Internet safety slides

1,260 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,260
On SlideShare
0
From Embeds
0
Number of Embeds
14
Actions
Shares
0
Downloads
14
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • \n
  • \n
  • 6 things\n
  • \n
  • In an interview with the Harvard admissions committee, what could you show them online?\n
  • Think of every web service you use, or are associated with.\nWhat is there?\nPictures? Video? Poetry? Stories? Reflections on life?\n
  • \n
  • For college and for jobs\n
  • but given this need to be online today: BE CAREFUL\n
  • 82% of 16—18 year-olds use FB daily\n
  • There is NO privacy on the internet.\nWhat’s there is there forever\n
  • NEVER your Social Security number\nBeware that cookies store information and share it automatically w/ websites you visit\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • All email on campus is currently stored on a computer by the Learning Center, and could be pulled up if necessary\n
  • \n
  • \n
  • \n
  • \n
  • and don’t SHARE passwords \ndon’t USE passWORDS\n
  • \n
  • \n
  • \n
  • Look how easy that is to remember?\ncapital letter, three special characters: spaces and ?\nOne word not even in a dictionary\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Bernal Heights Library\n
  • \n
  • Do NOT have your computer save passwords\n
  • \n
  • 70% of current computer users worldwide have been hacked or phished\n
  • More likely to be hit by lightning, or affected by a computer security problem?\n70% of computer users have been hacked, phished, or the victim of a virus — compared to 0.000102% chance of being struck by lightning?\nSomeone on campus was phished in mid-October\n
  • \n
  • \n
  • \n
  • Most materials for identity theft are stolen from trash cans\n
  • \n
  • How do you protect yourself?\n
  • FIRST: Don’t be a bully — Most bullies were victims\nLet’s talk about what bullying is before going further\n
  • \n
  • do not SHARE passwords either\n
  • Anger, revenge, frustration\nEntertainment; bored, laughs, to get a reaction, \nBolster or remind ppl of their social standing \nSometimes by accident\n
  • \n
  • \n
  • STICK UP FOR EACH OTHER — don’t tolerate bad behavior\n
  • \n
  • \n
  • Not much harm that a predator can do to you like this\nit’s when you meet IRL …\nIt’s not all men ...\n
  • who are predators looking for?\n
  • Predators and trolls like to hang out in certain places\nIf you avoid those places, you reduce your exposure to bad guys\n
  • \n
  • Stick to Stumbleupon or Reddit\n
  • \n
  • In an interview with the Harvard admissions committee, what could you show them online?\n
  • \n
  • “Her offense: Posting on Facebook a photograph of herself posing with a human placenta in class.”\n
  • \n
  • Sent racist and violent (KKK-style) tweets to best player on opposing soccer team\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Scheduled for same day as Omaha, NB teen shot principal & assistant principal\n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Internet safety slides

    1. 1. Internet Safety Mr Eric Castro
    2. 2. Tell a neighbor: What do you remember from your grammar school internet safety presentations?
    3. 3. Create a Positive Digital Footprint Protect Your PrivacyProtect Yourself from Identity Theft Protect Yourself from Bullies Protect Yourself from Predators Protect Yourself from Yourself
    4. 4. Create a PositiveDigital Footprint 1
    5. 5. Tell a neighbor: What are you mostproud of having produced or created that’s online?
    6. 6. Our digital footprintis the evidence of ouronline activities.
    7. 7. You want to leave positivedigital footprints. Lost by Stephen Nicholas
    8. 8. The New Yorker, 3/22/2010
    9. 9. Protect Your Privacy 2
    10. 10. 1) Do not inadvertently reveal personal information online
    11. 11. Block cookies
    12. 12. 2) Keep a “clean” email account
    13. 13. 3) Realize that you may be monitored
    14. 14. 4) Do not reply to spammers, ever
    15. 15. 5) Be conscious of web security
    16. 16. Passwords
    17. 17. Use a different secure passphrase for each site
    18. 18. • Passphrases are more secure than passwords• Passphrases are easier to remember than passwords• Use as many different characters as possible• Do not use personal information
    19. 19. Come up with a short sentence that is easy to remember Add one extra variable
    20. 20. Come up with a short sentence that is easy to remember Puss in Boots was a bad movie Add one extra variable Puss in Boots sux0rs Hated Puss in Boots! Refund 4 Puss in Boots?
    21. 21. Encryption
    22. 22. http://https://
    23. 23. 6) Be conscious of security on shared computers
    24. 24. 7) Be conscious of home computer security
    25. 25. Protect Yourself from Identity Theft 3
    26. 26. Raise your hand: Has anyone that you know had their identity stolen?
    27. 27. IS FROM OUR TECHNICALT HIS MESSAGESU PPORT TEAM tomatically by t he computer.This me ssage is sent au is message it m eans that yourIf you are receiving th ctivation; this dress has been queued for dea email ad script (code: a result of a co ntinuous error was as ess. Click here receiving from this email addr 505) lve this problem l out the requir ed field to reso and fil y ignoring this Not e: Failure to res et your email b wrong informa tion will result messa ge or inputting tivation of this email address to instant deac
    28. 28. To o M uc hC re d it b yA nd re sR ue da
    29. 29. It’s not about cash ... To o M uc it’s about hC re d it b yA nd debt re sR ue da
    30. 30. • Destroy private records and statements• Secure your snail mail• Safeguard your Social Security number• Don’t leave a paper trail• Monitor your credit report• Review credit card statements carefully
    31. 31. Protect Yourself from Bullies 4
    32. 32. First ...
    33. 33. First ...Change Begins Here by Trista Emlet
    34. 34. What exactly iscyberbullying?
    35. 35. • IM/ Text • Interactive gaming harassment • Malicious code• Stealing passwords • Sending porn or• Blogs junk email• Web sites • Impersonation• Sending pictures • Cyberbullying by through email & proxy cell phones• Internet polling
    36. 36. Why cyberbully?
    37. 37. What to do
    38. 38. • Don’t bully• Don’t reciprocate• Save evidence• Tell a trusted adult
    39. 39. King on the march to Montgomery by Eliel Johnson
    40. 40. “In the end, we will remember not the words of our enemies, but the silence of our friends.” King on the march to Montgomery by Eliel Johnson
    41. 41. Protect Yourself from Predators 5
    42. 42. http://i.imgur.com/cbRmA.jpg
    43. 43. Emotionally vulnerable Seeking attention Seeking affection Seeking validation
    44. 44. Chatroulette
    45. 45. Protect Yourself from Yourself 6
    46. 46. Tell a neighbor: What is the leastintelligent thing that you’ve seen someone else put online?
    47. 47. http://failbook.failblog.org
    48. 48. http://failbook.failblog.org
    49. 49. http://failbook.failblog.org
    50. 50. e to his alleg ed attackerRocque pos ted a messagsaying th ey are done. ages can escal ate quickly.Police say such mess the Internet and they are "If a young person is on g in nature, ments that a re threatenin mak ing com e cou ld be looking at ey need to realize w ation because th harges, unwa rranted retali criminal c well as ha mpering an their comments as Sgt. Kelly of olice investig ation," said ongoing p au, school res ource officer. Rosn
    51. 51. What to do?
    52. 52. • Remain alert• Keep a low profile• Trust your instincts
    53. 53. Control your information
    54. 54. Control your information
    55. 55. Be smart

    ×