SlideShare a Scribd company logo
Digital Safety
   Rose Marie Cruz
    Celia Chavez
Introduction

✜ Background
on
Social
Net‐

    
working
Sites


✜ Role
Playing
Games


✜
Cell
Phone
Safety


✜
Parental
Control


✜ Conclusion

The MySpace Generation

⌘ The school-age generation- saturated in
technological communication via the internet,
cell phones, and most recently, social
networking websites.

⌘ Parents and teachers must keep in mind
the social, functional, and entertainment-
related implications of technology


⌘ Parents must guard students by using
tips and software designed for net safety

    
    
Did you know:
★ 72% of kids don’t tell their parents
  what they do online

★ 61% admit using the Internet
  unsafely or inappropriately

★ 55% have given out personal info to a
  stranger

★ 12% met in person with someone they
  first met online

★ 50% have been bullied online

⌘ Tips on Computer and SNW Usage:

    

Only
parents
should
have
the
password
to


    
the
computer



    

The
computer
should
be
placed
in
the


     
common
area
of
the
house,
facing
the



     
center
of

the
room
and
not
the
walls.




    

If
your
child
has
a
camera,


    
monitor
the

pictures
closely.

Rules for SNW
   Parents
should
have
the
child’s
passwords


   Friends
and
posted
photos,
as
well
as


    
comments
and
messages
should
be


    
monitored.


   Warn
children
and
students
about
the


    
importance
of
privacy
and
the
danger
of


    
sharing
informa?on
with
the
world


    "Remind
students
that
messages
and
pictures


    
can
be
printed,
manipulated,
photo‐shopped

    
and
more


Role Playing Games
  A role-playing game (RPG) is a game in which the participants
   assume the roles of fictional characters. Participants determine
   the actions of their characters based on their characterization,
   and the actions succeed or fail according to a formal system of
   rules and guidelines. Within the rules, players have the freedom
   to improvise their choices shape the direction and
    outcome of the game.

  Dangers

- The difference between
    real life and game life.

- Promotes Violence
Cell Phone Safety
  Texting
  -Sexting
  Pictures
  Voice/Video Recording
  Internet
  Games
Parental Control Tools
★ Net
Nanny:
       Filters
allow
adults
to
choose

 
       








    






categories
that
are
not
allowed


   
        
 including
adult
web
sites,
topics,



    
        








and
more


   




Monitors
web
browsing,
instant



     









    






messaging
and
SNW



  




Block
games
for
study‐only
sessions


    Cyber
Nanny


    

Also
includes
a
?mer
that
shuts
the


 

     



computer
off
aLer
a
certain
amount
of
?me


     
       
      
Cyber
Patrol


►     
Download
and
install
soLware
on
up
to
3
PCs

►     
Select
filtering
levels
with
ready‐to
 
go

      
profiles
like
adult,
teen,
young
teen,
child


►     
Block
inten?onal
or


      
accidental
access
to
bad
      


      
web
sites


►         
Set
?me
limits
on












computer
use


($40‐500) 



     
     
Conclusion


   Parents
and
teachers
should
be
aware
of
?ps
&

     
tools
for
safe
internet
voyage


 Cell
phones,
computers,
social
sites,
and
the

   
internet
are
possibly
dangerous;
edu.
Is
key.


 Real
Player
games
can
also
be
a
danger


 There
is
a
difference
between
privacy
and
safety


 Open
communica?on
is
encouraged


More Related Content

What's hot

Fv
FvFv
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
SafeChildUAE1
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazardsdgieseler1
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
Kumar Manish
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Onlinedgieseler1
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
Dan Bowen
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
OCTF Industry Engagement
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
Mohamed ElGabry
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 

What's hot (10)

Fv
FvFv
Fv
 
Safer internet day mo i cpc 2 feb 2014sb
Safer internet day  mo i cpc 2 feb 2014sbSafer internet day  mo i cpc 2 feb 2014sb
Safer internet day mo i cpc 2 feb 2014sb
 
Lotrecchiano grace
Lotrecchiano graceLotrecchiano grace
Lotrecchiano grace
 
Benefitsandhazards
BenefitsandhazardsBenefitsandhazards
Benefitsandhazards
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Protecting Your Child Online
Protecting  Your  Child  OnlineProtecting  Your  Child  Online
Protecting Your Child Online
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 

Viewers also liked

Safe browsing
Safe browsingSafe browsing
Safe browsing
88DIMATH
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
guest3d3a205b
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
Gabor Szathmari
 
Internet browsing
Internet browsingInternet browsing
Internet browsing
Imran Noori
 
The Importance of Business Data Backups
The Importance of Business Data BackupsThe Importance of Business Data Backups
The Importance of Business Data Backups
SwiftTech Solutions, Inc.
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 

Viewers also liked (6)

Safe browsing
Safe browsingSafe browsing
Safe browsing
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
 
Safe Browsing in 2016
Safe Browsing in 2016Safe Browsing in 2016
Safe Browsing in 2016
 
Internet browsing
Internet browsingInternet browsing
Internet browsing
 
The Importance of Business Data Backups
The Importance of Business Data BackupsThe Importance of Business Data Backups
The Importance of Business Data Backups
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 

Similar to Digital Safety

Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013
Robert Schuetz
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
TechnoArmor Consulting
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2MGSD
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
Toby Treacher
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
My protection plan
My protection planMy protection plan
My protection plan
Shakena12
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Donna Murray
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Safety in the Net
Safety in the NetSafety in the Net
Safety in the NetRamilia
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
alexfinvle
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwptsooy10
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3bweinert
 
Ouch 201705 en
Ouch 201705 enOuch 201705 en
Ouch 201705 en
Michael Clemons
 

Similar to Digital Safety (20)

Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
My protection plan
My protection planMy protection plan
My protection plan
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Safety in the Net
Safety in the NetSafety in the Net
Safety in the Net
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Inservice cyberbullyingpwpt
Inservice cyberbullyingpwptInservice cyberbullyingpwpt
Inservice cyberbullyingpwpt
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Parent training keynote_v3
Parent training keynote_v3Parent training keynote_v3
Parent training keynote_v3
 
Ouch 201705 en
Ouch 201705 enOuch 201705 en
Ouch 201705 en
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Digital Safety

  • 1. Digital Safety Rose Marie Cruz Celia Chavez
  • 2. Introduction ✜ Background
on
Social
Net‐
 
working
Sites
 ✜ Role
Playing
Games
 ✜
Cell
Phone
Safety
 ✜
Parental
Control
 ✜ Conclusion

  • 3. The MySpace Generation ⌘ The school-age generation- saturated in technological communication via the internet, cell phones, and most recently, social networking websites. ⌘ Parents and teachers must keep in mind the social, functional, and entertainment- related implications of technology
 ⌘ Parents must guard students by using tips and software designed for net safety
  • 4. 
 
Did you know: ★ 72% of kids don’t tell their parents what they do online ★ 61% admit using the Internet unsafely or inappropriately ★ 55% have given out personal info to a stranger ★ 12% met in person with someone they first met online ★ 50% have been bullied online

  • 5. ⌘ Tips on Computer and SNW Usage:
 
Only
parents
should
have
the
password
to

 
the
computer
 
 

The
computer
should
be
placed
in
the

 
common
area
of
the
house,
facing
the


 
center
of

the
room
and
not
the
walls.

 
 

If
your
child
has
a
camera,
 
 
monitor
the

pictures
closely.

  • 6. Rules for SNW  Parents
should
have
the
child’s
passwords
  Friends
and
posted
photos,
as
well
as

 
comments
and
messages
should
be

 
monitored.
  Warn
children
and
students
about
the

 
importance
of
privacy
and
the
danger
of

 
sharing
informa?on
with
the
world
  "Remind
students
that
messages
and
pictures

 
can
be
printed,
manipulated,
photo‐shopped
 
and
more


  • 7. Role Playing Games   A role-playing game (RPG) is a game in which the participants assume the roles of fictional characters. Participants determine the actions of their characters based on their characterization, and the actions succeed or fail according to a formal system of rules and guidelines. Within the rules, players have the freedom to improvise their choices shape the direction and outcome of the game.   Dangers - The difference between real life and game life. - Promotes Violence
  • 8. Cell Phone Safety   Texting -Sexting   Pictures   Voice/Video Recording   Internet   Games
  • 9. Parental Control Tools ★ Net
Nanny:  Filters
allow
adults
to
choose

 
 







 






categories
that
are
not
allowed
 
 
 
 including
adult
web
sites,
topics,


 
 








and
more
 
 




Monitors
web
browsing,
instant



 








 






messaging
and
SNW
 

 




Block
games
for
study‐only
sessions
  Cyber
Nanny
 
 

Also
includes
a
?mer
that
shuts
the


 
 



computer
off
aLer
a
certain
amount
of
?me

  • 10. 
 
 
Cyber
Patrol
 ► 
Download
and
install
soLware
on
up
to
3
PCs ► 
Select
filtering
levels
with
ready‐to
 
go
 
profiles
like
adult,
teen,
young
teen,
child
 ► 
Block
inten?onal
or

 
accidental
access
to
bad
 

 
web
sites
 ► 
Set
?me
limits
on
 










computer
use
 ($40‐500) 


  • 11. 
 
Conclusion
  Parents
and
teachers
should
be
aware
of
?ps
&
 
tools
for
safe
internet
voyage
  Cell
phones,
computers,
social
sites,
and
the
 
internet
are
possibly
dangerous;
edu.
Is
key.
  Real
Player
games
can
also
be
a
danger
  There
is
a
difference
between
privacy
and
safety
  Open
communica?on
is
encouraged