SlideShare a Scribd company logo
1 of 17
For the Internet Naïve… Internet Safety
Potential Pitfall #1 	Accessing sites with inappropriate materials
You viewed what? 	The internet is full of easy to access information of all types… … and the bad. the good…
You viewed what? 	Only search using trusted search engines and make sure that a link scanner is installed to identify harmful links.  Learn how to use the AVG Link Scanner. 	View this internet safety lesson.
Potential Pitfall #2 	Safety and privacy issues for students
You told who what? Rule Number 1: Nothing online is private Never give out personal information online Never post personal pictures you want to keep private. Never say anything online that you don’t want to be made public
Potential Pitfall #3 	Fraud on the Internet
You gave you password to who? If it sounds too good to be true, then it probably is Only purchase things from a trusted source with proper site security 	Read more frominternetsafetyrules.org
Potential Pitfall #4 	Computer virus and hacking
You opened what? Always keep your antivirus software up-to-date Never open an e-mail attachment or hyperlink unless you are expecting it Only download programs from trusted sites, such as download.com
Potential Pitfall #5 	Copyright and plagiarism issues
You got this information from where? It is illegal to copy and use anything online unless you have permission from the copyright holder View copyrightkids.org for more information
You got this information from where? Plagiarism reaches all levels.  Read this recent news article about Germany’s defense minister. View this slide show for more information on plagiarism.
You got this information from where? 	To find images that you can freely use, visit either commons.wikimedia.org or flickr.com
References Roblyer, M. D., & Doering, A. H. (2009). Integrating educational technology into teaching (5th ed.). Allyn & Bacon.  
Image References Links Privacy Icon: http://commons.wikimedia.org/wiki/File:Privacy_caution.svg Embarrassing Face: http://commons.wikimedia.org/wiki/File:Caught_in_street_photography_small.png Jet Powered Outhouse: http://commons.wikimedia.org/wiki/File:Jet_Powered_Outhouse.jpg HTTP Image: http://commons.wikimedia.org/wiki/File:HTTP.png Password: http://commons.wikimedia.org/wiki/File:Crystal_password.png Virus: http://commons.wikimedia.org/wiki/File:Cartoonvirus.jpg Copyright Question mark: http://commons.wikimedia.org/wiki/File:Questionmark_copyright.svg Copyright Problem: http://commons.wikimedia.org/wiki/File:Copyright-problem.svg
Image References Links Commons Logo: http://en.wikipedia.org/wiki/File:Commons-logo-en.svg Flickr Logo: http://commons.wikimedia.org/wiki/File:Flickr_wordmark.svg

More Related Content

What's hot

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
Quek Lilian
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Online privacy
Online privacyOnline privacy
Online privacy
jo-jo23
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
Ty122987
 

What's hot (17)

Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Online privacy
Online privacyOnline privacy
Online privacy
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 

Viewers also liked (9)

5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
Mobile Safety Solutions Compliance Management Suite System Overview
Mobile Safety Solutions Compliance Management Suite   System OverviewMobile Safety Solutions Compliance Management Suite   System Overview
Mobile Safety Solutions Compliance Management Suite System Overview
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Protecting Yourself
Protecting  YourselfProtecting  Yourself
Protecting Yourself
 
Printek Mobile Public Safety - Why Mobile Printing?
Printek Mobile Public Safety - Why Mobile Printing?Printek Mobile Public Safety - Why Mobile Printing?
Printek Mobile Public Safety - Why Mobile Printing?
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Internet Safety

cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 

Similar to Internet Safety (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
HECCTW11
HECCTW11HECCTW11
HECCTW11
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Users guide
Users guideUsers guide
Users guide
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
cyberbullying presentation by class 4 student
cyberbullying presentation by class 4 studentcyberbullying presentation by class 4 student
cyberbullying presentation by class 4 student
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Internet Safety

  • 1. For the Internet Naïve… Internet Safety
  • 2. Potential Pitfall #1 Accessing sites with inappropriate materials
  • 3. You viewed what? The internet is full of easy to access information of all types… … and the bad. the good…
  • 4. You viewed what? Only search using trusted search engines and make sure that a link scanner is installed to identify harmful links. Learn how to use the AVG Link Scanner. View this internet safety lesson.
  • 5. Potential Pitfall #2 Safety and privacy issues for students
  • 6. You told who what? Rule Number 1: Nothing online is private Never give out personal information online Never post personal pictures you want to keep private. Never say anything online that you don’t want to be made public
  • 7. Potential Pitfall #3 Fraud on the Internet
  • 8. You gave you password to who? If it sounds too good to be true, then it probably is Only purchase things from a trusted source with proper site security Read more frominternetsafetyrules.org
  • 9. Potential Pitfall #4 Computer virus and hacking
  • 10. You opened what? Always keep your antivirus software up-to-date Never open an e-mail attachment or hyperlink unless you are expecting it Only download programs from trusted sites, such as download.com
  • 11. Potential Pitfall #5 Copyright and plagiarism issues
  • 12. You got this information from where? It is illegal to copy and use anything online unless you have permission from the copyright holder View copyrightkids.org for more information
  • 13. You got this information from where? Plagiarism reaches all levels. Read this recent news article about Germany’s defense minister. View this slide show for more information on plagiarism.
  • 14. You got this information from where? To find images that you can freely use, visit either commons.wikimedia.org or flickr.com
  • 15. References Roblyer, M. D., & Doering, A. H. (2009). Integrating educational technology into teaching (5th ed.). Allyn & Bacon.  
  • 16. Image References Links Privacy Icon: http://commons.wikimedia.org/wiki/File:Privacy_caution.svg Embarrassing Face: http://commons.wikimedia.org/wiki/File:Caught_in_street_photography_small.png Jet Powered Outhouse: http://commons.wikimedia.org/wiki/File:Jet_Powered_Outhouse.jpg HTTP Image: http://commons.wikimedia.org/wiki/File:HTTP.png Password: http://commons.wikimedia.org/wiki/File:Crystal_password.png Virus: http://commons.wikimedia.org/wiki/File:Cartoonvirus.jpg Copyright Question mark: http://commons.wikimedia.org/wiki/File:Questionmark_copyright.svg Copyright Problem: http://commons.wikimedia.org/wiki/File:Copyright-problem.svg
  • 17. Image References Links Commons Logo: http://en.wikipedia.org/wiki/File:Commons-logo-en.svg Flickr Logo: http://commons.wikimedia.org/wiki/File:Flickr_wordmark.svg