Your SlideShare is downloading. ×
0
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Becybersmart 110605083310-phpapp02

57

Published on

I updated the original PPT. Make sure you download to use since the animation helps with the presentation.

I updated the original PPT. Make sure you download to use since the animation helps with the presentation.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
57
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Short for Malicious + Software
  • Keeping your personal details private. Use a nickname instead of your real name and always ask your parents before giving out your name, address or phone number online.
    Not sharing your username or password with anyone.
    Thinking before you post. Once posted, it can be difficult to remove.
    Not posting things that you don't want others to know about or that you wouldn’t say to their face.
    Being respectful of other people’s content that you post or share. For example, a photo that your friend took is their property, not yours. You should post it online only if you have their permission.
    - See more at: http://www.cybersmart.gov.au/Kids/Get%20the%20facts/Digital%20footprint.aspx#sthash.5veOogAL.dpuf
  • Teens-
  • Transcript

    1. Be Cyber-Smart! Surf Safely! Velma Davis, Instructional Support Specialist VDavis1@usd259.net
    2. Know your internet areas • Email • Chat rooms • Game rooms • Blogs (Blogger) • Microblogs (Twitter, Plurk) • Bulletin Boards (Myspace, Facebook) • Instant Messaging
    3. Protocols? What protocols?! Radios: gained popularity in 20’s and 30’s Television: Late 1940’s Internet Explosio n: 1990’s
    4. Your mother warned you:connectyourhome.com
    5. Teens Online • 82% of profile creators included their first name in their profiles. • 79% have included photos of themselves. • 66% have included photos of their friends. • 61% have included the name of their city. • 49% have included the name of their school. • 40% have included their instant message screen name. • 40% have streamed audio to their profile. • 39% have linked to their blog. • 29% have included their email address. • 29% have included their last name. • 29% have included videos. • 2% have included their cell phone numbers. http://www.marketingcharts.com/interactive/teens-and-social-networks-managing-personal-information-274/ PEW Report, 2008
    6. Am I really 10 years old?Am I really 10 years old? Who am I REALLY?! Is that really a picture of me? Am I aAm I a boy?boy? Do I really goDo I really go to school?to school?
    7. Risks? Highest risk to Teenagers! “Teenagers are particularly at risk because... they are more likely... to participate in online discussions regarding companionship..."LOL LMAO TY BRB AWFK YW RU Y ASL POS LMIRL WTF OMG Laugh out loud Laughing my A$$ off Thank You Be Right Back Away from keyboard/computer You’re Welcome Are you? Why? Age, sex and location Parent Over Shoulder Lets Meet In Real Life What the F$%# Oh my God http://en.wikipedia.org/wiki/Internet_slang
    8. Leet Speak Remember …“Hip”, “Groovy”, “Peace out”? “Leet” refers to “Elite”. Substitutes regular letters for symbols or numbers Further information for Leet Speak: http://en.wikipedia.org/wiki/Leet http://www.brenz.net/services/l337Maker.asp cartoonstock.com
    9. 0 - O 1- I or L 2- A, Z or R 3- E 4- A 5- S 6- B or G 7- T or L 8- B 9- G or P £- L or E
    10. Think Before You Click! • Domains- The extensions on a website can indicate their purpose: .com- commercial .biz- business .org- organization .gov- government .edu- education .net- network .xxx- pornography blog.andyswebtools.com
    11. Virus A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. hugepedia.com
    12. Worm • A computer worm is a selfreplicating computer program. It uses a network to send copies of itself to other nodes computer terminals on the network). • Worms almost always cause harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
    13. Spyware • Collects small pieces of information about users without their knowledge • Installs on your computer • Secretly monitors the user's computing: can collect various types of personal information, such as Internet surfing habits and sites that have been visited • Can install additional software and redirect Web browser activity. • Changes computer settings: – Slow connection speeds, – Changes your home pages, – Loss of Internet connection – Loss of functionality of other programs. http://en.wikipedia.org/wiki/Spyware
    14. Malware – Rogue or malicious programs can attack and do various things to your computer while surfing the internet. – Hostile, intrusive, or annoying software or program code
    15. Phishing Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. thenextweb.com
    16. Suggestions? joystickdivision.com
    17. AntiVir PE • http://www.avira.com/en/avira-free-antivirus Avira AntiVir Personal - Free Antivirus Protects your computer against dangerous viruses.
    18. AVG • A great Anti-virus and Anti-Malware program. Free Download: http://free.avg.com/ww-en/download-avg-anti-virus-free
    19. Firewall • A firewall is a device or set of devices configured to permit, deny, encrypt, or monitor internet connections between online traffic and your computer. Windows 07 comes with a built-in Firewall.
    20. Blocking or Filtering http://internet-filter-review.toptenreviews.com/ Compare software:
    21. Digital Footprint • What does your digital footprint look like? • Keeping your personal details private. Not sharing • Thinking before you post • Not posting things that you don't want others to know about or that you wouldn’t say to their face. •
    22. My Rules for Internet Safety! I will not give out personal information such as my address, telephone number, parents’ work address/telephone number, or the name and location of my school without my parents’ permission cartoonstock.com
    23. I will tell my parents right away if I come across any information that makes me feel uncomfortable Boy, am I uncomfortable!
    24. I will never agree to get together with someone I "meet" online! celebrityradar.info
    25. I will never send a person my picture or anything else without first checking with my parents
    26. I will not respond to any messages that are mean or in any way make me feel uncomfortable. It is not my fault if I get a message like that. If I do I will tell my parents right away.
    27. • I will not download pictures from an unknown source, as there is a good chance there could be sexually explicit images.
    28. • time of day that I can be online, • the length of time I can be online, • appropriate areas for me to visit. I will not access other areas or break these rules without their permission. I will talk with my parents so that we can set up rules for going online. cartoonstock.com
    29. Helpful Sites • http://www.onlinenetiquette.com/netiquette_quiz.html • www.netzsmartz.org • www.safeteens.com • www.blogsafety.com • www.netfamilynews.org • http://www.slideshare.net/jtubbs/internet-safety-program-for-par • http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec14.shtm • http://www.cybersmart.gov.au/Kids/Get%20the %20facts/Digital%20footprint.aspx
    30. Bibliography • www.netzsmartz.org • www.safeteens.com • www.safekids.com Lawrence J. Magid • www.blogsafety.com • www.netfamilynews.org • http://dsc.discovery.com/convergence/koppel/int eractive/interactive.html • http://pewresearch.org/

    ×