SlideShare a Scribd company logo
Emma Balison
Surfer Dude…
Surfer dude… Ways that the internet should be used  Cyber security can limit the amount of material that is available to kids and you could make the home website a kid safe search engine. Talking to kids about the risks and minuses of using the internet is also a good way to promote internet safety but share with them the advantages of the internet and why it is there for them. Educational material, reading materials that interests readers, pen-pal sites, parental information and reference materials  The internet should not be used to show: inappropriate websites, addresses, phone numbers, full names and personal information and pictures.
Slick the Spammer! By Hope Sievert
What is a Spam? A spam is an unnecessary mail or newsgroup posting that you may receive. It can involve email advertizing for a certain product or just an un-asked email. How Can I Outsmart the Spammer? ,[object Object]
You should create an anonymous account while keeping in touch by Usenet groups; forums at chat rooms at somewhere like hiotmail.com
Start Fresh! Delete your old email address and create a new one!,[object Object]
What Should You do if  You receive Spam?
Netiquette Ned Netiquette is the etiquette of the internet and teaches you to always be nice and courteous. Flame Wars: 	A flame is an e-mail. A flame war is sending mean e-mails or too many emails to another internet user. You can avoid a flame war by being calm, ignoring the message or sending a polite message back asking them what they meant.
Netiquette Ned Two things to remember while being online is to be smart and always follow the rules. Stay away from all capital letter phrases because it signifies yelling or anger. If you become uncomfortable with a topic or site you find on the internet, you should click out of it or go to a new webpage.

More Related Content

What's hot

Cyber safety
Cyber safetyCyber safety
Cyber safetysmartins7
 
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
 
Brochure
BrochureBrochure
Brochurejrj6819
 
Email privacy issues and Netiquette
Email privacy issues and NetiquetteEmail privacy issues and Netiquette
Email privacy issues and NetiquetteSomeone Else
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
guestc38192
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentationDebra Duncan
 
Uno Digital Etiquette
Uno Digital EtiquetteUno Digital Etiquette
Uno Digital Etiquette
DevelynDeSkyes
 
Internet safety
Internet safety Internet safety
Internet safety
bhavya mohindru
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Yash Jain
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
mgastgoodman
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
Michael Richards
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dudeguesta2b256
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette13sh
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Maricrs Alfarö
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
EMCox02
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
Apostolos Syropoulos
 

What's hot (19)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Brochure
BrochureBrochure
Brochure
 
Email privacy issues and Netiquette
Email privacy issues and NetiquetteEmail privacy issues and Netiquette
Email privacy issues and Netiquette
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Digital etiquette for wiki presentation
Digital etiquette for wiki presentationDigital etiquette for wiki presentation
Digital etiquette for wiki presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Uno Digital Etiquette
Uno Digital EtiquetteUno Digital Etiquette
Uno Digital Etiquette
 
Internet safety
Internet safety Internet safety
Internet safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Etiquette in the Digital World
Etiquette in the Digital WorldEtiquette in the Digital World
Etiquette in the Digital World
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety Surfer Dude
Internet Safety Surfer DudeInternet Safety Surfer Dude
Internet Safety Surfer Dude
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 
Digital+safety+powerpoint
Digital+safety+powerpointDigital+safety+powerpoint
Digital+safety+powerpoint
 

Viewers also liked

Freedom Management Systems
Freedom Management SystemsFreedom Management Systems
Freedom Management Systems
frankfihn
 
Fotos de las visitas realizadas
Fotos de las visitas realizadasFotos de las visitas realizadas
Fotos de las visitas realizadasclorenzatti
 
RESOLUCIÓN ACTIVIDAD PRÁCTICA I
RESOLUCIÓN ACTIVIDAD PRÁCTICA IRESOLUCIÓN ACTIVIDAD PRÁCTICA I
RESOLUCIÓN ACTIVIDAD PRÁCTICA I
clorenzatti
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalisonguest13f93438
 
Lindsey Real Estate Contest Poster
Lindsey Real Estate Contest PosterLindsey Real Estate Contest Poster
Lindsey Real Estate Contest Posterbbrownslide
 
SUPER BODY, SUPER BRAIN IN SPAIN!
SUPER BODY, SUPER BRAIN IN SPAIN!SUPER BODY, SUPER BRAIN IN SPAIN!
SUPER BODY, SUPER BRAIN IN SPAIN!
Michael Gonzalez-Wallace
 
Autism and Exercise
Autism and ExerciseAutism and Exercise
Autism and Exercise
Michael Gonzalez-Wallace
 
PTD
PTDPTD
The need of Specific Exercise Programs in Schools
The need of Specific Exercise Programs in SchoolsThe need of Specific Exercise Programs in Schools
The need of Specific Exercise Programs in Schools
Michael Gonzalez-Wallace
 
Children, brain development and linking movement to Academic Achievement
Children, brain development and linking movement to Academic AchievementChildren, brain development and linking movement to Academic Achievement
Children, brain development and linking movement to Academic Achievement
Michael Gonzalez-Wallace
 
Facts About India
Facts About IndiaFacts About India
Facts About India
Nirupam Biswas
 
NREGA
NREGANREGA
BRAIN FITNESS: SUPER BODY, SUPER BRAIN Conference at LEARNING ANNEX
BRAIN FITNESS: SUPER BODY, SUPER BRAIN Conference at LEARNING ANNEXBRAIN FITNESS: SUPER BODY, SUPER BRAIN Conference at LEARNING ANNEX
BRAIN FITNESS: SUPER BODY, SUPER BRAIN Conference at LEARNING ANNEX
Michael Gonzalez-Wallace
 

Viewers also liked (13)

Freedom Management Systems
Freedom Management SystemsFreedom Management Systems
Freedom Management Systems
 
Fotos de las visitas realizadas
Fotos de las visitas realizadasFotos de las visitas realizadas
Fotos de las visitas realizadas
 
RESOLUCIÓN ACTIVIDAD PRÁCTICA I
RESOLUCIÓN ACTIVIDAD PRÁCTICA IRESOLUCIÓN ACTIVIDAD PRÁCTICA I
RESOLUCIÓN ACTIVIDAD PRÁCTICA I
 
Internet Safety Emmabalison
Internet Safety EmmabalisonInternet Safety Emmabalison
Internet Safety Emmabalison
 
Lindsey Real Estate Contest Poster
Lindsey Real Estate Contest PosterLindsey Real Estate Contest Poster
Lindsey Real Estate Contest Poster
 
SUPER BODY, SUPER BRAIN IN SPAIN!
SUPER BODY, SUPER BRAIN IN SPAIN!SUPER BODY, SUPER BRAIN IN SPAIN!
SUPER BODY, SUPER BRAIN IN SPAIN!
 
Autism and Exercise
Autism and ExerciseAutism and Exercise
Autism and Exercise
 
PTD
PTDPTD
PTD
 
The need of Specific Exercise Programs in Schools
The need of Specific Exercise Programs in SchoolsThe need of Specific Exercise Programs in Schools
The need of Specific Exercise Programs in Schools
 
Children, brain development and linking movement to Academic Achievement
Children, brain development and linking movement to Academic AchievementChildren, brain development and linking movement to Academic Achievement
Children, brain development and linking movement to Academic Achievement
 
Facts About India
Facts About IndiaFacts About India
Facts About India
 
NREGA
NREGANREGA
NREGA
 
BRAIN FITNESS: SUPER BODY, SUPER BRAIN Conference at LEARNING ANNEX
BRAIN FITNESS: SUPER BODY, SUPER BRAIN Conference at LEARNING ANNEXBRAIN FITNESS: SUPER BODY, SUPER BRAIN Conference at LEARNING ANNEX
BRAIN FITNESS: SUPER BODY, SUPER BRAIN Conference at LEARNING ANNEX
 

Similar to Internet Safety Emmabalison

Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Finalguest252cc9
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5558240
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest0c7b65
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3guest3e462b5
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest011ce7
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammerguest2e06031d
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
TeacherNicaPrintable
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Pointguest24931c
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
jessa451416
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
BryanSmile
 
Internet safty
Internet saftyInternet safty
Internet safty
guestce38b330
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
renumann
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chattererguest4fd30d4
 

Similar to Internet Safety Emmabalison (20)

Internet Saftey Final
Internet Saftey FinalInternet Saftey Final
Internet Saftey Final
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
Internet Safety Lw Spammer
Internet Safety Lw SpammerInternet Safety Lw Spammer
Internet Safety Lw Spammer
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
Internet Safety Power Point
Internet Safety Power PointInternet Safety Power Point
Internet Safety Power Point
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 
Q3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdfQ3 G11 Empowerment Technologies Module 2.pdf
Q3 G11 Empowerment Technologies Module 2.pdf
 
Netiquette Ned
Netiquette NedNetiquette Ned
Netiquette Ned
 
Internet safty
Internet saftyInternet safty
Internet safty
 
cyberbulllying presentation
cyberbulllying presentationcyberbulllying presentation
cyberbulllying presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Internet Safety Im Chatterer
Internet Safety  Im ChattererInternet Safety  Im Chatterer
Internet Safety Im Chatterer
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Internet Safety Emmabalison

  • 3. Surfer dude… Ways that the internet should be used Cyber security can limit the amount of material that is available to kids and you could make the home website a kid safe search engine. Talking to kids about the risks and minuses of using the internet is also a good way to promote internet safety but share with them the advantages of the internet and why it is there for them. Educational material, reading materials that interests readers, pen-pal sites, parental information and reference materials The internet should not be used to show: inappropriate websites, addresses, phone numbers, full names and personal information and pictures.
  • 4. Slick the Spammer! By Hope Sievert
  • 5.
  • 6. You should create an anonymous account while keeping in touch by Usenet groups; forums at chat rooms at somewhere like hiotmail.com
  • 7.
  • 8. What Should You do if You receive Spam?
  • 9. Netiquette Ned Netiquette is the etiquette of the internet and teaches you to always be nice and courteous. Flame Wars: A flame is an e-mail. A flame war is sending mean e-mails or too many emails to another internet user. You can avoid a flame war by being calm, ignoring the message or sending a polite message back asking them what they meant.
  • 10. Netiquette Ned Two things to remember while being online is to be smart and always follow the rules. Stay away from all capital letter phrases because it signifies yelling or anger. If you become uncomfortable with a topic or site you find on the internet, you should click out of it or go to a new webpage.
  • 11. Netiquette Ned The difference between a public and a private e-mail message is that everybody can see public e-mails but private is just between you and the receiver. An emoticon is an icon that shows emotion and can reveal too many things that are violent, mean or impolite.  