Cybersafety Preso

  • 2,857 views
Uploaded on

 

More in: Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,857
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
5
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cyber Safety 2009
  • 2. 6 to 7 Teams of People
  • 3. ONE Each person does section
  • 4. Each person does 6 SLIDES
  • 5. Each person does 6 SLIDES Not 5, not 7
  • 6. Each preso will have: 1. Title Slide 1. “What it is” Slide 2. News Slides 1. Slide about being safe 1.Citation slide (EasyBib & Evernote) 6 Slides Total
  • 7. Each person has 2 Minutes
  • 8. Each person has 2 Minutes Not 1, not 3
  • 9. Each Person Does One Section
  • 10. Each Person Does One Section Identity Theft
  • 11. Each Person Does One Section Not Identity Being Theft Bullied Online
  • 12. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading
  • 13. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Social Networking
  • 14. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering Social Bad Networking Content
  • 15. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP
  • 16. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP Bonus if you have 7 people:
  • 17. Each Person Does One Section Not File Piracy Identity Being & Theft Bullied Illegal Online Downloading Safe Filtering School Social Bad Rules Networking Content & AUP Bonus if you have 7 Cyberpredators people:
  • 18. Take notes in EVERNOTE We’ll show you how
  • 19. Rewrite the notes in Google Docs DO NOT COPY/PASTE....we’ll know
  • 20. Build the preso in Google Preso Collaborate!
  • 21. DON’T!!!
  • 22. Each slide will have A Title Capitalize!
  • 23. Each slide will have A Subtitle Summarize!
  • 24. Each slide will have 5 facts In a paragraph or bullets
  • 25. Each slide will have 1 picture Not 2, or 3 or 4 pictures Get your pictures LAST (hint: they are likely on the research page!!)
  • 26. Each slide will have 1 quote A comment about the page.....
  • 27. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • 28. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • 29. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • 30. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • 31. Everything you need is here: Use only the Following Resources (don't just Google it): Identity Theft: Play Antiphishing Phil http://cups.cs.cmu.edu/antiphishing_phil/new/index.html Learn what it is:  http://www.commoncraft.com/phishing http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html Protect yourself: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html http://tcs.cybertipline.com/knowthedangers8.htm
  • 32. This:
  • 33. This:
  • 34. This:
  • 35. This:
  • 36. This:
  • 37. Becomes: What are Social Networks? Places to hang out! Most Social Network Sites are aimed at teens and young adults What kids do on social networks: Disney and Nick.com have services dedicated for children, like Club Penguin “about 60% talking about Sites for young children, under 14, require education-related topics moderation and more permissions to sign up and 50% discussing their schoolwork” http://www.digizen.org/socialnetworking/what.aspx The National School Board Association research says kids spend 9 hours online a week, almost as much as TV
  • 38. This:
  • 39. This:
  • 40. This:
  • 41. This:
  • 42. This:
  • 43. Want a lappy? Do the Preso Bring mom & dad....
  • 44. When? Sept 22, 23 Get a grade, a lappy and a new lifestyle!
  • 45. Bottom Line: Group size? _____ How many slides? ____ How much time? ____ How many facts per slide? ____ Who does the research? ____ What preso tool? ____