Download presentation
Presentation is loading. Please wait.
Published byRosaline Armstrong Modified over 9 years ago
1
You, Me & Technology
2
Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect our information
3
Our Relationship w/ Technology Modern Technology A hyper-connected world—with texting, social networking, e-mail, online gaming, chat, music downloading, web surfing, and other forms of wired and wireless communication - Creates a dependency for society - Alienates and takes the “social” out of social interaction - Effects on communication skills
4
The Internet In simplest terms, it is a large group of millions of computers around the world that are all connected to one another.
5
Internet In Numbers North America: 273,785,413 people use the internet Asia: 1,076,681,059 people use the internet
6
Threats: Who? Sex Offenders Stalkers Hackers Fraudsters Terrorists
7
Threats: Why? Personal Fulfillment Financial Gain Status Fun / Thrill Corporate Espionage Malicious Intent
8
Threats: What? Malware (Malicious Software) –Types: Viruses : Infection in a computer that spreads from one to another through files. Trojan Horses : Contains itself in programs or files that seem “harmless”. Worms : Infection that spreads unaided. Spyware : Intrudes your privacy without you knowing Phishing : Using Emails or other forms to take personal data. Spams : Emails about miracle products, making easy money, etc. It is all spams.
9
Threats: What? Mobile Attacks –APPs –Network Connection Public Networks https:// –Text Threats –Others Threats
10
Threats: What? Information Sharing –Personal Information in the wrong hands What is personal information –Social Networks Online Image –Search Engines Your information is sold! –Habits –Audience
11
How: Social Networking Nothing has changed the Web more than the rise of social networking sites. "With social networks, we're able to visualize the connections between individuals… knowing the connections between individuals helps us better understand them, who they are connected to, and how they are connected to us.” If Stutzman is right, understanding the way these networking sites work will help us understand ourselves and our friends.
12
Your Online Image How do you portray yourself?? –Pictures, Profiles, Posts, Online image becomes part of your real life image. What does your profile say about you?? What about your email?? Usernames - Beef_Kate, MustyElbows, Spoony, JerkyMyTurkey
13
Who Views Your Profile? Profile Settings Who views your profile? –Friends –Family –Future Employers –Teachers/Coaches –Neighbors –Stranger Danger (Potential Criminals)
14
Personal Information What is personal information? –Name –Physical Address –Email Address –Phone –Bank Information –Social Security –Login Information –Anything that can be used to identify, contact or locate you.
15
Protecting Yourself Protecting from Malware: http://www.youtube.com/watch?v=XU8PHihT_P 4&feature=plcp Stop and ask yourself –Weariness of social networks, online shopping, etc. Passwords –Create Strong Passwords »Case sensitive, Numbers, Special Characters
16
MINI CHALLENGE!! Name one threat from using the internet.
17
MINI CHALLENGE!! Give an example of a bad password.
18
Games?? -Class teams, open the boxed “email”, bingo? Supplemental material -Max Butler http://www.youtube.com/watch?v=U0I6kAP76fY http://www.youtube.com/watch?v=U0I6kAP76fY -Sharing info -http://www.youtube.com/watch?v=O5OsQsB7Hg4&featur e=plcphttp://www.youtube.com/watch?v=O5OsQsB7Hg4&featur e=plcp -http://www.youtube.com/watch?v=m_JB9mA_O3c&featur e=plcphttp://www.youtube.com/watch?v=m_JB9mA_O3c&featur e=plcp -ID Theft -http://www.youtube.com/watch?v=lp_8cvNm_vE&feature =plcphttp://www.youtube.com/watch?v=lp_8cvNm_vE&feature =plcp
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.