Cybersafety.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Phishing, what you should know L kout Initiative.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Phishing, what you should know L kout Initiative Office of Information Technology.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Cyberbullying Old Problem, New Playground. Bullies are no longer restricted to the school yard. They are often online, out of the sight and earshot of.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Internet Phishing Not the kind of Fishing you are used to.
Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School.
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
Company LOGO Internet Safety A Community Approach.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Certificate Authority Security Council (CASC) 2015 Consumer Trust Survey.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
What’s the Big Deal About Bullying?
By: Zach Oltmanns.
FATIN AFIQAH BINTI JUHARI AS
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Online Safety Parent Workshop Helping to keep your children safe online.
Lauren Sayah, Abby Wills, Sara Stahl. What is Cyber Bullying?  Is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Cyber bullying & Cyber Stalking Paige Allison, Olivia Main, Robbie Reston.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Cybersafety 4 Kids: Smart Moves in an Online World.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Cybersafety 4 Kids: Smart Moves in an Online World.
Scams & Schemes Common Sense Media.
ISYM 540 Current Topics in Information System Management
Phishing, what you should know
Electronic Aggression
Pics, Flicks, and Sexting
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Tips and Information for Parents
Social Media Cybersafety.
Information Security Session October 24, 2005
Cyberbullying: How Can I Protect My Child?
Presentation transcript:

Cybersafety

Cyberbullying What is Cyberbullying involves the use of electronic devices supports deliberate, repeated, and hostile behavior by an individual or group its intent is to harm others.

What is Cyberbullying According to a survey done in 2007 by the National Crime and Protection Council: 43% of teens report that they have experienced some form of cyberbullying that year. The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.

Why do teens cyberbully? 81% Because they think it is funny 64% Because they don’t like the person 45% Because they view the victim as a loser 47% Because they feel there are no consequences for cyberbullying 45% Because they don’t think they will get caught 58% of students surveyed don’t think cyberbullying is a big deal

Do you think it was a big deal to these students and their loved ones? Stop Cyber bullying Do you think it was a big deal to these students and their loved ones? Rachael was stalked online by anonymous bully. She died by suicide on October 9, 2006. Ryan, a 13-year old, who died by suicide as a result of bullying at school and online. A cruel online hoax by a neighbor led to the suicide death of Megan.

What is a cyber-predator? A cyber-predator uses the internet to hunt for victims to take advantage of them in some way: emotionally sexually psychologically financially A cyber-predator knows how to manipulate people by creating trust and friendships where none should exist.

What is a cyber-predator? 77% of the target for online predators are teens aged 14 and older. 33% of teens received an aggressive sexual solicitation online in the past year. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.

What is Phishing Phishing is the act of requesting confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

Phishing 15% of online teens have received a fraudulent message, compared with 22% of adults. Always check your URL when navigating in social networks like MySpace and Facebook. If you click on an application and the URL does not have www.facebook or has a URL that is just numbers like 10.263.18, immediately exit out of that page.

How to stop the bad guys Be suspicious of any email with urgent requests for personal financial information. DO NOT RESPOND TO IT! Phisher emails are typically NOT personalized Valid messages from your bank or e-commerce company generally are

How to stop the bad guys 2. If you suspect an email message might not be authentic . . .Don't use the embedded links to get to another web page. Call the company on the telephone, or log onto the website directly by typing the URL into the address bar Don’t cut and paste the link from the message into your Internet browser – the phisers can redirect you to a different site

How to stop the bad guys 3. Avoid filling out forms in email messages that ask for personal financial information. Phishers make very good fake forms. Only communicate personal financial information via a secure website or the telephone.

4. Don’t email personal or financial information. Email is not a secure method of transmitting personal information No one indicator is foolproof Some phishers have forged security icons like the lock icon on an order form

5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser. Check the beginning of the Web address in your browsers address bar It should begin with "https://" rather than just "http://".

6. When shopping for an item on the Internet Be sure the site is secure (https: instead of http) before entering personal financial information!

Works Cited Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept. 2009 <http://safety.lovetoknow.com>. Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept. 2009 <http://www.forrester.com>. Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept. 2009 <http://www.makeadifferenceforkids.org>. National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept. 2009 <http://www.ncpc.org>. “Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept. 2009 <http://www.tweakspeed.com>.