Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
What is identity theft, and how can you protect yourself from it?
How do you use the internet?
This week is anti-bullying week.
Using internet and cell phones safely
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
August 15 click! 1 Basics Kitsap Regional Library.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Notes to Teachers You may want to copy slide 15, the vocabulary list, and put it into an MS Word document as a separate handout. You may want to give students.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
IT security By Tilly Gerlack.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Internet Safety.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Scams & Schemes Common Sense Media.
Class Name: Online Safety & Privacy Basics
Internet Identity, Safety, & Security
Digital Citizenship Middle School
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Working with Google Applications Gmail, a popular
Protecting your personal information and privacy
Passwords & Behavioral Ads
STOP. THINK. CONNECT. Online Safety Quiz.
Setting up an online account
Introduction to Computers
How to be SAFE when you use the internet..
Internet Safety – Social Media
Presentation transcript:

Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it and minimize it for easy access when you get to that part of the lesson. Slides 27, 28, 28 are a game. You should click on the boxes for the game and print out the answers for yourself before class.

Internet Safety * Modification of original Broadband RI Train the Trainer Internet Safety Module Your Teachers are:

Your Teachers are

Today’s Lesson: Creating an Account An account allows only YOU to look at or access information. How many of you have an account? How many of you do banking on-line? What other things do you do on the Internet that you might need an account for?

What do you need to create an account? A user name and a password Easy enough right? Maybe not! - How many of you have created a user name or password and then forgot it?

User name Should be easy to remember. Try to uses the same user name for different accounts. It’s the password that should be very SECRET! Create a user name now ___________________________________

Password Should be easy to remember but very difficult for another person to guess.

Passwords A Video from Common Craft: Secure Passwords >>

25 Most Common (Worst) Passwords of 2012 Source: SplashData, Inc. 1…password10…baseball18…shadow 2… …iloveyou19…Ashley 3… …trustno120…football 4…abc12313… …jesus 5…qwerty14…sunshine22…Michael 6…monkey15…master23…ninja 7…Letmein16… …mustang 8…dragon17…welcome25…password1 9…11111

Let’s play the “Password Game” Each family has a card to fill out… Write down your family name and then create a new password using the following rules: 1)Must be at least 8 characters and no longer than 12 characters 2)Must contain at least 1 letter, 1 number, & 1 special character 3)You must be able to remember the password Once you have finished, fold your card and pass it to a teacher..

Checking for Password Strength Let’s do some password checking: choose a password, then go to this website to see how strong it is. Microsoft Password Strength Checker >>

Secret Challenge Questions: Adding another level of password security A security challenge question is used as a way to be sure that banks, cable companies and cell phone companies know that you are really their customer. They are a form of shared secret. Banks have used questions to be sure they know their customers since at least the early 1900s. In the early 2000s, security questions became common on the Internet, as a way to let customers get a new password: a password reset. The best questions have answers that are: Simple Memorable Not limited to a small list of answers Can't be guessed or researched easily Don't change over time Source: //en.wikipedia.org/wiki/Security_question

Security Challenge Questions A Video from Indiana University: Challenge Questions >>

What was your childhood nickname? A. What is your mother’s maiden name ? (Maiden name is her last name before she got married.) B.

What is the name of the High School you graduated from? A. What is the name of your favorite childhood friend? B.

In what year was your father born? A. In what city or town did your mother and father meet? B.

What was the name of your first pet? A. What is your pet's name? B.

What is Phishing? Phishing is the way that criminals steal your personal information over the Internet? How do they do it? By pretending to be a legitimate (real) business and asking you for information or by stealing your password. In – did you ever get an from someone you don’t know? Or from a business that is trying to give you something for free?

Phishing Examples:

Don't personal or financial information. Do not click on links in s or reply to suspicious s … independently open a browser and type in the website address. This way, you control what sites you visit. Do not let a phisher direct you to a false site. Only provide personal or financial information through an organization's website if you typed in the web address yourself and you see signals that the site is secure, like a URL that begins with https (the "s" stands for secure). Be very cautious about opening attachments and downloading files from s, regardless of who sent them. These files can contain viruses or other malware that can weaken your computer's security. Be cautious about messages that come from people or places you do not know. Scammers sometimes use mail or contact lists that are not protected – be sure that you know who you are getting from. Be cautious of messages with no subject, or messages that are too general or strange for the person sending the . If you think that a friend did not send a message, them in a separate message and ask. Sometimes addresses can be stolen by scammers. Basic ground rules for avoiding phishing scams

Public vs. Private (secure) Websites Most of the Internet is like a public space: Like the lobby of a bank… Where others can overhear you, or see your information, or find your account information that you carelessly discard There are secure (private) sites that offer a higher level of information security: Like a Safe Deposit Box in a bank’s vault… Where only you and the bank have ANY access to your valuables and information

vs.

Importance of “SIGN OUT” / “LOG OFF”

Let’s Play… Family Feud Name a common 6 to 8 character password used by people in 2012? Top 7 answers on the board to this question… Password… … …10 abc123…7 QWERTY…6 Monkey…5 letmein…

Family Feud Name a Popular Website Visited by U.S. Teenagers in 2012? Top 8 answers on the board to this question… Facebook…37 Twitter…20 Google+…14 Tumblr…8 4Chan…5 Pinterest…5 MySpace…4 Foursquare…

Family Feud Name a Piece of Information that Children should NEVER share/type online? Top 8 answers on the board to this question… Password…24 Full Name…19 Home Address…13 Address…12 Current Location…11 Phone Number…8 Future Location…5 School Name…

Parental Control Parental Controls allow parents to monitor what their children are doing on the Internet, how long they can be on the Internet, and what sites their children can access For more information, you can watch a video on YouTube. Do a search for :Parental Control – windows 7.

Questions?? 1. The lesson today was: Too easy Too difficult Just right 2.What was the most useful thing you learned today? 3.Comments, suggestions???

Online Safety & Privacy Basics Thank you and BE SAFE!

Resources for Review

Homework 1.Watch the videos and read the texts from the resource page. 2.Take notes of things you want to remember and be prepared to share them with a classmate in the next class.