SlideShare a Scribd company logo
Cyber Safety Presentation for Hadley Farms
Steve Peterson, President
Montgomery County Community Emergency Response Team
www.montgomerycert.org
Introduction
• How many of you like to use the Internet?
• How many of you use it everyday?
• Where are some places you use the Internet regularly? 
• What kinds of things do you regularly do when using the 
Internet? 
• Where do you keep the computer?
• Do you have special rules for using the computer and the 
Internet?
— What are some of those rules?
Cyberbullying
Cyberbullying is the electronic posting of mean‐spirited messages about a person, 
often done anonymously
Cyberbullying
• Using the Internet to spread gossip, to bully someone, or 
damage their reputation is hurtful
— Only do and say things online that you would have done unto you
• Speak up! If something or someone online makes you feel 
uncomfortable, you have the right to not respond, delete a 
post, and most importantly tell a trusted adult
• Don’t stand for bullying—online or off
1 OnGuardOnline.gov
Cyberbullying
• “…the laws have started 
catching up”
— Steve Chaikin, head of 
community prosecution for the 
Montgomery County State’s 
Attorney’s Office
April 10, 2013 Germantown Gazette
This is in response to 
students and young people 
who torment others online
Cyber Predators
People who search online for other people in order to use, control, or harm 
them in some way
Cyber Predators
• Sharing personal information with people you view as "friends" 
(online) is risky
• Keep personal information about yourself private, including 
your family members, your school name, your passwords, your 
telephone number, your address, or other private information
— Example: Manti Te'o ‐ Football player at the University of Notre Dame 
and an acquaintance who orchestrated a hoax and lured Te'o into an 
online relationship with a nonexistent woman; however, the photos used 
for the nonexistent woman were real
• Never meet in person with someone you met online
Identity Theft
The illegal use of someone else's personal information in order to obtain 
money or credit
Questions
• Every year, how many kids have their identity stolen?
• Are you willing to share personal information online about 
yourself and your family in exchange for goods and service?
1 Identity Theft Resource Center
2 eMarketer
500,000 identities stolen per year
75% of kids are willing to share info
How Identity Theft Might Happen Through 
Social Media
• Using low privacy or no privacy settings
• Accepting invitations to connect from unfamiliar persons
• Downloading free applications for use on your profile
• Giving your password or other account details to people you know
• Participating in quizzes (e.g. How well do you know me?) which 
may require you to divulge a lot of personal information
• Clicking on links that lead you to other websites, even if the link 
was sent to you by a friend or posted on your friend’s profile
• Falling for email scams (phishing) that ask to update your social 
networking profiles
Identity Theft Resource Center ‐ http://www.idtheftcenter.org
Example
• A man receives a message from one of his friends which has a 
link to a funny video, so he clicks on it. The link does not bring 
up a video. The friend’s profile had been hacked, and now a 
form of malicious software is being downloaded onto the man’s 
computer as a result of him clicking the link. This software is 
designed to open a way for an identity thief to take personal 
information from the man’s system. It additionally sends a 
similar email to everybody he is connected with on his profile, 
asking them to “view the video”. Downloading free applications 
and software can be sources of this type of malicious software, 
too.
Phishing
A scam by which an email user is duped into revealing personal or 
confidential information that the scammer can use illicitly or fraudulently
68% of teens surveyed say they have1
79%2
Phishing Quiz
• Have you downloaded a program or software without your  
parent's or guardian’s permission?
• What percentage of online teenagers agree that teens aren’t 
careful enough when sharing personal information online?
1 Identity Theft Resource Center
2 Pew Internet and American Life Project
Phishing Tips
• Most organizations do not ask for your personal information 
over email
— Beware of requests to update or confirm your personal information
• Do not open emails from strangers and do not click on 
unfamiliar sites
— If you think an offer is too good to be true, then it probably is
— Example: Get a frEe ipAd buy cliking this lynk.
• Make sure you change your passwords often
— Avoid using the same password on multiple sites
• Always enter a URL by hand instead of following links
Trustworthy and Credible
The quality of being believable or worthy of trust
Trusted Source
• Why is it important to make 
sure a link is from a trusted 
source? 
• Can’t we just click and if it’s 
not what we want or 
thought it would be, just go 
back?
What Kind of Files Do You Download?
• Video games and 
instructions
• Movies/Video
• Songs
• Books
• Reports
• Slideshow 
presentations
• Photos
• Graphics
• Free screen savers
• Animations
• Ringtones
• Software
Question
• What should make you suspicious that a link could cause 
trouble? 
— A message claiming you’ve won a big prize or an offer that seems too 
good to be true is always suspicious
• In what other situations should you to stop and not click?
Suspicious Links
• Links from someone you don’t know
• Links that excitedly tell you to take urgent action
• Links in chain letters
• Links in messages that just look “weird”
• Links in a message that is clearly spam (junk mail)
• Links within messages that use bad grammar or awkward 
phrasing or misspellings
Prepared by CyberSmart Education for the National Cyber Security Alliance. www.StaySafeOnline.org
Suspicious Links
• Links from a friend or stranger claiming he/she is in trouble and 
asking that you send money
• Links to a page asking you for any personal information, such as 
your password
• Links in messages that appear to be from a favorite store, 
asking you to update your account (Reputable companies never 
do this.)
• Links on a social networking site that say “watch this funny 
video of you”
• Links in messages that tell you to open an attachment
Prepared by CyberSmart Education for the National Cyber Security Alliance. www.StaySafeOnline.org
Not everything seen on the Internet is true 
Consequences
The morality (right or wrong) of an act is determined by its effects
Take Responsibility
• Posting inappropriate comments/photos on social media sites, 
such as Twitter and Facebook may lead to unintended or 
unknown consequences
— Suspension
— Loss of employment
— Arrest
• Think twice before you post or say anything online; once 
it is on social media sites it is there forever
— It is permanently stored somewhere – regardless of whether you 
delete it
Take Responsibility
• Why should you not post information online where you are 
located?
— Observant criminals would know you are not home – burgulary
— Cyber Predators would know where you are located
Cyber Security
Measures taken to protect a computer or computer system against 
unauthorized access or attack
Security Tools
• They are available for you to use to further protect yourself, 
your personal information, and computer from viruses, 
spyware, and spam
Which Password is Stronger?
A1b2c3d4
R4c7x3E1f
Which Password is Strongest?
Go!jets#1!!
Applesauce1212**
M^s1ster|$ alw4ysf1ne!
Question
• Why is a password stronger when we combine upper and lower 
case letters AND numbers AND symbols?
A O L B T
@ Number 0 ! 6 +
Dangers
• Understand the dangers of sharing your information (pictures, 
locations, status, etc.) online
— It can be used against you by those who wish to do harm
— It can be used against you in a court of law
— It can be used against you in school
• What has happened to other kids that have had their 
passwords stolen or shared them with their friends?
Stop and Think
• Before you re‐post/retweet a message, stop and ask yourself 
these questions:
— Who generated the information within this tweet?
— Will I harm someone by re‐posting/retweeting this information?
— Is this information gossip?
Resources
Available Resources
• OnguardOnline.gov
— A one‐stop shop for online safety resources available to parents, 
educators, and kids run by the Federal Trade Commission
• Cybertipline.com
— Receives online child solicitation reports 24‐hours a day, seven days a 
week. Submit an online report or call 1‐800‐843‐5678
— Part of the National Center for Missing and Exploited Children
• Staysafeonline.org
— Offers instruction on security updates, free antivirus software, malware 
software removal, and other services run by The National Cyber    
Security Alliance 
Thank You! Questions?

More Related Content

What's hot

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
dg1324
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
eliasfiad
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
Gail Rebuck
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620
mccready95
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
John Woodring
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
Shubham Gupta
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
Katie_Waters
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
IanMJB
 
Final cyberbullying
Final cyberbullyingFinal cyberbullying
Final cyberbullying
TexasQT
 
Final cyberbullying1
Final cyberbullying1Final cyberbullying1
Final cyberbullying1
TexasQT
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
Louise Jones
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
pa21raym
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
buech1cj
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
digitalworld12
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Rozwadowski
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
ConnectSafely
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
ConnectSafely
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
Avanzo net
 

What's hot (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbulling
CyberbullingCyberbulling
Cyberbulling
 
Cyberbullying - The Big Problem
Cyberbullying - The Big ProblemCyberbullying - The Big Problem
Cyberbullying - The Big Problem
 
Cyberbullying - LIS 5620
Cyberbullying - LIS 5620Cyberbullying - LIS 5620
Cyberbullying - LIS 5620
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
The Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber BullyingThe Unlimited Power of Cyber Bullying
The Unlimited Power of Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Final cyberbullying
Final cyberbullyingFinal cyberbullying
Final cyberbullying
 
Final cyberbullying1
Final cyberbullying1Final cyberbullying1
Final cyberbullying1
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 

Similar to Cyber Safety Presentation to Hadley Farms Middle School - April 2013

Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
Christine Hui Jun Zhong
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
Muhammad Rawaha Saleem
 
Csis200 cyberbullying
Csis200 cyberbullyingCsis200 cyberbullying
Csis200 cyberbullying
Bl03_Cook
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
bl03cook
 
Bully
BullyBully
Bully
malah53560
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
NishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
NishaTariq1
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmart
Frederick Lane
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
katnaylan
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
nealbd
 
privacy and security
privacy and securityprivacy and security
privacy and security
ronit_jadhav
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
ShubhamGupta833557
 
Online defamation
Online defamationOnline defamation
Online defamation
Apostolos Syropoulos
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
imen Tekaya Bouaziz
 
Internet_Addiction.pptx
Internet_Addiction.pptxInternet_Addiction.pptx
Internet_Addiction.pptx
ssuserd66a40
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Zephyrum
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
kanika sharma
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
Triveni Prabaakar
 

Similar to Cyber Safety Presentation to Hadley Farms Middle School - April 2013 (20)

Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Csis200 cyberbullying
Csis200 cyberbullyingCsis200 cyberbullying
Csis200 cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Bully
BullyBully
Bully
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
2014-08-07 iParentSmart
2014-08-07 iParentSmart2014-08-07 iParentSmart
2014-08-07 iParentSmart
 
Emma cyber bullying slide.
Emma cyber bullying slide.Emma cyber bullying slide.
Emma cyber bullying slide.
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Respect%20 yourself/Respect Others
Respect%20 yourself/Respect OthersRespect%20 yourself/Respect Others
Respect%20 yourself/Respect Others
 
privacy and security
privacy and securityprivacy and security
privacy and security
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Cyber citizenship imen tekaya
Cyber citizenship imen tekayaCyber citizenship imen tekaya
Cyber citizenship imen tekaya
 
Internet_Addiction.pptx
Internet_Addiction.pptxInternet_Addiction.pptx
Internet_Addiction.pptx
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Stop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measuresStop cyberbullying day – eye opening statistics and preventive measures
Stop cyberbullying day – eye opening statistics and preventive measures
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 

More from Steve Peterson, CEM

Integrating Technology within CERT Operations
Integrating Technology within CERT OperationsIntegrating Technology within CERT Operations
Integrating Technology within CERT Operations
Steve Peterson, CEM
 
Getting Disaster Data Right: A Call for Real-time Research in Disaster Respo...
 Getting Disaster Data Right: A Call for Real-time Research in Disaster Respo... Getting Disaster Data Right: A Call for Real-time Research in Disaster Respo...
Getting Disaster Data Right: A Call for Real-time Research in Disaster Respo...
Steve Peterson, CEM
 
Using Technology to Manage Your CERT Program
Using Technology to Manage Your CERT ProgramUsing Technology to Manage Your CERT Program
Using Technology to Manage Your CERT Program
Steve Peterson, CEM
 
More Research Needed on Concurrent Usage of Information Systems during Emerge...
More Research Needed on Concurrent Usage of Information Systems during Emerge...More Research Needed on Concurrent Usage of Information Systems during Emerge...
More Research Needed on Concurrent Usage of Information Systems during Emerge...
Steve Peterson, CEM
 
A Role for CERT in Social Media Monitoring
A Role for CERT in Social Media MonitoringA Role for CERT in Social Media Monitoring
A Role for CERT in Social Media Monitoring
Steve Peterson, CEM
 
Prince George’s County Emergency Preparedness Conference - Sept 28, 2013
Prince George’s County Emergency Preparedness Conference - Sept 28, 2013Prince George’s County Emergency Preparedness Conference - Sept 28, 2013
Prince George’s County Emergency Preparedness Conference - Sept 28, 2013
Steve Peterson, CEM
 
CERT Role in Social Media Monitoring
CERT Role in Social Media MonitoringCERT Role in Social Media Monitoring
CERT Role in Social Media Monitoring
Steve Peterson, CEM
 
Assessment of Social Media Usage during the April 2012 Holiday Point Marina Fire
Assessment of Social Media Usage during the April 2012 Holiday Point Marina FireAssessment of Social Media Usage during the April 2012 Holiday Point Marina Fire
Assessment of Social Media Usage during the April 2012 Holiday Point Marina Fire
Steve Peterson, CEM
 

More from Steve Peterson, CEM (8)

Integrating Technology within CERT Operations
Integrating Technology within CERT OperationsIntegrating Technology within CERT Operations
Integrating Technology within CERT Operations
 
Getting Disaster Data Right: A Call for Real-time Research in Disaster Respo...
 Getting Disaster Data Right: A Call for Real-time Research in Disaster Respo... Getting Disaster Data Right: A Call for Real-time Research in Disaster Respo...
Getting Disaster Data Right: A Call for Real-time Research in Disaster Respo...
 
Using Technology to Manage Your CERT Program
Using Technology to Manage Your CERT ProgramUsing Technology to Manage Your CERT Program
Using Technology to Manage Your CERT Program
 
More Research Needed on Concurrent Usage of Information Systems during Emerge...
More Research Needed on Concurrent Usage of Information Systems during Emerge...More Research Needed on Concurrent Usage of Information Systems during Emerge...
More Research Needed on Concurrent Usage of Information Systems during Emerge...
 
A Role for CERT in Social Media Monitoring
A Role for CERT in Social Media MonitoringA Role for CERT in Social Media Monitoring
A Role for CERT in Social Media Monitoring
 
Prince George’s County Emergency Preparedness Conference - Sept 28, 2013
Prince George’s County Emergency Preparedness Conference - Sept 28, 2013Prince George’s County Emergency Preparedness Conference - Sept 28, 2013
Prince George’s County Emergency Preparedness Conference - Sept 28, 2013
 
CERT Role in Social Media Monitoring
CERT Role in Social Media MonitoringCERT Role in Social Media Monitoring
CERT Role in Social Media Monitoring
 
Assessment of Social Media Usage during the April 2012 Holiday Point Marina Fire
Assessment of Social Media Usage during the April 2012 Holiday Point Marina FireAssessment of Social Media Usage during the April 2012 Holiday Point Marina Fire
Assessment of Social Media Usage during the April 2012 Holiday Point Marina Fire
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 

Cyber Safety Presentation to Hadley Farms Middle School - April 2013