• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Internet safety 2010
 

Internet safety 2010

on

  • 632 views

Technology Institute cyber safety presentation.

Technology Institute cyber safety presentation.

Statistics

Views

Total Views
632
Views on SlideShare
632
Embed Views
0

Actions

Likes
0
Downloads
14
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Internet safety 2010 Internet safety 2010 Presentation Transcript

    • Technology Safety For All Nancy Gross website June 2010 http:// guest.portaportal.com/mrs_g
    • Web 2.0
      • Today’s Internet
      ikeepsafe.org
    • Common Sense
      • No matter what protections are put in place occasionally something inappropriate gets through or kids find a way to access it.
      • Let students know that Internet “accidents” happen rarely and let them know what to do if they see something they shouldn’t.
    • What to do…
      • Hit backspace key
      • Let an adult know
      • If the backspace doesn’t work (auto-loop) shut off the monitor and get an adult or shut off the computer.
    • Social Networking – User friendly website where people can post information about themselves.
      • Profile – Online description of the user. They are searchable and can be viewed by anyone if not protected.
    • FaceBook
      • Check your privacy settings
      • Remember if you are ‘friends’ with an individual under the age of 18, you as a teacher are required to report suspected abuse including bullying, underage drinking, and sexual or physical abuse.
    • Passwords
      • Pick a Safe Password
      • Make your password as long as possible .
      • Use as many different characters as possible
      • Do not use personal information .
      • Do not use words, geographical names, or biographical names that are listed in standard dictionaries .
      • Never use a password that is the same as your account number .
      • Do not use passwords that are easy to spot while you're typing them in . Passwords like 12345, qwerty (i.e., all keys right next to each other), or nnnnnn should be avoided.
      • Urge children to protect their passwords.
      • Disposable Email
      • Use a throw away email account when signing up for stuff on the web to avoid being swamped with junk mail.
      • Hotmail, Gmail, Yahoo
      • Don’t use your webserver email address ie: myfairpoint or surfglobal.
      • Don't put your full email address on a webpage because it can attract spam.
      • Learn some of the IM, Text, and Chat lingo that teens use.
      • chat room slang
      • Blog – A blog is a website, maintained by an individual, with regular entries of commentary, descriptions of events, or other material such as graphics or video.
      • Blogger.com
      • Twitter.com
      • Wiki - is a website that allows visitors to add, remove, edit and change content, typically without the need for individual registration. ( Wikipedia )
      • PBWorks
    • YouTube is a free video sharing website which lets users upload, view, and share video clips. Champ
      • Social Bookmarking : is a method for Internet users to store, organize, search, and manage bookmarks of web pages on the Internet.
      • Portaportal
      • delicious
      • Google Bookmarks
    • Avitars
      • a computer user's representation of himself or herself
      • buddy icons
    • Phishing - a criminal activity where Phishers attempt to fraudulently acquire sensitive information, such as user names, passwords and credit card details, by pretending to be a legitimate business. Typo-squatting – Typing an incorrect web address could lead users to an inappropriate site. (targets children)
    • A user ID or screen name is a “nickname” you select to identify yourself in e-mails, chats, etc . • Choose one that contains letters and numbers. • DO NOT USE personal information such as: -real first or last name -location (i.e. hilliegirl, HaverhillGuy) -zip code -family or friend names -a suggestive name or word (i.e. sexyman, hotbabygirl) Screen Names
    • " Tracking Teresa "
      • Phone Numbers
      • Never put your home phone number on an unsecured site.
      • http s
      • padlock icon
      • White pages – reverse phone search
    • Cell Phones
      • 13 WTHR Video Article
      • Bob Segall WTHR Indianapolis
      • November 13, 2008
      • Follow up story July 2, 2009 Protect Your Cell Phone
      • http://www.wthr.com/Global/story.asp?s=10603468
    • Cyber Predators Cyber Predators – online gaming new dangers
    • Cyber Predators
      • Computer Savy
      • College Grads
      • Successful Careers
      • Male
    • Predator Communication Tools
      • Chat rooms
      • Private chat
      • Instant messaging
      • E-mail
      • Phone
      • Texting
    • Predator Timeline
      • Identify similar interests
      • Build trust
      • Develop secrecy
      • Break down barriers
      • Make threats
      • Arrange Face-to-Face Meeting
    •  
    • Report Online Predators: Any type of threat of physical harm is illegal and must be reported. In Vermont call 802 – 652 – 6800 Internet Crimes Against Children
    • Sexting ABC News Clip Is against the law in Vermont (for all ages) to send or receive nude images of people under the age of 18. It is considered child pornography. Could be prosecuted, convicted and labeled as a sex offender even if a juvenile.
    • Cyber-Bullying
      • Happens on cell phones as well as online.
      • Students can be prosecuted for documented bullying.
      • Saved messages can be used as evidence.
      • Cyber-Bullies
    • Monitoring Tips
      • Check to see what the student has minimized to the bottom of their screen.
      • If a student has spent a bit of time on viewing or participating in inappropriate online activities, they won’t want to close out of what they are doing.
      • Check to see if a teen has simply shut off their computer monitor, but left the CPU running.
      • Check the Internet History (where have they been)
      • Children are becoming much more tech savvy at younger ages, so never assume they are too young to be involved in dangerous online activities.
      • Let children know that they can talk to you if they are feeling intimidated, frightened, or uncomfortable about something or someone they have encountered online.
    • Internet Safety Links
      • Visit my portaportal page to access links to the sites I used in this presentation.
      • http:// guest.portaportal.com/mrs_g