Internet safety 2010


Published on

Technology Institute cyber safety presentation.

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Internet safety 2010

  1. 1. Technology Safety For All Nancy Gross website June 2010 http://
  2. 2. Web 2.0 <ul><li>Today’s Internet </li></ul>
  3. 3. Common Sense <ul><li>No matter what protections are put in place occasionally something inappropriate gets through or kids find a way to access it. </li></ul><ul><li>Let students know that Internet “accidents” happen rarely and let them know what to do if they see something they shouldn’t. </li></ul>
  4. 4. What to do… <ul><li>Hit backspace key </li></ul><ul><li>Let an adult know </li></ul><ul><li>If the backspace doesn’t work (auto-loop) shut off the monitor and get an adult or shut off the computer. </li></ul>
  5. 5. Social Networking – User friendly website where people can post information about themselves.
  6. 6. <ul><li>Profile – Online description of the user. They are searchable and can be viewed by anyone if not protected. </li></ul>
  7. 7. FaceBook <ul><li>Check your privacy settings </li></ul><ul><li>Remember if you are ‘friends’ with an individual under the age of 18, you as a teacher are required to report suspected abuse including bullying, underage drinking, and sexual or physical abuse. </li></ul>
  8. 8. Passwords <ul><li>Pick a Safe Password </li></ul><ul><li>Make your password as long as possible . </li></ul><ul><li>Use as many different characters as possible </li></ul><ul><li>Do not use personal information . </li></ul><ul><li>Do not use words, geographical names, or biographical names that are listed in standard dictionaries . </li></ul><ul><li>Never use a password that is the same as your account number . </li></ul><ul><li>Do not use passwords that are easy to spot while you're typing them in . Passwords like 12345, qwerty (i.e., all keys right next to each other), or nnnnnn should be avoided. </li></ul><ul><li>Urge children to protect their passwords. </li></ul>
  9. 9. <ul><li>Disposable Email </li></ul><ul><li>Use a throw away email account when signing up for stuff on the web to avoid being swamped with junk mail. </li></ul><ul><li>Hotmail, Gmail, Yahoo </li></ul><ul><li>Don’t use your webserver email address ie: myfairpoint or surfglobal. </li></ul><ul><li>Don't put your full email address on a webpage because it can attract spam. </li></ul>
  10. 10. <ul><li>Learn some of the IM, Text, and Chat lingo that teens use. </li></ul><ul><li>chat room slang </li></ul>
  11. 11. <ul><li>Blog – A blog is a website, maintained by an individual, with regular entries of commentary, descriptions of events, or other material such as graphics or video. </li></ul><ul><li> </li></ul><ul><li> </li></ul>
  12. 12. <ul><li>Wiki - is a website that allows visitors to add, remove, edit and change content, typically without the need for individual registration. ( Wikipedia ) </li></ul><ul><li>PBWorks </li></ul>
  13. 13. YouTube is a free video sharing website which lets users upload, view, and share video clips. Champ
  14. 14. <ul><li>Social Bookmarking : is a method for Internet users to store, organize, search, and manage bookmarks of web pages on the Internet. </li></ul><ul><li>Portaportal </li></ul><ul><li>delicious </li></ul><ul><li>Google Bookmarks </li></ul>
  15. 15. Avitars <ul><li>a computer user's representation of himself or herself </li></ul><ul><li>buddy icons </li></ul>
  16. 16. Phishing - a criminal activity where Phishers attempt to fraudulently acquire sensitive information, such as user names, passwords and credit card details, by pretending to be a legitimate business. Typo-squatting – Typing an incorrect web address could lead users to an inappropriate site. (targets children)
  17. 17. A user ID or screen name is a “nickname” you select to identify yourself in e-mails, chats, etc . • Choose one that contains letters and numbers. • DO NOT USE personal information such as: -real first or last name -location (i.e. hilliegirl, HaverhillGuy) -zip code -family or friend names -a suggestive name or word (i.e. sexyman, hotbabygirl) Screen Names
  18. 18. &quot; Tracking Teresa &quot;
  19. 19. <ul><li>Phone Numbers </li></ul><ul><li>Never put your home phone number on an unsecured site. </li></ul><ul><li>http s </li></ul><ul><li>padlock icon </li></ul><ul><li>White pages – reverse phone search </li></ul>
  20. 20. Cell Phones <ul><li>13 WTHR Video Article </li></ul><ul><li>Bob Segall WTHR Indianapolis </li></ul><ul><li>November 13, 2008 </li></ul><ul><li>Follow up story July 2, 2009 Protect Your Cell Phone </li></ul><ul><li> </li></ul>
  21. 21. Cyber Predators Cyber Predators – online gaming new dangers
  22. 22. Cyber Predators <ul><li>Computer Savy </li></ul><ul><li>College Grads </li></ul><ul><li>Successful Careers </li></ul><ul><li>Male </li></ul>
  23. 23. Predator Communication Tools <ul><li>Chat rooms </li></ul><ul><li>Private chat </li></ul><ul><li>Instant messaging </li></ul><ul><li>E-mail </li></ul><ul><li>Phone </li></ul><ul><li>Texting </li></ul>
  24. 24. Predator Timeline <ul><li>Identify similar interests </li></ul><ul><li>Build trust </li></ul><ul><li>Develop secrecy </li></ul><ul><li>Break down barriers </li></ul><ul><li>Make threats </li></ul><ul><li>Arrange Face-to-Face Meeting </li></ul>
  25. 26. Report Online Predators: Any type of threat of physical harm is illegal and must be reported. In Vermont call 802 – 652 – 6800 Internet Crimes Against Children
  26. 27. Sexting ABC News Clip Is against the law in Vermont (for all ages) to send or receive nude images of people under the age of 18. It is considered child pornography. Could be prosecuted, convicted and labeled as a sex offender even if a juvenile.
  27. 28. Cyber-Bullying <ul><li>Happens on cell phones as well as online. </li></ul><ul><li>Students can be prosecuted for documented bullying. </li></ul><ul><li>Saved messages can be used as evidence. </li></ul><ul><li>Cyber-Bullies </li></ul>
  28. 29. Monitoring Tips <ul><li>Check to see what the student has minimized to the bottom of their screen. </li></ul><ul><li>If a student has spent a bit of time on viewing or participating in inappropriate online activities, they won’t want to close out of what they are doing. </li></ul>
  29. 30. <ul><li>Check to see if a teen has simply shut off their computer monitor, but left the CPU running. </li></ul><ul><li>Check the Internet History (where have they been) </li></ul>
  30. 31. <ul><li>Children are becoming much more tech savvy at younger ages, so never assume they are too young to be involved in dangerous online activities. </li></ul>
  31. 32. <ul><li>Let children know that they can talk to you if they are feeling intimidated, frightened, or uncomfortable about something or someone they have encountered online. </li></ul>
  32. 33. Internet Safety Links <ul><li>Visit my portaportal page to access links to the sites I used in this presentation. </li></ul><ul><li>http:// </li></ul>