Internet safety means protecting personal information when online from criminals. Details like addresses and birthdates can be used maliciously. Risks include predators, hackers, viruses, scams and more. Most public WiFi is insecure and allows others to access data. Using strong passwords, privacy settings, and avoiding sensitive activities on public networks can improve safety. Educating children about safe online behaviors is also important for their well-being and protection.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
The embeded videos will not play on slideshare, but you can access the links for websites by clicking on them. Thank you for coming to my presentation.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
The embeded videos will not play on slideshare, but you can access the links for websites by clicking on them. Thank you for coming to my presentation.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The French Revolution Class 9 Study Material pdf free download
2.InternetSafety.ppt
1.
2. Internet safety or online safety is the security of
people and their information when using the
Internet. Internet safety means protecting your
personal information while online. Details such as
your address, full name, telephone number, birth
date and/or social security number can potentially
be used by on-line criminals.
3. • Internet Predators
• Coffee-Shop-Data-Collectors
• “Script-Kiddies”
(what you might think of as “hackers”)
• Viruses /Trojans / Ad-Ware
• Those who take advantage of children &
teens
– Use “Social Engineering” to manipulate victim
– Sexual Intentions
– Murderous Intentions
– Other Malicious Intent
• Phishing Attempts
(Masquerading as a trustworthy entity while attempting to
acquire sensitive information)
• Scam Artists
– Email scams are meant to take your money
– Scams on Craigslist that are using you to commit
fraudulent activities
4. • Most public wireless connections are NOT secure
• It’s easy to capture your data
• Don’t log into websites that reveal your sensitive
credentials (email, bank account, etc.)
• Use onboard firewall software
• Lock your screen before leaving your seat
• Don’t store sensitive information on your computer
• Use an encryptedVPN (Virtual Private Network)
8. • It is clear, then, that the definition of “youth
online safety” has broadened and become more
complex in the past 10 years, as have the role of
the online user and the inter-connected devices
today’s user takes advantage of when
consuming, socializing, producing, and
connecting. In addition to cyberbullying,
inappropriate content, and predation, other risks
have emerged, including the risks related to
geolocation technology in online applications
and on mobile phones.
9. • Physical Safety – freedom from physical harm
• Psychological Safety – freedom from cruelty,
harassment, and exposure to potentially
disturbing material
• Reputational and Legal Safety – freedom from
unwanted social, academic, professional, and
legal consequences that could affect users for a
lifetime
• Identity, Property, and Community Safety –
freedom from theft of identity & property
10. • 75% of children and teens report sharing
personal information about them and their
families to complete strangers in chat rooms1
• 93% of teens (ages 12-to-17) use the Internet2
• 73% of teens use social network sites2
• 75% of teens own cell phones2
• 4% of teens have sent sexually suggestive
images or videos of themselves via cell phone,
and 15% have received such images from
someone they know2
• 43% of teens have been victims of cyberbullying3
12. Educate your child about the dangers that
exist on the Internet
Studies show that:
Fear-based scare-tactics are not effective
Use the "norms" approach - suggest that [insert
behavior here] is not a “norm” among youth's
peers and that people who engage in such activity
are abnormal and may need help
13. Educate you child about safe Internet practices
Use strong passwords (including numbers, special
characters, and combination of upper/lower case)
Never give password to anyone
Don't communicate online with people you don't know
Enable & elevate privacy settings in Facebook
Disable FacebookChat
Do not allow Skype calls from anyone who is not on your
contact list
Teach kids about responsible communication
14. Do not share specific information about yourself, such as family info,
where you live, photos of yourself or your home, etc.
Use an alias forWeb communications, not your real name / also use
avatar that is different from your actual photo
Don't say anything online to someone that you would not be willing to
say directly to their face in person
Don't open email attachments unless you know for certain what it is
Be aware that actions have consequences - ex: nude photos, bad
language, inappropriate conduct, etc. - could have legal impacts,
embarrassment, or affect future job opportunities
Inform you (the parent or another authority figure) if the child has
experienced anything online that makes him/her feel creepy or
uncomfortable
15. • Use Internet Content Filters
– Software that filters out unwanted websites, such as
pornography
– IP Addresses can be filtered using your router or yourWeb
browser
• Place computer in living room or other "common"
area within your home
• Regulate length of time child spends on Internet as
well as determine a window of time for usage
• Request list of email and social networking sites being
used and username/password for each account
• Perform random checks on your teenager's cell phone
to view text messages sent/received
16. Strong Passwords:
Phrases, mixed case, special characters, and long:
- 5db10mw! (Slow Down Buddy I’m On MyWay!)
- w@yD0wny0nd3r#% (Way DownYonder #%)
19. Free Software for Content Filtering
OpenDNS - FamilyShield: http://www.opendns.com/familyshield
Parental Filter: http://www.softpedia.com/get/Security/Lockdown/Parental-Filter.shtml
K9Web Protection: http://www1.k9webprotection.com
ProCon Latte: http://procon.mozdev.org (read interesting related article)
Content Filtering for Firefox
KidZui - a safe browser and online playground for kids 3-12
FoxFilterAdd-on for Firefox
Interesting article on using manual proxy configurations
FilteringContent with IE'sContentAdvisor
20. Cyber Bullying occurs when people send or post
mean or threatening text or pictures on the
Internet. Examples:
A kid could post stories about another kid online.
They could show the website to all of their friends.
When the victim goes back to school, he/she gets
teased about something they don’t know about.
If a friend had your password, and you got into a
fight, they could send mean emails to everyone in
your address book. When your friends or family
open the email, they would think that it came from
you!They could feel very hurt and upset.
21. Complaining that other children or a group of
children do not like them.
Preoccupation with friendship concerns.
Poor self-esteem. Feeling they are not as good
as others.
Not wanting to go to school or other activities.
Spending a great deal of time on the computer.
Being secretive about online activities.
22. • Preserve evidence – this is crucial for identifying the
bully and making a case.
• Attempt to enlist assistance from the service
provider.
• If able to identify the bully, contact him or her
and/or parents.
• Use available blocking technology (i.e., block the
user on IM, email and chat.)
• In serious cases, seek assistance from the police
(i.e., threats of physical harm, unrelenting or unable
to stop.)
23. • Internet Explorer uses Active-X
controls for easy software
installation – not safe
• UseWeb Browser Alternatives:
Firefox, Opera, Safari
• UseVirus Software: Symantec,
McAffee, ClamWin, etc
• RegularWindows Updates (weekly)
• Don’t open email attachments
unless you know for certain what
they are