Download presentation
Presentation is loading. Please wait.
Published byAlvin Haynes Modified over 9 years ago
3
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies
4
Obscene Images Obscene Text Misinformation Lies
5
How to minimize it? Use specific search terms Install web-content filters Stick with U.S. websites Ask for adult help What to do? Close the browser immediately Tell an adult
6
What is a Hacker? A computer user who attempts to illegally gain access to other computer systems Why Hack? Theft – $ and Info Trojan Horse Social Engineering Stroke Loggers Brute Force Attacks Destruction Destructive Virus Data Deletion Denial of Service Stops Real Users Costs Company Money
8
A Phisher is someone who steals personal and financial information, usually by tricking you into giving it to them Why Phish? Identity theft / sale Bank fraud Spoofing How do they do it? E-mail Phony websites Phone soliciting ATM Swipers
9
How to stop them: Don’t read or open unsolicited e-mail, also called SPAM - mail from an unknown sender that you did not request Don’t follow / click on links in an e-mail (especially links to financial institutions, stores, or password changes) Check financial websites for the encryption icon If in doubt about the validity of an e-mail, ask an adult to pick up the phone and call the company for clarification Most commonly used spoof sites and e-mails show up as fake notifications from “your bank,” e-bay, Paypal, or Amazon. Most often want you to follow the link to “verify” your personal information but you’re actually giving it to a fraud If you think something looks funny, ask an adult for help!
10
Scammers are similar to Phishers except they don’t use phony websites or pretend to be a legitimate business Try to convince you to send them money Nigerian royalty Starving children Russian investors Business opportunities As with Phishers, avoid unsolicited e-mail / SPAM NEVER give money / credit card information through e-mail Show an adult
11
The Danger: Kidnappers Predators Human Traffickers How They Operate: Determined and willing to spend time and effort: Trickery – posing as kids your own age Contact through IM, Facebook, Myspace, E-mail Seek to gain your trust – sharing secrets Ask for personal information: age, full name, city, address, etc. Ask you to sneak out or meet somewhere
12
You can STOP internet predators! Keep your personal information to yourself No one in chat needs to know your name or address Keep chat handles and e-mail anonymous: coolguy12345 is much better than Remember that anyone can be anyone on the web! Share any suspicious activity with an adult Visit http://www.netsmartz.org with your parents! NEVER, EVER, EVER agree to meet anyone on-line.
13
Bullies ruin lives! So do cyber bullies! Cruel speech, taunting, and making fun of others can leave severe and lasting emotional scars Anonymity makes it easy and fast to cyber-bully If you wouldn’t say it in person, out loud, don’t say it in e-mail or chat! Treat everyone with the same respect and dignity you want to be treated with! If you are being bullied – tell a parent or teacher If you see or hear of someone else being bullied, tell a parent or teacher If you are bullying someone else … STOP IT!
14
Cindy has been talking online to a girl named Julie for a few days now. Julie has told Cindy where she lives, how old she is, where she goes to school, and what she looks like. Julie asks Cindy what school she goes to. Is it okay for Cindy to tell her? (What else shouldn’t Cindy tell Julie?) Michael is online talking to his friend from school, Chris. They are working on their homework together and studying for a test. Chris says they should meet before class to review for the test. Is this okay? (Should Michael also ask a parent just to make sure?)
15
Take out a blank paper and pencil Number your paper from 1 to 100
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.