SlideShare a Scribd company logo
BEING SMART IN CYBER SPACE  How to improve you Cy-Q By Kirah Branch
Top Ten Safety Tips For Kids!  Never give out your password. Don’t add or talk to people you don’t know  3.    Do not discriminate anyone.  4.    Do not meet up with people you don’t know even is you have talked to them for 6 months on the internet. (they are still strangers)  Do not give out your names, addresses, phone numbers, school, or other personal information online. Make sure you have strong security software. Set your page to private  Be careful what emails you do open some may contain virus and other things you don’t want to see. Change you password regularly. Being careful is the key.
Passwords What should you have in your password? Your password should contain letters and numbers. How often should you change your password? If you don't tell any one your password you will only need to change it once or so a year but if you have a habit of sharing your password you should probably change it every month or so just to be safe. Who should have your password? You should be the only person to have your password if you feel the need to tell someone it tell your parents because they are less likely to send people abusive messages using you email address. Keep your password locked in your brain and no one else's
How to look after your Identity on the Internet  ,[object Object]
On internet pages do not put your full name your location or anything that people could trace you and find you.
Make sure that you site may it be a MySpace, Facebook ect Is set to private and only add people that you know.

More Related Content

What's hot

Online code of conduct
Online code of conductOnline code of conduct
Online code of conductMargo Edgar
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
Michael Richards
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5Melissa Halcott
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
Internet safety
Internet safetyInternet safety
Internet safety
erinmarkus
 
Internet Safety
Internet  SafetyInternet  Safety
Internet Safetyvuwildcat
 
Shouq jaber 11 a
Shouq jaber   11 aShouq jaber   11 a
Shouq jaber 11 a
Anumod E Nair
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
cassielaut
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
Arunmozhi Ramesh
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
Cyber safety 2014withlinks
Cyber safety 2014withlinksCyber safety 2014withlinks
Cyber safety 2014withlinkskellieromine
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
10 different tips for online safety
10 different tips for online safety10 different tips for online safety
10 different tips for online safety
evida0721
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
JEcomputing
 

What's hot (19)

Im A Chatter Al
Im A Chatter AlIm A Chatter Al
Im A Chatter Al
 
Online code of conduct
Online code of conductOnline code of conduct
Online code of conduct
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Electronic safety grade 4 5
Electronic safety grade 4 5Electronic safety grade 4 5
Electronic safety grade 4 5
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety
Internet  SafetyInternet  Safety
Internet Safety
 
Shouq jaber 11 a
Shouq jaber   11 aShouq jaber   11 a
Shouq jaber 11 a
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber safety 2014withlinks
Cyber safety 2014withlinksCyber safety 2014withlinks
Cyber safety 2014withlinks
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
10 different tips for online safety
10 different tips for online safety10 different tips for online safety
10 different tips for online safety
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 

Viewers also liked

Computer&Internet Safety Digital Story
Computer&Internet Safety Digital StoryComputer&Internet Safety Digital Story
Computer&Internet Safety Digital StorySandra Sammarco
 
Malware
MalwareMalware
Malware
galaxy201
 
Digital Etiquette vhardy
Digital Etiquette  vhardyDigital Etiquette  vhardy
Digital Etiquette vhardy
Vanessa Hardy
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
Ljubica Ruzinska
 
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineCyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
Salshaza Putera
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
James Salter
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Life Cycle Engineering
 
SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014
Khoo Shiang
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challenges
Kapil Mehrotra
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
Sophos Benelux
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
Sina Manavi
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
Santhosh Kumar
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Novizul Evendi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rafel Ivgi
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 

Viewers also liked (20)

Computer&Internet Safety Digital Story
Computer&Internet Safety Digital StoryComputer&Internet Safety Digital Story
Computer&Internet Safety Digital Story
 
Malware
MalwareMalware
Malware
 
Digital Etiquette vhardy
Digital Etiquette  vhardyDigital Etiquette  vhardy
Digital Etiquette vhardy
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
 
Cyber Crime: Stay Safe Online
Cyber Crime: Stay Safe OnlineCyber Crime: Stay Safe Online
Cyber Crime: Stay Safe Online
 
Big data ... for security
Big data ... for securityBig data ... for security
Big data ... for security
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network DefendersHack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
Hack Warz® Cyber Attack: A Hands-On Lab for Network Defenders
 
SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014SECQME Watch Over Me Deck 2014
SECQME Watch Over Me Deck 2014
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challenges
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Similar to Being Smart In Cyber Space

Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
Leelet1121
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
dpl
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
TCPSM
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
guestde489f
 
Digital Identity - Junior 5
Digital Identity - Junior 5 Digital Identity - Junior 5
Digital Identity - Junior 5 marudiaz77
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kidsceiland
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
RedDragon FRG
 
Digital identity
Digital identityDigital identity
Digital identitymarudiaz77
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
kgilliard13
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
jessa451416
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalisonguest13f93438
 

Similar to Being Smart In Cyber Space (20)

Cy Q
Cy QCy Q
Cy Q
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Fosi kids-tips
Fosi kids-tipsFosi kids-tips
Fosi kids-tips
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Digital Identity - Junior 5
Digital Identity - Junior 5 Digital Identity - Junior 5
Digital Identity - Junior 5
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kids
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
10things
10things10things
10things
 
Digital identity
Digital identityDigital identity
Digital identity
 
Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Being Smart In Cyber Space

  • 1. BEING SMART IN CYBER SPACE How to improve you Cy-Q By Kirah Branch
  • 2. Top Ten Safety Tips For Kids! Never give out your password. Don’t add or talk to people you don’t know 3. Do not discriminate anyone. 4. Do not meet up with people you don’t know even is you have talked to them for 6 months on the internet. (they are still strangers) Do not give out your names, addresses, phone numbers, school, or other personal information online. Make sure you have strong security software. Set your page to private Be careful what emails you do open some may contain virus and other things you don’t want to see. Change you password regularly. Being careful is the key.
  • 3. Passwords What should you have in your password? Your password should contain letters and numbers. How often should you change your password? If you don't tell any one your password you will only need to change it once or so a year but if you have a habit of sharing your password you should probably change it every month or so just to be safe. Who should have your password? You should be the only person to have your password if you feel the need to tell someone it tell your parents because they are less likely to send people abusive messages using you email address. Keep your password locked in your brain and no one else's
  • 4.
  • 5. On internet pages do not put your full name your location or anything that people could trace you and find you.
  • 6. Make sure that you site may it be a MySpace, Facebook ect Is set to private and only add people that you know.
  • 7.
  • 8. Netiquette Guidelines 1.  Remember to treat others online as you would like to be treated. 2.  When you receive an e-mail which says to send it to everyone you know, please don’t. 3.  When you send messages online, make yourself look good by proofreading and correcting mistakes before pressing the send button. 4.  Do not type messages in ALL CAPITALS.  It’s like shouting. 5.  Respect other people’s privacy.  Do not forward other people’s e-mails without their permission. 6.  Be forgiving of other people’s mistakes online. 7.  Ask before you send huge attachments. 8.  Keep your communications short and to the point. 9.  The internet is not private.  It is a mistake to assume that it is. 10.  Do not leave the subject field blank in e-mails. 11.  Do not forward jokes, chain letters or unimportant e-mails without the recipient’s permission. 12.  If you receive a nasty e-mail do not respond immediately, if at all. 13.  Do not forward virus warnings.  They are generally hoaxes. Follow these guide lines and you will improve your own Cy-Q