SlideShare a Scribd company logo
1 of 22
Cyber Awareness
We are becoming Connected Kids WHY? HOW? WHEN?
Most of your Internet use happens at home. You may... · have access to the Internet at home. ·have your own computer.  ·use instant messaging. · download and listen to music. ·play online games. ·do homework online.
Information online can be helpful, educational, and a valuable resource. How ever ; if you are not  Cyber Safe , you run the risk of: ·being bullied ·being threatened and/or hurt ·loosing your identity ·being put in danger · being accused of something you didn't do
CYBER SAFETY RULES Top 5
Rule #1 Be sure to have your computer in a place where Mom, Dad, or your guardian can see what is on your computer screen.
Kitchen Girl's bedroom Boy's bedroom Parent's bedroom Family Room Computer Room Activity x x x
We need to be critical thinking about “text” in all its forms, including: television, movies, video games, music, magazines, advertising and the Internet   What does "think critically" mean? Rule #2  We need to “think critically” about all we see, read, and do on the Internet. ? ? ? ?
We need to think critically about what we put on the Internet...
We need to think critically about the advertisements we see on the Internet. We need to “read between the lines” of  advertising. We need to recognize when websites are trying to get personal information.
We need to think critically about what we see on the Internet. Is this picture for real?
Can we tell the difference between… fantasy and reality? · We should not always believe what we read or see on the Internet. · If you are unsure about something you read or see, you need to ask questions.
You should never give or put your personal information on the web.  Rule #3
Have you seen a site like this before? Do you really think you will be the BIG winner?
What is the problem with this webpage? Is she being safe?
Instead of putting your name on the Internet, always use a  nickname  that does not mean anything. Very similar to a password...
Rule #4 Always choose a strong password. The use of a bad password may allow  someone to use your account  and then they are able to, modify, corrupt or  destroy any of your files or pretend they are you!
Be aware of Hackers They want your identity! A good password:   · is not a word, or name that can be found in any dictionary  · is private (it is used and known by one person only)  · is secret and is not left lying around, or on a piece of paper found near the computer. · Combine letters, numbers, and symbols  · Make it at least 6 characters long · Does not describe you or anything about you Remember :  Even if you use very good passwords you should change your passwords from time to time (at least twice a year).
Password Activity Use a highlighter to show the good passwords and a marker to hide the bad passwords. Circle the BEST password Bigreddog3a password 123 Pizza1Icecream2Hockey3 school dog cat Skunks_smell_funny4
ANSWERS Bigreddog3a password 123 Pizza1Icecream2Hockey3 school dog cat Skunks_smell_funny4
Rule # 5 Always tell a parent or a teacher if you feel that something is not right on the Internet
Using common sense is your best tool. · When in doubt, doubt! ·Double-check your facts ·Trust your instincts · Ask a parent or teacher for advice Be Cyber Safe!

More Related Content

What's hot

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Parenting teens in a technology age
Parenting teens in a technology ageParenting teens in a technology age
Parenting teens in a technology agejcallis06
 
Netiquette By S Brown At Bbe
Netiquette By S Brown At BbeNetiquette By S Brown At Bbe
Netiquette By S Brown At Bbecynthia.warner
 
Griffin Been technology Report
Griffin Been technology ReportGriffin Been technology Report
Griffin Been technology ReportMarq2014
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassieJill Stassie
 
Be Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum ResultsBe Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum ResultsGeorge Hutton
 
Netiquette, Copyright and Plagiarism!
Netiquette, Copyright and Plagiarism!Netiquette, Copyright and Plagiarism!
Netiquette, Copyright and Plagiarism!LiviJayy
 
Netiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & CopyrightNetiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & Copyrightrickyswervin
 
G3 Respect And Cyberbullying
G3 Respect And CyberbullyingG3 Respect And Cyberbullying
G3 Respect And CyberbullyingWeng Sison
 
21 Profitable Blog Post & Article Ideas
21 Profitable Blog Post & Article Ideas21 Profitable Blog Post & Article Ideas
21 Profitable Blog Post & Article IdeasJeff Herring
 

What's hot (20)

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Parenting teens in a technology age
Parenting teens in a technology ageParenting teens in a technology age
Parenting teens in a technology age
 
Netiquette By S Brown At Bbe
Netiquette By S Brown At BbeNetiquette By S Brown At Bbe
Netiquette By S Brown At Bbe
 
Samig
SamigSamig
Samig
 
Teens on the net
Teens on the netTeens on the net
Teens on the net
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Shelby's i safe ppt
Shelby's i safe pptShelby's i safe ppt
Shelby's i safe ppt
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Griffin Been technology Report
Griffin Been technology ReportGriffin Been technology Report
Griffin Been technology Report
 
Arnezsolomon ar
Arnezsolomon arArnezsolomon ar
Arnezsolomon ar
 
Netiquette stassie
Netiquette stassieNetiquette stassie
Netiquette stassie
 
Be Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum ResultsBe Open To All Feedback For Maximum Results
Be Open To All Feedback For Maximum Results
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Netiquette, Copyright and Plagiarism!
Netiquette, Copyright and Plagiarism!Netiquette, Copyright and Plagiarism!
Netiquette, Copyright and Plagiarism!
 
Netiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & CopyrightNetiquette, Plagiarism, & Copyright
Netiquette, Plagiarism, & Copyright
 
Netiquette Ned
Netiquette NedNetiquette Ned
Netiquette Ned
 
G3 Respect And Cyberbullying
G3 Respect And CyberbullyingG3 Respect And Cyberbullying
G3 Respect And Cyberbullying
 
Entrees
EntreesEntrees
Entrees
 
21 Profitable Blog Post & Article Ideas
21 Profitable Blog Post & Article Ideas21 Profitable Blog Post & Article Ideas
21 Profitable Blog Post & Article Ideas
 

Viewers also liked

The Value of Numbers (Visualizing Data In Your Next Presentation)
The Value of Numbers (Visualizing Data In Your Next Presentation)The Value of Numbers (Visualizing Data In Your Next Presentation)
The Value of Numbers (Visualizing Data In Your Next Presentation)Ethos3
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Viewers also liked (7)

The Value of Numbers (Visualizing Data In Your Next Presentation)
The Value of Numbers (Visualizing Data In Your Next Presentation)The Value of Numbers (Visualizing Data In Your Next Presentation)
The Value of Numbers (Visualizing Data In Your Next Presentation)
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar to 2008 Cyber Safety

Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit pptapieper
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital CitizenshipAnja Junginger
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th gradeBelinda Larson
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspaceJanealW
 
empowerment technology Pongyan*Agravante
empowerment technology Pongyan*Agravanteempowerment technology Pongyan*Agravante
empowerment technology Pongyan*Agravanteadrianpongyan
 
Digital literacy
Digital literacyDigital literacy
Digital literacyAmanda lee
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Internet safety tips for kids
Internet safety tips for kidsInternet safety tips for kids
Internet safety tips for kidsEduwizards
 
5b Digital Citizenship 1
5b Digital Citizenship 15b Digital Citizenship 1
5b Digital Citizenship 1Anja Junginger
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenshipcrosbye
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1sabrinacotta
 

Similar to 2008 Cyber Safety (20)

Personal safety gr5 unit ppt
Personal safety gr5 unit pptPersonal safety gr5 unit ppt
Personal safety gr5 unit ppt
 
Online privacy
Online privacyOnline privacy
Online privacy
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Safety in cyberspace
Safety in cyberspaceSafety in cyberspace
Safety in cyberspace
 
empowerment technology Pongyan*Agravante
empowerment technology Pongyan*Agravanteempowerment technology Pongyan*Agravante
empowerment technology Pongyan*Agravante
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Heads up!
Heads up!Heads up!
Heads up!
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Internet safety
Internet safetyInternet safety
Internet safety
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Riverview
RiverviewRiverview
Riverview
 
Internet safety tips for kids
Internet safety tips for kidsInternet safety tips for kids
Internet safety tips for kids
 
5b Digital Citizenship 1
5b Digital Citizenship 15b Digital Citizenship 1
5b Digital Citizenship 1
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
10things
10things10things
10things
 

2008 Cyber Safety

  • 2. We are becoming Connected Kids WHY? HOW? WHEN?
  • 3. Most of your Internet use happens at home. You may... · have access to the Internet at home. ·have your own computer. ·use instant messaging. · download and listen to music. ·play online games. ·do homework online.
  • 4. Information online can be helpful, educational, and a valuable resource. How ever ; if you are not Cyber Safe , you run the risk of: ·being bullied ·being threatened and/or hurt ·loosing your identity ·being put in danger · being accused of something you didn't do
  • 6. Rule #1 Be sure to have your computer in a place where Mom, Dad, or your guardian can see what is on your computer screen.
  • 7. Kitchen Girl's bedroom Boy's bedroom Parent's bedroom Family Room Computer Room Activity x x x
  • 8. We need to be critical thinking about “text” in all its forms, including: television, movies, video games, music, magazines, advertising and the Internet What does "think critically" mean? Rule #2 We need to “think critically” about all we see, read, and do on the Internet. ? ? ? ?
  • 9. We need to think critically about what we put on the Internet...
  • 10. We need to think critically about the advertisements we see on the Internet. We need to “read between the lines” of advertising. We need to recognize when websites are trying to get personal information.
  • 11. We need to think critically about what we see on the Internet. Is this picture for real?
  • 12. Can we tell the difference between… fantasy and reality? · We should not always believe what we read or see on the Internet. · If you are unsure about something you read or see, you need to ask questions.
  • 13. You should never give or put your personal information on the web. Rule #3
  • 14. Have you seen a site like this before? Do you really think you will be the BIG winner?
  • 15. What is the problem with this webpage? Is she being safe?
  • 16. Instead of putting your name on the Internet, always use a nickname that does not mean anything. Very similar to a password...
  • 17. Rule #4 Always choose a strong password. The use of a bad password may allow someone to use your account and then they are able to, modify, corrupt or destroy any of your files or pretend they are you!
  • 18. Be aware of Hackers They want your identity! A good password: · is not a word, or name that can be found in any dictionary · is private (it is used and known by one person only) · is secret and is not left lying around, or on a piece of paper found near the computer. · Combine letters, numbers, and symbols · Make it at least 6 characters long · Does not describe you or anything about you Remember : Even if you use very good passwords you should change your passwords from time to time (at least twice a year).
  • 19. Password Activity Use a highlighter to show the good passwords and a marker to hide the bad passwords. Circle the BEST password Bigreddog3a password 123 Pizza1Icecream2Hockey3 school dog cat Skunks_smell_funny4
  • 20. ANSWERS Bigreddog3a password 123 Pizza1Icecream2Hockey3 school dog cat Skunks_smell_funny4
  • 21. Rule # 5 Always tell a parent or a teacher if you feel that something is not right on the Internet
  • 22. Using common sense is your best tool. · When in doubt, doubt! ·Double-check your facts ·Trust your instincts · Ask a parent or teacher for advice Be Cyber Safe!