SlideShare a Scribd company logo
1 of 27
Internet Safety A Christian Perceptive Philippians 4:13 "I can do all things  through Christ who strengthens me."
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
There is always a risk in meeting an online friend. People aren’t always who or what they claim to be .
[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
* Frank – Mark – Valleyguy …... Arrested  and sentenced to prison for 1 ½ years. Photo of Frank by  Bob Child,  Associated Press Both photos published in People Magazine,  May 29 th , 2000
Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting X X X X X X
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Teens Presentation
Teens PresentationTeens Presentation
Teens Presentationsharon7111
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Faiza Ahmed PP Quiz
Faiza Ahmed PP QuizFaiza Ahmed PP Quiz
Faiza Ahmed PP Quiztonybattista
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingst josephs
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Emily Slocombe E-Safty Quiz
Emily Slocombe E-Safty QuizEmily Slocombe E-Safty Quiz
Emily Slocombe E-Safty Quiztonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiztonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiztonybattista
 

What's hot (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Teens Presentation
Teens PresentationTeens Presentation
Teens Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Test
TestTest
Test
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Faiza Ahmed PP Quiz
Faiza Ahmed PP QuizFaiza Ahmed PP Quiz
Faiza Ahmed PP Quiz
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Emily Slocombe E-Safty Quiz
Emily Slocombe E-Safty QuizEmily Slocombe E-Safty Quiz
Emily Slocombe E-Safty Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 

Viewers also liked

Spectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the WorldSpectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the WorldKB Enterprises LLC
 
E³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro EE³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro Eguest2ef4ed
 
Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?Ingria. Technopark St. Petersburg
 
телемаркетинг Commerce Ver.
телемаркетинг   Commerce Ver.телемаркетинг   Commerce Ver.
телемаркетинг Commerce Ver.Nikolay Surtsukov
 
Pro Keynote 4
Pro Keynote 4Pro Keynote 4
Pro Keynote 4beerguy
 
himno nacional del Ecuador
himno nacional del Ecuadorhimno nacional del Ecuador
himno nacional del Ecuadorguest0e53baa2
 
Thematic Unit Story Board
Thematic Unit Story BoardThematic Unit Story Board
Thematic Unit Story BoardAmcconnell
 
Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012Smithsonian Libraries
 
Food, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity StudioFood, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity StudioBiocity Studio
 
EPiServer CMS 6 UI
EPiServer CMS 6 UIEPiServer CMS 6 UI
EPiServer CMS 6 UITed Nyberg
 

Viewers also liked (20)

Information Literacy
Information LiteracyInformation Literacy
Information Literacy
 
Spectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the WorldSpectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the World
 
Social Media Branding
Social Media BrandingSocial Media Branding
Social Media Branding
 
Ked Tech10
Ked Tech10Ked Tech10
Ked Tech10
 
E³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro EE³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro E
 
NHS Points 11-3-09
NHS Points 11-3-09NHS Points 11-3-09
NHS Points 11-3-09
 
Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?
 
Portraits
PortraitsPortraits
Portraits
 
телемаркетинг Commerce Ver.
телемаркетинг   Commerce Ver.телемаркетинг   Commerce Ver.
телемаркетинг Commerce Ver.
 
NO INVERNADOIRO
NO INVERNADOIRONO INVERNADOIRO
NO INVERNADOIRO
 
Pro Keynote 4
Pro Keynote 4Pro Keynote 4
Pro Keynote 4
 
himno nacional del Ecuador
himno nacional del Ecuadorhimno nacional del Ecuador
himno nacional del Ecuador
 
Thematic Unit Story Board
Thematic Unit Story BoardThematic Unit Story Board
Thematic Unit Story Board
 
Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012
 
Picnic Two
Picnic TwoPicnic Two
Picnic Two
 
Food, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity StudioFood, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity Studio
 
board of directors
board of directorsboard of directors
board of directors
 
Delta M
Delta MDelta M
Delta M
 
Micky Ds
Micky DsMicky Ds
Micky Ds
 
EPiServer CMS 6 UI
EPiServer CMS 6 UIEPiServer CMS 6 UI
EPiServer CMS 6 UI
 

Similar to Cyber covenant

Internet safety
Internet safetyInternet safety
Internet safetydarlinga
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kidsceiland
 
Hugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPointHugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPointtonybattista
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide WebTony L
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenshipcrosbye
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In CyberspaceCarolyn Argo
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 

Similar to Cyber covenant (20)

Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kids
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
Hugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPointHugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPoint
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Internet safety
Internet safetyInternet safety
Internet safety
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
cyber safety
cyber safetycyber safety
cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In Cyberspace
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Safetyquizkids
SafetyquizkidsSafetyquizkids
Safetyquizkids
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Cyber covenant

  • 1. Internet Safety A Christian Perceptive Philippians 4:13 "I can do all things through Christ who strengthens me."
  • 2.
  • 3.
  • 4.
  • 5.  
  • 6.
  • 7.  
  • 8.
  • 9.  
  • 10.  
  • 11.  
  • 12. There is always a risk in meeting an online friend. People aren’t always who or what they claim to be .
  • 13.
  • 14.  
  • 15.
  • 16.  
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. * Frank – Mark – Valleyguy …... Arrested and sentenced to prison for 1 ½ years. Photo of Frank by Bob Child, Associated Press Both photos published in People Magazine, May 29 th , 2000
  • 22. Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting X X X X X X
  • 23.
  • 24.  
  • 25.  
  • 26.
  • 27.

Editor's Notes

  1. Story of Ofir Rachum He was bright and outgoing 16 year old high school student who enjoyed computers One day he met a 20 year old woman Amana Muna in a chat room about computers. They exchanged email addresses and began communicating on a regular basis. Soon they were speaking with one another on the phone. They decided to meet. Ofir was thrilled to date an older woman. He was 16 she was 20. Their first Friday night encounter was a success and they arranged a second meeting later that week. This time she drove him to a deserted area where four of her friends were waiting. They shot him 15 times and threw his body in the trunk of his car. Amuna and her friends were members of an Anti-Semitic hate group. She had been online searching for a Jewish target . Ofir only know what she told him. He had no idea his death was her intent.
  2. Katie Tarbox Story Katie a 13 year old girl began using a computer, the Internet, and a chat rooms, aware of only the excitement and not the danger in connecting with millions of others. One Sunday morning in a teen chat room, she met a guy named Mark who said he was 23 and a college student. Although Katie recognized the discrepancy, she though their conversation harmless. It was just the Internet. Katie thought herself too smart an d too clever to become a victim. She was high honors student, a national swimmer and a very accomplished musician. Katie and Mark had an amazing connection. They liked the same music, clothing styles, movies, and food. Over a six-month period, they developed a friendship Katie characterized as platonic but important. She could tell him anything and did She discussed school, her family, her friends and always got it… But he wanted to meet her. Her parents knew nothing, so his coming to CT was not an option, nor was traveling to CA alone. So Katie came up with Texas. She would be there with her swim team and Mom as a chaperone. It was perfect. Katie shared her secret plans with her best friend as they arrived in Texas. She was gong to meet her cyber friend! Her confidence waned when he opened the hotel room door. And when he began molesting her, shefroze. Fortunately, Katie’s friend did not keep her secret. Katie’s mom and the hotl security arrived in the nick of time. Katie was shocked to learn Mark was not Mark but Frank Kufrovick, a 41 year old financial analyst and a sordid past. He had raped numerous other young girls and one boy.