JMU GenCyber Boot Camp Summer, 2015. Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Keeping Your Child Safe on the Internet
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet.
INTERNET SAFETY FOR STUDENTS
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
Cyber bullying and internet safety Parents meeting: staying safe online.
Facebook Presented by: Keystone Computer Concepts.
Social media threats. Warning! May contain mild peril.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Social Media Safety Manchester Township Middle School Guidance Department
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
FACEBOOK Material adapted from
 S = Stay safe  M = Meet up  A = Accepting information  R = Reliable  T = Tell someone.
Internet Safety Safely Navigating Uncharted Waters.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Welcome to Parenting in the Digital Age. This presentation will: Help you to get to grips with what your children are doing online Explain the W-W-W-
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
Social Media Safety. Discuss O As a class discuss the different types of social media and what it is used for.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Technology Tips and Safety for Teens. Social Networks Social Networks are internet applications which are used to facilitate communication between users.
E-Safety Parent Talk Helping to keep your children safe online.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Safety.
Cyberbullying on Instagram and Snapchat
E-Safety What are the dangers: Seeing disturbing information or images
How to use the internet safely and How to protect my personal data?
Our Children and Social Media
Appropriate Use of Technology
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Cyberspace Risks and Defenses
Teaching our children the safe and responsible use of ALL technology.
Online Safety! Created by Educational Technology Network
Internet Safety – Social Media
Presentation transcript:

JMU GenCyber Boot Camp Summer, 2015

Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 2

Facebook Facebook is a popular social media platform “A Parent’s Guide to Facebook” by iKeepSafe.org: Minimum age is 13 years old Many students use it to: Stay in touch with friends Share news, pictures, and (cat) videos Chat Etc. JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 3

Facebook (cont) Special protections for users 13-17: Teens not listed in public searches Only friends and friends of friends can “tag” teens Teens cannot share with “the public” (only friends and friends of friends) Location sharing is off by default Friend requests only from friends and friends of friends Teens can only chat with friends Messaging is off by default No ads about adult content, alcohol, dating, gambling, and subscription services JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 4

Social Networking Risks Harassment or online bullying (cyberbullying) Perpetrator and/or victim Posting information about themselves that: Could be used to embarrass or manipulate them Could cause psychological harm Could be used by criminals to steal their identity or property Could be used by criminals to determine their physical location to cause physical harm JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 5

Social Networking Risks (cont) JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 6 Damage to reputation or future prospects: Unkind or angry posts Compromising photos or videos Group conflict depicted in text and/or imagery Spending “too much time online” (subjective) Exposure to inappropriate content (subjective) Potential for inappropriate contact with adults

Snapchat (Mobile) users take a photo or video Add a caption Send it to friends User sets a time limit (1-10 seconds) of how long recipient can view photo/video Unless they take a screenshot JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 7

Apps Many application programs (“apps”) can be installed via phone or social networking page Risks include: Accidentally sharing information about yourself and your friends with the app developer Apps can contain spyware or malware You could wind up paying a lot for “free” apps Ads In-app purchase JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 8

P2P Filesharing Risks Many easy-to-use apps allow people to share music, movies, and software online Risks include: Accidentally sharing private files Legal issues from copyright violations Shared software could include spyware or malware JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 9

Craigslist Free advertisement website Rules of thumb: Deal locally Face-to-face (but safely!) JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 10

Craigslist (cont) To these we add: use common sense when arranging to meet someone face-to-face JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 11

Scams Before we get into specifics some rules of thumb: Protect your passwords Understand what information is private (SSN, account information, passwords) and be very suspicious when someone asks for it Check out requests and find out who you are really dealing with If warranted, give personal information over encrypted web connections only If something sounds too good to be true it probably is (especially on the Internet!) JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 12

Scams (cont) Common things to stop and think about: JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 13

Scams – Scareware JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 14

Scams – Scareware Defenses JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 15

Scams – Nigerian Prince Scam JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 16

Scams – Phishing JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 17

Scams – Phishing (cont) JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 18

Scams – Phishing Defenses JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 19 Be cautious/suspicious JMU policy: we will never ask you for your password over the phone or JMU policy: only a few trusted JMU websites as for your password Look where you are going: Before clicking on a link hover over it with the mouse and view the URL Look where you are at: If you click a link, check the address bar and make sure it took you to the proper domain and you weren’t redirected

Summary of Cyberspace Risks and Defenses Be careful/suspicious: Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015 JAMES MADISON UNIVERSITY 20