Internet Safety


Published on

Student presentation on Internet Safety-
guidelines for security percautions with social networking websites, cyberbullying, sexting, and phishing scams.

Published in: Education
1 Comment
  • This is a presentation that we used with students last year in a general assembly. This year we are breaking it down into small parts for broadcasting.
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Cheating at school Riding home with a stranger
  • Should I go, not go? How will I get from location to another? Can my friend come too? I have homework…
  • Breathe!
  • Breathe!
  • Facebook will only investigate these applications if they receive complaints from users.
  • Put thinking cap back on and ask…. Questions students
  • Inappropriate things can be credit card information, passwords, identities, etc.
  • Inappropriate things can be credit card information, passwords, identities, etc.
  • Kerry Kujawa graduated from Austin High School in Sugar Land, Texas in 1998. His body was found, badly decomposed and unidentifiable, in a field on a remote ranch in April of 2000. Kerry had been having an online relationship with someone he thought to be a young woman under the screen name 'kelly_mc', meeting and communicating through an online chat room. Her real name was "Kelly McCauley", and seemed to be a nice pre-law student who was trapped in a destructive relationship. They seemed to grow closer and closer over the months, and eventually Kerry started to ask Kelly to meet face to face, so that he could help her. He apparently grew insistent on helping her, and on April 7th, 2000, Kerry left campus to meet her in San Antonio, telling friends that Kelly was having trouble with some guy and needed his help. A week or so later Kerry's family and friends received an email from Kerry saying that he was ok and would be staying with Kelly for a little longer. Online, Kelly had been telling others in the close-knit chat room that she and Kerry were engaged and would be getting married soon. A couple weeks later Kerry's friends started to worry about his continued absence from school and filed a missing-persons report. Kerry's online love interest, 'Kelly', was not who he or anybody else thought she was. By interviewing the members of the chat room, researching contact information, and carefully examining the computers Kerry had used, authorities determined that. 'Kelly' was actually 31 year-old, 6' 2" Kenny Wayne Lockwood, a former McDonald's assistant manager who lived with his parents in an upscale neighborhood in San Antonio. He had no felony convictions and described by one neighbor as being the "last [person one would assume] for being involved [in the murder]." Others neighbors described him as "quiet, a real computer geek." It would later come out that Lockwood had used the persona of 'Kelly' to talk with other young men in addition to Kerry, luring them with an appealing story and pictures of an attractive young woman to further the ploy. To conceal his identity, Lockwood met Kerry under the pretense of being Kelly's brother, then shot and killed him and disposed of his body. To delay the discovery of the murder, Lockwood sent the email pretending to be Kerry and continued to assume the persona of 'Kelly' in the chat room and furthering the story of the two supposedly in love. Kenny Wayne Lockwood was arrested in April of 2000 for the murder of Kerry Kujawa, and in October of 2000, he committed suicide while in police custody. When his friends talk about Kerry, they agree that he was not a soft hearted, idealistic, or romantic individual. He was a bright student, ranked high in the class, who took a challenging schedule of AP courses and participated in extra-curricular activities. He was a mechanical engineering honor student at Texas A&M University, and had a bright future. His mistake was trusting that a girl named “Kelly” was really who she said she was.
  • Breathe!
  • Girls and social network users are more likely to report it
  • What is it? Harrassment- repeated messages, vulgar or offensive in nature Impersonation- pretending to be someone else, Trickery- manipulating to reveal secrets or embarrassing moments Is it real? Results-
  • What is it? Harrassment- repeated messages, vulgar or offensive in nature Impersonation- pretending to be someone else, Trickery- manipulating to reveal secrets or embarrassing moments Is it real? Results-
  • What is it? Harrassment- repeated messages, vulgar or offensive in nature Impersonation- pretending to be someone else, Trickery- manipulating to reveal secrets or embarrassing moments Is it real? Results-
  • Internet Safety

    1. 1. Life in the Fast Lane- Survival in the Internet World Be Tech Savvy and a SAFE Teen
    2. 2. It Goes Without Saying?? <ul><ul><li>Where do </li></ul></ul><ul><li>you fit in? </li></ul>
    3. 3. Internet Communities different or the same? <ul><li>Same </li></ul><ul><ul><li>Purpose </li></ul></ul><ul><ul><li>Interests Related </li></ul></ul><ul><ul><li>Sense of Belonging </li></ul></ul><ul><ul><li>Fun & Exciting </li></ul></ul><ul><ul><li>Be Aware of Situations That Could Be Dangerous </li></ul></ul>
    4. 4. Internet Communities different or the same? <ul><li>Different </li></ul><ul><ul><li>Available 24/7 </li></ul></ul><ul><ul><li>Distributed world wide </li></ul></ul><ul><ul><li>Often irretrievable </li></ul></ul><ul><ul><li>Anonymous </li></ul></ul><ul><ul><li>Prey to Scams </li></ul></ul>Internet Communities different or the same?
    5. 5. <ul><ul><ul><li>Choices </li></ul></ul></ul><ul><ul><ul><ul><li>Involve THOUGHTFUL </li></ul></ul></ul></ul><ul><ul><ul><ul><li> decision making </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Multitasking </li></ul></ul></ul></ul><ul><ul><ul><ul><li>On the fly </li></ul></ul></ul></ul><ul><ul><ul><li>Consequences </li></ul></ul></ul>It Goes Without Saying?? Yes No?? Maybe… I Don’t Know…
    6. 6. It Goes Without Saying?? <ul><ul><ul><ul><li>TAKE TIME TO THINK! </li></ul></ul></ul></ul>Think B 4 U Click!
    7. 8. <ul><li>Social Networking Sites </li></ul><ul><ul><li>Facebook </li></ul></ul><ul><ul><li>Myspace </li></ul></ul><ul><ul><li>Many others </li></ul></ul><ul><li>Chat Rooms </li></ul><ul><li>Instant Messaging </li></ul><ul><li>Blogs/Wikis </li></ul><ul><li>Twitter </li></ul><ul><li>Exploring Websites </li></ul><ul><li>Video Sites </li></ul><ul><li>Game Stations </li></ul><ul><li>Shopping </li></ul><ul><li>Virtual Worlds </li></ul><ul><ul><li>Teen Second Life </li></ul></ul><ul><ul><li>Second Life </li></ul></ul>Online Includes
    8. 9. You could live your life on the computer! I don’t want to go to bed! Can I eat at the computer? Just awhile Longer!
    9. 10. It Goes Without Saying?? <ul><ul><ul><ul><li>Find a BALANCE </li></ul></ul></ul></ul>
    10. 11. <ul><li>The Good </li></ul><ul><li>The Bad </li></ul><ul><li>The Ugly </li></ul>Online Relationships
    11. 12. <ul><li>Keep personal contact information PERSONAL!! </li></ul><ul><li>Choose your screen name carefully </li></ul><ul><li>Blur or don’t fully reveal your face in photos </li></ul><ul><li>Be honest about your age- protections </li></ul><ul><li>Know who you are talking to </li></ul>Online Relationships
    12. 13. <ul><li>Don’t say or do things you wouldn’t want your coach, parents, school, or a employer to see </li></ul><ul><li>Know what is public and what is private </li></ul><ul><li>Know how to use the sites protective features (security settings) </li></ul>Online Relationships
    13. 14. Social Networking Sites
    14. 15. Social Networking
    15. 16. Protect yourself by changing the default settings….
    16. 19. MY SPACE Think B 4 U Click!
    17. 20. Applications <ul><li>Anyone can create and distribute applications </li></ul><ul><li>Apps are not verified or approved </li></ul><ul><li>Your information is downloaded to third-party servers. </li></ul>
    18. 21. Applications
    19. 22. Interactive Gaming <ul><li>99% boys & 94 % girls are gaming </li></ul><ul><li>It encourages </li></ul><ul><ul><li>coordination </li></ul></ul><ul><ul><li>problem solving </li></ul></ul><ul><ul><li>social interaction </li></ul></ul><ul><ul><li>competition </li></ul></ul>Gaming
    20. 23. Interactive Gaming <ul><li>Privacy precautions still apply </li></ul><ul><ul><li>Do not reveal personal information </li></ul></ul><ul><ul><li>Chatting capability quickly reveals age </li></ul></ul><ul><ul><li>Use a voice mask </li></ul></ul><ul><ul><li>Do not meet up with strangers </li></ul></ul>Online Interactive Gaming Think B 4 U Click!
    21. 24. Interactive Gaming <ul><li>Xbox® Live has a reporting feature that allows players to notify Microsoft when someone is disruptive, rude, or vulgar. </li></ul>Online Gaming
    22. 25. Online Interaction What is a stranger?
    23. 26. <ul><li>Definition - an individual that one is not acquainted with </li></ul><ul><li>32% of online teens have been contacted online by a complete stranger. </li></ul>Online Strangers….
    24. 27. <ul><li>Of teens who have been contacted , 23% say they were scared or uncomfortable </li></ul><ul><li>7% of online teens experienced disturbing stranger contact </li></ul>Online Strangers….
    25. 28. <ul><ul><li>If you… </li></ul></ul><ul><ul><li>Post photos </li></ul></ul><ul><ul><li>Have an open profile online </li></ul></ul><ul><ul><li>Flirt via social networks </li></ul></ul><ul><ul><li>You’re inviting danger! </li></ul></ul>Are you inviting strangers when you are online?
    26. 29. The Manipulating Mind of a Predator
    27. 30. <ul><li>Identify Similar Interests </li></ul><ul><li>Gains your trust by always taking their side </li></ul><ul><li>Keeps your secrets and asks the child to keep their secrets </li></ul><ul><li>May slowly introduce you to inappropriate things telling you </li></ul><ul><li>it is OK </li></ul>The Grooming Process
    28. 31. <ul><li>Become your new best friend </li></ul><ul><li>Isolates you from any other friends </li></ul><ul><li>Presents themselves as the best person in your life </li></ul>The Grooming Process Julie’s Story
    29. 32. Once A Stranger NOW a FRIEND??
    30. 33. <ul><li>Kerry Kujawa – Austin HS Class of 1998 </li></ul><ul><li>Spencer Vogt - Katy HS </li></ul><ul><li>Class of 2009 </li></ul>Never Reveal Close to Home
    31. 34. It Goes Without Saying?? <ul><ul><ul><ul><li>TAKE TIME TO THINK! </li></ul></ul></ul></ul>Think B 4 U Click!
    32. 35. <ul><li>Full Name </li></ul><ul><li>Address </li></ul><ul><li>School </li></ul><ul><li>Phone numbers </li></ul><ul><li>Age/Birthdate </li></ul>Never Reveal Never Reveal <ul><li>Passwords </li></ul><ul><li>Social Security # </li></ul><ul><li>Financial info </li></ul>Think B 4 U Click!
    33. 36. <ul><li>Stay away from people or sites that persuade you to do something you know is wrong! </li></ul><ul><ul><li>Pro anorexia or pro-bulimia </li></ul></ul><ul><ul><li>Pro steroid use </li></ul></ul><ul><ul><li>???? </li></ul></ul>Think B 4 U Click! Protect Yourself
    34. 38. Net Bullies
    35. 39. <ul><li>32% of online teens have experienced one of the following forms of online harassment, also called “cyber bullying” </li></ul>Cyber Bullies
    36. 40. Cyber Bulling <ul><li>Cruel behavior </li></ul><ul><ul><li>One-on-one or social groups </li></ul></ul><ul><ul><li>Cyber stalking </li></ul></ul><ul><ul><ul><li>Hurtful </li></ul></ul></ul><ul><ul><ul><li>Threats </li></ul></ul></ul><ul><ul><ul><li>Aggressive </li></ul></ul></ul>
    37. 41. Cyber Bulling <ul><ul><li>Online ‘fighting’ </li></ul></ul><ul><ul><li>Harassment </li></ul></ul><ul><ul><li>Impersonation </li></ul></ul><ul><ul><li>Trickery </li></ul></ul>
    38. 42. What NOT To Do <ul><li>Do not </li></ul><ul><ul><li>Retaliate </li></ul></ul><ul><ul><li>Think it is your fault </li></ul></ul><ul><ul><li>Keep it to yourself </li></ul></ul><ul><ul><li>Skip school or activities </li></ul></ul><ul><ul><li>Hurt yourself </li></ul></ul>
    39. 43. What You CAN Do <ul><li>Ignore the messages but save the evidence </li></ul><ul><li>Step away from the situation </li></ul><ul><ul><ul><li>Exercise </li></ul></ul></ul><ul><ul><ul><li>Shoot hoops </li></ul></ul></ul><ul><ul><ul><li>Call a friend </li></ul></ul></ul><ul><ul><ul><li>Watch TV </li></ul></ul></ul><ul><ul><ul><li>Play a game </li></ul></ul></ul>
    40. 44. What You CAN Do <ul><li>Identify the bully </li></ul><ul><li>Tell them to stop </li></ul><ul><li>Block the messages </li></ul><ul><li>Contact an adult </li></ul><ul><li>Join some group activities </li></ul>
    41. 45. Cyber Citizenship Martin Luther King, Jr. once said “In the end, we will remember not the words of our enemies, but the silence of our friends.”  
    42. 46. Cell Phones & Texting <ul><li>Restrict your phone number to those you know </li></ul><ul><li>Don’t give another person’s phone number out unless you ask them </li></ul><ul><li>Don’t answer text messages from unknowns </li></ul>
    43. 47. Cell Phones & Texting <ul><li>Know how to block calls or messages </li></ul><ul><li>Ask permission to take pictures </li></ul>Think B 4 U Click!
    44. 48. Sexting <ul><li>Can it be retreived? </li></ul><ul><li>Child Pornography? </li></ul><ul><li>Punishable by law? </li></ul><ul><li>Think about consequences </li></ul>Think B 4 U Click!
    45. 49. Sexting- What To Do or Not Do <ul><li>Don’t take them! </li></ul><ul><li>Don’t spread them! </li></ul><ul><li>Protect yourself- report received images to an adult </li></ul>Think B 4 U Click!
    46. 50. Cool Today…But Not Tomorrow <ul><li>Don’t give into to peer pressure </li></ul><ul><li>Acting “Cool” could produce a picture, video, message, or consequence that may not go away! </li></ul>Think B 4 U Click!
    47. 51. <ul><ul><ul><ul><li>TAKE TIME TO THINK! </li></ul></ul></ul></ul>Think B 4 U Click! Cool Today…But Not Tomorrow
    48. 52. Phishing Schemes… <ul><li>Criminals use email to steal personal information </li></ul><ul><li>Phishing scams want your identity or money </li></ul><ul><li>May look very official </li></ul>
    49. 53. Phishing Schemes… <ul><li>Requests may ask for: </li></ul><ul><ul><li>Credit card numbers </li></ul></ul><ul><ul><li>Bank account numbers </li></ul></ul><ul><ul><li>Address or more </li></ul></ul><ul><ul><li>Sell you something (medicine men) </li></ul></ul>
    50. 54. <ul><li>Recently there have been a large number of identity theft attempts targeting Citibank customers. In order to safeguard your account, we require that you update your Citibank ATM/Debit card PIN. This update is requested of you as a precautionary measure against fraud. Please note that we have no particular indications that your details have been compromised in any way. </li></ul><ul><li>This process is mandatory, and if not completed within the nearest time your account may be subject to temporary suspension. To securely update your Citibank ATM/Debit card PIN please go to: Please note that this update applies to your Citibank ATM/Debit card - which is linked directly to your checking account, not Citibank credit cards . Thank you for your prompt attention to this matter and thank you for using Citibank! Regards, Riley Buckner Head of Citi® Identity Theft Solutions </li></ul>Citibank
    51. 55. The scam window is actually placed on top of an authentic Citibank website.
    52. 56. Phishing Scheme <ul><li>Banks and credit card companies will not request this information via email </li></ul><ul><li>They already have it! </li></ul>
    53. 57. Protect Yourself From Phishing Scheme <ul><li>Do not reply </li></ul><ul><li>Do not open attachments </li></ul><ul><li>Do not click on any links </li></ul><ul><li>Report it to the bank, credit card company, or organization </li></ul>
    54. 58. <ul><li>It may feel private… </li></ul>Public or Private? But it’s like a party in a house with glass walls… You don’t know who might be looking in.
    55. 59. <ul><li> </li></ul><ul><li>http:// / </li></ul><ul><li> 4/29/08 </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>http:// </li></ul>References
    56. 60. References <ul><li>http:// /documents/ </li></ul><ul><li> </li></ul><ul><li>http:// / </li></ul><ul><li>NECC Internet Safety Town Hall 063008nn[1].ppt </li></ul><ul><li>Internet Safety-A Westport Public Schools Presentation (1/2009) </li></ul><ul><li>http:// </li></ul><ul><li>http:// (Kim Komando Daily Tip, March 9, 2009) </li></ul><ul><li> </li></ul>References