SlideShare a Scribd company logo
1 of 27
Internet Safety A Christian Perceptive Philippians 4:13 "I can do all things  through Christ who strengthens me."
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
There is always a risk in meeting an online friend. People aren’t always who or what they claim to be .
[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
* Frank – Mark – Valleyguy …... Arrested  and sentenced to prison for 1 ½ years. Photo of Frank by  Bob Child,  Associated Press Both photos published in People Magazine,  May 29 th , 2000
Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting X X X X X X
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
MudgeoTorso1091
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
klknight79
 
Faiza Ahmed PP Quiz
Faiza Ahmed PP QuizFaiza Ahmed PP Quiz
Faiza Ahmed PP Quiz
tonybattista
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
st josephs
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
Pamela Moeai
 
Emily Slocombe E-Safty Quiz
Emily Slocombe E-Safty QuizEmily Slocombe E-Safty Quiz
Emily Slocombe E-Safty Quiz
tonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
tonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
tonybattista
 

What's hot (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Teens Presentation
Teens PresentationTeens Presentation
Teens Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Test
TestTest
Test
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Faiza Ahmed PP Quiz
Faiza Ahmed PP QuizFaiza Ahmed PP Quiz
Faiza Ahmed PP Quiz
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Emily Slocombe E-Safty Quiz
Emily Slocombe E-Safty QuizEmily Slocombe E-Safty Quiz
Emily Slocombe E-Safty Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 

Viewers also liked

E³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro EE³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro E
guest2ef4ed
 
Pro Keynote 4
Pro Keynote 4Pro Keynote 4
Pro Keynote 4
beerguy
 
Thematic Unit Story Board
Thematic Unit Story BoardThematic Unit Story Board
Thematic Unit Story Board
Amcconnell
 
Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012
Smithsonian Libraries
 

Viewers also liked (20)

Information Literacy
Information LiteracyInformation Literacy
Information Literacy
 
Spectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the WorldSpectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the World
 
Social Media Branding
Social Media BrandingSocial Media Branding
Social Media Branding
 
Ked Tech10
Ked Tech10Ked Tech10
Ked Tech10
 
E³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro EE³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro E
 
NHS Points 11-3-09
NHS Points 11-3-09NHS Points 11-3-09
NHS Points 11-3-09
 
Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?
 
Portraits
PortraitsPortraits
Portraits
 
телемаркетинг Commerce Ver.
телемаркетинг   Commerce Ver.телемаркетинг   Commerce Ver.
телемаркетинг Commerce Ver.
 
NO INVERNADOIRO
NO INVERNADOIRONO INVERNADOIRO
NO INVERNADOIRO
 
Pro Keynote 4
Pro Keynote 4Pro Keynote 4
Pro Keynote 4
 
himno nacional del Ecuador
himno nacional del Ecuadorhimno nacional del Ecuador
himno nacional del Ecuador
 
Thematic Unit Story Board
Thematic Unit Story BoardThematic Unit Story Board
Thematic Unit Story Board
 
Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012
 
Picnic Two
Picnic TwoPicnic Two
Picnic Two
 
Food, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity StudioFood, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity Studio
 
board of directors
board of directorsboard of directors
board of directors
 
Delta M
Delta MDelta M
Delta M
 
Micky Ds
Micky DsMicky Ds
Micky Ds
 
EPiServer CMS 6 UI
EPiServer CMS 6 UIEPiServer CMS 6 UI
EPiServer CMS 6 UI
 

Similar to Cyber covenant

Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kids
ceiland
 
Hugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPointHugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPoint
tonybattista
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
sam31
 
Internet safety
Internet safetyInternet safety
Internet safety
jld1018
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In Cyberspace
Carolyn Argo
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
esksaints
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
cey.ruth
 

Similar to Cyber covenant (20)

Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kids
 
Hugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPointHugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPoint
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Internet safety
Internet safetyInternet safety
Internet safety
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
cyber safety
cyber safetycyber safety
cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In Cyberspace
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Safetyquizkids
SafetyquizkidsSafetyquizkids
Safetyquizkids
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Cyber covenant

  • 1. Internet Safety A Christian Perceptive Philippians 4:13 "I can do all things through Christ who strengthens me."
  • 2.
  • 3.
  • 4.
  • 5.  
  • 6.
  • 7.  
  • 8.
  • 9.  
  • 10.  
  • 11.  
  • 12. There is always a risk in meeting an online friend. People aren’t always who or what they claim to be .
  • 13.
  • 14.  
  • 15.
  • 16.  
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. * Frank – Mark – Valleyguy …... Arrested and sentenced to prison for 1 ½ years. Photo of Frank by Bob Child, Associated Press Both photos published in People Magazine, May 29 th , 2000
  • 22. Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting X X X X X X
  • 23.
  • 24.  
  • 25.  
  • 26.
  • 27.

Editor's Notes

  1. Story of Ofir Rachum He was bright and outgoing 16 year old high school student who enjoyed computers One day he met a 20 year old woman Amana Muna in a chat room about computers. They exchanged email addresses and began communicating on a regular basis. Soon they were speaking with one another on the phone. They decided to meet. Ofir was thrilled to date an older woman. He was 16 she was 20. Their first Friday night encounter was a success and they arranged a second meeting later that week. This time she drove him to a deserted area where four of her friends were waiting. They shot him 15 times and threw his body in the trunk of his car. Amuna and her friends were members of an Anti-Semitic hate group. She had been online searching for a Jewish target . Ofir only know what she told him. He had no idea his death was her intent.
  2. Katie Tarbox Story Katie a 13 year old girl began using a computer, the Internet, and a chat rooms, aware of only the excitement and not the danger in connecting with millions of others. One Sunday morning in a teen chat room, she met a guy named Mark who said he was 23 and a college student. Although Katie recognized the discrepancy, she though their conversation harmless. It was just the Internet. Katie thought herself too smart an d too clever to become a victim. She was high honors student, a national swimmer and a very accomplished musician. Katie and Mark had an amazing connection. They liked the same music, clothing styles, movies, and food. Over a six-month period, they developed a friendship Katie characterized as platonic but important. She could tell him anything and did She discussed school, her family, her friends and always got it… But he wanted to meet her. Her parents knew nothing, so his coming to CT was not an option, nor was traveling to CA alone. So Katie came up with Texas. She would be there with her swim team and Mom as a chaperone. It was perfect. Katie shared her secret plans with her best friend as they arrived in Texas. She was gong to meet her cyber friend! Her confidence waned when he opened the hotel room door. And when he began molesting her, shefroze. Fortunately, Katie’s friend did not keep her secret. Katie’s mom and the hotl security arrived in the nick of time. Katie was shocked to learn Mark was not Mark but Frank Kufrovick, a 41 year old financial analyst and a sordid past. He had raped numerous other young girls and one boy.