Keep your software updated Use anti-virus Install Firewall Create copies of safety of important files. Be careful when you make reception of content.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Primary Threats to Computer Security
Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA Office: ext Fax:
Keeping Your Child Safe on the Internet
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Digital Citizenship L’école élémentaire Beachy Cove Elementary School January 2013.
How to keep your kids safe online
e-safety and cyber bullying
Using internet and cell phones safely
How to safe online E-Safety Presentation How to stay safe when online Tip 1Tip 2Tip 3Tip 4 Tip 5.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Web sites should always post a privacy policy, where they tell you why they need information from you and what they will do with it. If you're not sure.
The Internet = A World of Opportunities
What do I need to know?.   Instant Messages  Social Networking.
Digital Citizenship Presentation Mr. E. Colston Note to Portfolio Reviewers: The following material is not my own creation, though it has been modified.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Internet safety By Lydia Snowden.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Information guide.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
RULES FOR ONLINE SAFETY BY KYLE K AND JASON. CHECK WITH YOUR PARENTS FIRST ! Don’t ever agree to get together with someone you meet online without checking.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Mrs. Kinsler’s Class.  With a table partner, make a list of some of the things you do on the Internet.  Be ready to share your list with the class!
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
BY CONTESSA RUSHING ED 505 TECHNOLOGY AND EDUCATION.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
INTERNET SAFETY FOR KIDS
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
For Grades 3-5 WOLFTEVER CREEK ELEMENTARY.  Educate Us  Entertains Us  Connects Us  False Information  Opens Your Home to the Outside World  Bad.
By Liam Wright Manga comic group Japan SAFETY on your computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Do not give out personal information. Never meet someone face - to - face (FTF) that you have met on the Internet or have them visit you.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Netiquette and Online Safety By: H F. Netiquette Netiquette is the do’s and don’ts of the internet. Basically netiquette is the rules of online communication.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Internet Safety By Blair Number 1 Use a nickname not your real name.
Internet Safety 101! Instant Messaging Social Networking Sites (i.e. Facebook) Sending personal Information Sending pictures online Talking to strangers.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
STOP. THINK. CONNECT. Online Safety Quiz.
E SAFETY ASSEMBLY.
Internet Safety – Social Media
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

Keep your software updated Use anti-virus Install Firewall Create copies of safety of important files. Be careful when you make reception of content. We install anti-spyware for dissuasion of illegal spying of our web activity.

 We protect our private life, avoiding the share of personal data or data that has to do with friends and family. We do the same for our personal photographs and videos.  We use password with the combination of letters and numbers that it is difficult to guess.  We never reveal our password to anybody  We prefer addresses of web that are ensured with SSL and begin with https.

 We should also be careful when we send Instant Messages. We have to know that many of these companies automatically store our messages, except we have made the proportional regulations.  The blogspot services usually allow us to control what can we publically share e.g. our or even our comments. We read the privacy policy carefully so as to know what is required and what can get exposed to public.  We decide who to watch our blogspot. If we choose our family and friends we could turn our blogspot to accessible but with password as well.  By using nicknames in blogspot we can protect who we really are!

 We read the privacy policy and understand it. If we don’t agree, we simply don’t make an account.  We always remember that the sender or the recipient may reveal our when we chat online. In that case, the person who does that is usually named as a list-server.  By using nicknames we can protect ourselves!

In case of violation of our rights online we address to official bodies/authorities such as: o The Police(Prosecuting Cybercrime) o Safeline o Saferinternet (founded by the European Commission, with the co-financing of the rest Member States ) o Counsel for the child   

Remember When you publish information in the Internet you do not have the total control of it and you may never be able to erase all the copies. Check Always attend to know in who you give information and to comprehend for what aim they are to be used. Think Is it reasonable to publish online youryour personal information if you aren't certain for what aim they will be used?

_paketo/booklet.pdf _paketo/booklet.pdf :33_96321&_dad=portal&_schema=PORTAL :33_96321&_dad=portal&_schema=PORTAL :33_96328&_dad=portal&_schema=PORTAL :33_96328&_dad=portal&_schema=PORTAL /9/ /virus.pdf /9/ /virus.pdf