internet safety slides
DESCRIPTION
Slides to accompany a presentation on Internet safetyTRANSCRIPT
Internet SafetyMr Eric Castro
Tell a neighbor: What do you remember from your grammar school internet
safety presentations?
Create a Positive Digital Footprint
Protect Your Privacy
Protect Yourself from Identity Theft
Protect Yourself from Bullies
Protect Yourself from Predators
Protect Yourself from Yourself
Create a Positive Digital Footprint
1
Tell a neighbor: What are you most proud of having produced or created
that’s online?
Our digital footprint is the evidence of our online activities.
You want to leave positive
digital footprints.
Lost by Stephen Nicholas
The New Yorker, 3/22/2010
Protect Your Privacy
2
1) Do not inadvertently reveal personal information online
Block cookies
2) Keep a “clean” email account
3) Realize that you may be monitored
4) Do not reply to spammers, ever
5) Be conscious of web security
Passwords
Use a different secure password for each site
• Make sure your password is as long as possible
• Use as many different characters as possible
• Do not use personal information
• Do not use common words
• Do not use passwords that are easy to spot while you are typing them in
Come up with a sentence that is easy to remember
Use the first letter of each word, including the punctuation
Come up with a sentence that is easy to remember
Tron was a complete waste of money!
Use the first letter of each word, including the punctuation
Twacwom!
Encryption
http://
https://
6) Be conscious of security on shared computers
7) Be conscious of home computer security
Protect Yourself from Identity Theft
3
Raise your hand: Has anyone that you know had their identity stolen?
IMG_4511 by John R Southern
Too Much Credit by Andres Rueda
It’s not about cash ...
it’s aboutdebt
Too Much Credit by Andres Rueda
• Destroy private records and statements
• Secure your snail mail
• Safeguard your Social Security number
• Don’t leave a paper trail
• Monitor your credit report
• Review credit card statements carefully
Protect Yourself from Bullies
4
First ...
First ...
Chan
ge B
egin
s H
ere
by T
rista
Em
let
What exactly is cyberbullying?
• IM/ Text harassment
• Stealing passwords
• Blogs
• Web sites
• Sending pictures through email & cell phones
• Internet polling
• Interactive gaming
• Malicious code
• Sending porn or junk email
• Impersonation
• Cyberbullying by proxy
Why cyberbully?
What to do
• Don’t bully
• Don’t reciprocate
• Save evidence
• Tell a trusted adult
King on the march to Montgomery by Eliel Johnson
King on the march to Montgomery by Eliel Johnson
“In the end, we will remember not the words of our enemies, but the silence of our friends.”
Protect Yourself from Predators
5
http://i.imgur.com/cbRmA.jpg
Emotionally vulnerable
Seeking attention
Seeking affection
Seeking validation
Chatroulette
Protect Yourself from Yourself
6
Tell a neighbor: What is the least intelligent thing that you’ve seen
someone put online?
http://failbook.failblog.org
http://failbook.failblog.org
http://failbook.failblog.org
Rocque posted a message to his alleged attacker
saying they are 'done'.
Police say such messages can escalate quickly.
"If a young person is on the Internet and they are
making comments that are threatening in nature,
they need to realize we could be looking at
criminal charges, unwarranted retaliation because
of their comments as well as hampering an
ongoing police investigation," said Sgt. Kelly
Rosnau, school resource officer.
What to do?
• Remain alert
• Keep a low profile
• Trust your instincts
Control your information
Control your information
Be smart