords?

Passwords Best Practices –Use unique passwords for each account Use an app to store passwords –Use long passwords –Use numbers, letters (upper /lower case) and symbols –Updated password recovery settings Brute Force Attack –Program that guesses passwords by trial-and-error –Weak Password: hours –Strong Password: several years

Brute Force Attack Most commonly used password: “password” –How long would it take to crack this password that only uses lower case letters? Approximately 5.5 hours A better alternative: –How long would it take to crack this password that uses lower and upper case letters, numbers, and special symbols? Approximately 23 years

Worst Passwords of 2012

IT Careers

Students Interested in IT Career

Top 10 Best Jobs of ) Nurse 2) Software Developer 3) Pharmacist 4) Medical Assistant 5) Database Administrator 6) Web Developer 7) Computer Systems Analyst 8) Physical Therapist 9) Computer Programmer 10) Occupational Therapist

IT Careers Salary: $54,360-$87,790 Write code and develop software applications Software Developer Salary: $41,570-$115,660 Build, organize, and maintain the data of a company Database Administrator Salary: $43,190-$119,940 Design, create, and maintain websites Web Developer Salary: $48,360-$119,070 Determine technological needs of clients and make recommendations on system needs Computer Systems Analyst Salary: $40,820-$114,180 Write code to create computer programs Computer Programmer

IT Degrees BSCS/ MSCS: –Computer Science Required Math: Calculus l & ll, Linear Algebra, and Statistics 51 hours in computer logic, programming, and other computer topics BBA/ MBA: –Management Information Systems Required Math: Calculus l, Statistics 15 hours of MIS courses

Employers Local: content/uploads/2012/06/ _f8a5d293bc_o1.jpg; Corporate:

Questions?