E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Internet Safety Learning Disability Partnership Board 15 th October 2010 Veronica Hughes Bromley Adult Education College.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Using internet and cell phones safely
E-Safety Support e-Safety Presentation D Flynn and L Findon.
Netiquette Rules.
E-safety Parental Guide “You wouldn't let your child wander around the streets of London alone, yet millions of children are surfing the internet on their.
How To Protect Your Privacy and Avoid Identity Theft Online.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
Let’s talk about Internet Safety!
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
Stay Safe on the Internet!
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Keeping you & your identity safe Recognize & avoid cyberbullying.
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
By: Elizabeth Scruggs Digital Citizenship Project.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
“Taking care of myself while surfing the Internet” Children’s Experiences & eSafety Rules.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
28 th January 2008 The Jitty. Why do we use the Internet? Communication Information Entertainment Escapism Attention seeking Genuinely seeking help Showcasing/promoting.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
E-Safety Challenge College. Learning Objectives To summarise electronic games which allow access to the Internet and assess the Internet Safety aspects.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
E-Safety Quiz Are you cybersafe?.
Cyber Safety Jamie Salazar.
Cyber Safety. Privacy What is safe to talk about online?
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Internet Safety By Blair Number 1 Use a nickname not your real name.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Creating your online identity
Living with technology Helping you and your family to stay in control
Silver Fox Surfers Online Safety
Internet Identity, Safety, & Security
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Safe Internet Mechatronika Budapest.
Protecting your personal information and privacy
Navigating the Internet
Information Security Awareness 101
Understanding Browsers
How to Select and Use Privacy Settings
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Presentation transcript:

E-Safety Challenge College

Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.

Discussion Discuss all the different websites that you have put some information about yourself. ◦ E.g.  accounts (yahoo, hotmail…etc)  Shopping  Games  Social networking sites

Risks Weak passwords Privacy settings Identity theft Music/video downloads

Passwords Avoid use family or friend’s names Avoid using common words such as ‘password’ Use letters AND numbers For really strong passwords use a combination of all types of keys on the keyboard including symbols (e.g.

Privacy Settings When you join a social networking site all your information is public – this means that your information is there for everyone on the internet to see if they wanted. All social networking sites allow you to change your settings You can control who can see your profile by changing the settings (see picture on the next slide)

Privacy Settings

Identity Theft Identity theft is when someone pretends to be you by using your personal information This can happen if you put a lot of personal information on websites that are not secure This is known to happen to adults more than children but it is still worth keeping in mind when posting personal information online.

Music/Video downloads When downloading music or videos always check: ◦ that the website is legal ◦ Personal information you give to the website is secure (i.e. there should be a padlock either in the bottom right hand corner of the explorer window or at the end of the address bar AND there should be an s after the http (https) ◦ And scan the download for viruses.

Activity Turn to page 9 (to brainstorm), ‘protecting yourself’ section. In groups prepare a presentation on protecting yourself. The information you need to include is: ◦ List of websites you have inputted information ◦ Create examples of weak, strong and really strong password ◦ How you can protect yourself from:  Social networking sites  Identity theft  Downloading music/videos