cyber safety. protect your identity choose screen names/logins that do not give you away choose...
TRANSCRIPT
![Page 1: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/1.jpg)
Cyber Safety
![Page 2: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/2.jpg)
Protect Your Identity
Choose screen names/logins that do not give you away
Choose password that cannot be easily guessed
Do not give away any personal information: name, birth date, social security number, address, etc.
Separate your personal identity from your internet identity
![Page 3: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/3.jpg)
Think before you put anything on the internet… Just like a tattoo,
your digital reputation is an expression of yourself.
Highly visible, and hard to remove
ESPECIALLY IF YOUR PROFILE IS PUBLIC!!!!!!!
![Page 4: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/4.jpg)
Risks
Enemies Predators Accountability for your statements Result in legal or school discipline “Instant background checks” Really can’t know what’s true No reasonable expectation of privacy
![Page 5: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/5.jpg)
Making Impressions
It is reported that predators call social networking sites their
“Virtual Shopping Catalog”
Refer their ‘friends’ to that profile
![Page 6: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/6.jpg)
A Powerful tool for recruiters, employers, or schools… They can see: Your use of language.
(status/comments) What you do in your spare time.
(pictures) What your interests are. (about me) Who you associate with. (friends)
THEY CAN MAKE A JUDGEMENT OF YOUR CHARACTER!
![Page 7: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/7.jpg)
What should you do…
Use intelligent design
![Page 8: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/8.jpg)
Use Intelligent Design
Eliminate all identifying information Anything that allows you to be located Anything that pairs the profile to your
name Delete inappropriate information Read your information to determine
what impression it gives Your site may appeal to someone you
didn’t intend for it to impress
![Page 9: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/9.jpg)
What should you do…
Choose appropriate photos Un-tag inappropriate photos Use appropriate language. Don’t “like” inappropriate things. Set good privacy settings!
![Page 10: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/10.jpg)
![Page 11: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/11.jpg)
![Page 12: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/12.jpg)
Social Networking Tips
Set your site so that people can only be added as your friend if you approve it
Set your profile as private Check the additional setting, i.e.,
photos Know the sites privacy policy Use strong passwords Use anti virus protection
![Page 13: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/13.jpg)
Predator Simulation
What can be found on a Facebook profile?
What can be found on an Instagram?
![Page 14: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/14.jpg)
![Page 15: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/15.jpg)
What we know so far… His name His girlfriend’s name His birth date He is from Moreland, Georgia His email addresses His AIM screen name His cell phone number His personal web page address The music he likes The movies and TV shows he likes to watch
Time: 2 minutes
![Page 16: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/16.jpg)
![Page 17: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/17.jpg)
We now know his student number We know what he drinks We know his favorite holidays We know his favorite sports teams We know his major We have learned even more
information about where he is from
Time: 1 minute Total Time: 3 minutes
What we know so far…
![Page 18: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/18.jpg)
![Page 19: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/19.jpg)
![Page 20: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/20.jpg)
![Page 21: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/21.jpg)
Parents’ names Their address Home phone number Parents’ ages
Time: 2 minutes Total Time: 5 minutes
What we know so far…
![Page 22: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/22.jpg)
![Page 23: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/23.jpg)
![Page 24: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/24.jpg)
![Page 25: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/25.jpg)
![Page 26: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/26.jpg)
Map to their house Satellite image Local theaters
Time: 2 minutes Total Time: 7 minutes
What we know so far…
![Page 27: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/27.jpg)
![Page 28: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/28.jpg)
![Page 29: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/29.jpg)
What should you do…
Protect your personal information Be cautious of people online that you
do not REALLY f2f know Realize the criminal risks of some
internet actions Remember people online are still
people…
![Page 30: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away](https://reader036.vdocument.in/reader036/viewer/2022081603/5697bff41a28abf838cbce77/html5/thumbnails/30.jpg)
Spread the Word…
Create a Flyer in Word that either tells your peers A. Protect your Identity B. Protect yourself from Predators