Internet safety slides

1,625 views
1,472 views

Published on

Slides to accompany a 45-minute presentation on Internet safety for high school students.

Published in: Education
1 Comment
0 Likes
Statistics
Notes
  • Hi Eric, I love this presentation, may i have a copy of it?
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
1,625
On SlideShare
0
From Embeds
0
Number of Embeds
13
Actions
Shares
0
Downloads
0
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide
  • \n
  • \n
  • 6 things\n
  • \n
  • In an interview with the Harvard admissions committee, what could you show them online?\n
  • Think of every web service you use, or are associated with.\nWhat is there?\nPictures? Video? Poetry? Stories? Reflections on life?\n
  • \n
  • For college and for jobs\n
  • \n
  • 82% of 16—18 year-olds use FB daily\n
  • There is NO privacy on the internet.\nWhat’s there is there forever\n
  • NEVER your Social Security number\nBeware that cookies store information and share it automatically w/ websites you visit\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • and don’t SHARE passwords\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Do NOT have your computer save passwords\n
  • More likely to be hit by lightening, or the victim of identity theft?\n750,000 new cases of identity fraud each year in the US\n
  • \n
  • More likely to be hit by lightning, or affected by a computer security problem?\n70% of computer users have been hacked, phished, or the victim of a virus — compared to 0.000102% chance of being struck by lightning?\n
  • \n
  • \n
  • Most materials for identity theft are stolen from trash cans\n
  • \n
  • \n
  • FIRST: Don’t be a bully\nMost bullies were victims\n
  • \n
  • do not SHARE passwords either\n
  • Anger, revenge, frustration\nEntertainment; bored, laughs, to get a reaction, \nBolster or remind ppl of their social standing \nSometimes by accident\n
  • \n
  • \n
  • \n
  • \n
  • Not much harm that a predator can do to you like this\nit’s when you meet IRL …\nIt’s not all men ...\n
  • \n
  • \n
  • \n
  • \n
  • In an interview with the Harvard admissions committee, what could you show them online?\n
  • \n
  • “Her offense: Posting on Facebook a photograph of herself posing with a human placenta in class.”\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Scheduled for same day as Omaha, NB teen shot principal & assistant principal\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Internet safety slides

    1. 1. Internet Safety Mr Eric Castro
    2. 2. Tell a neighbor: What do you remember from your grammar school internet safety presentations?
    3. 3. Create a Positive Digital Footprint Protect Your PrivacyProtect Yourself from Identity Theft Protect Yourself from Bullies Protect Yourself from Predators Protect Yourself from Yourself
    4. 4. Create a PositiveDigital Footprint 1
    5. 5. Tell a neighbor: What are you mostproud of having produced or created that’s online?
    6. 6. Our digital footprintis the evidence of ouronline activities.
    7. 7. You want to leave positivedigital footprints. Lost by Stephen Nicholas
    8. 8. The New Yorker, 3/22/2010
    9. 9. Protect Your Privacy 2
    10. 10. 1) Do not inadvertently reveal personal information online
    11. 11. Block cookies
    12. 12. 2) Keep a “clean” email account
    13. 13. 3) Realize that you may be monitored
    14. 14. 4) Do not reply to spammers, ever
    15. 15. 5) Be conscious of web security
    16. 16. Passwords
    17. 17. Use a different secure password for each site
    18. 18. • Make sure your password is as long as possible• Use as many different characters as possible• Do not use personal information• Do not use common words• Do not use passwords that are easy to spot while you are typing them in
    19. 19. Come up with a sentence that is easy to remember Use the first letter of each word, including the punctuation
    20. 20. Come up with a sentence that is easy to remember Tron was a complete waste of money! Use the first letter of each word, including the punctuation Twacwom!
    21. 21. Encryption
    22. 22. http://https://
    23. 23. 6) Be conscious of security on shared computers
    24. 24. 7) Be conscious of home computer security
    25. 25. Protect Yourself from Identity Theft 3
    26. 26. Raise your hand: Has anyone that you know had their identity stolen?
    27. 27. IMG_4511 by John R Southern
    28. 28. To oM uc hC red it b yA nd re sR ue da
    29. 29. It’s not about cash ... To oM uc it’s about hC red it b yA nd debt re sR ue da
    30. 30. • Destroy private records and statements• Secure your snail mail• Safeguard your Social Security number• Don’t leave a paper trail• Monitor your credit report• Review credit card statements carefully
    31. 31. Protect Yourself from Bullies 4
    32. 32. First ...
    33. 33. First ...Change Begins Here by Trista Emlet
    34. 34. What exactly iscyberbullying?
    35. 35. • IM/ Text • Interactive gaming harassment • Malicious code• Stealing passwords • Sending porn or• Blogs junk email• Web sites • Impersonation• Sending pictures • Cyberbullying by through email & proxy cell phones• Internet polling
    36. 36. Why cyberbully?
    37. 37. What to do
    38. 38. • Don’t bully• Don’t reciprocate• Save evidence• Tell a trusted adult
    39. 39. King on the march to Montgomery by Eliel Johnson
    40. 40. “In the end, we will remember not the words of our enemies, but the silence of our friends.” King on the march to Montgomery by Eliel Johnson
    41. 41. Protect Yourself from Predators 5
    42. 42. http://i.imgur.com/cbRmA.jpg
    43. 43. Emotionally vulnerable Seeking attention Seeking affection Seeking validation
    44. 44. Chatroulette
    45. 45. Protect Yourself from Yourself 6
    46. 46. Tell a neighbor: What is the leastintelligent thing that you’ve seen someone put online?
    47. 47. http://failbook.failblog.org
    48. 48. http://failbook.failblog.org
    49. 49. http://failbook.failblog.org
    50. 50. e to his alleg ed attackerRocque pos ted a messagsaying th ey are done. ages can escal ate quickly.Police say such mess the Internet and they are "If a young person is on g in nature, ments that a re threatenin mak ing com e could be looking at ey need to realize w ation because th harges, unwa rranted retali cri minal c well as ha mpering an their comments as Sgt. Kelly of olice investig ation," said ongoing p au, school res ource officer. Rosn
    51. 51. What to do?
    52. 52. • Remain alert• Keep a low profile• Trust your instincts
    53. 53. Control your information
    54. 54. Control your information
    55. 55. Be smart

    ×