SlideShare a Scribd company logo
How to Surf the web safely
Information about the Internet
• Definition and
background
• Why do you use the
internet?
• Where does the
internet come from?
• Facts about the
internet
Uses of the Internet
The Bad Side of the Internet
• Identity theft
• Strangers
• Viruses
• Incorrect information
• Harmful ideas
• Bullying
• Distraction
• Inappropriate websites
Identity Theft
• How do you get
your identity
stolen?
• Internet has made
identity theft much
easier
• Protect yourself,
don’t give out any
personal
information
Viruses
• What’s the
easiest way to
get a virus on
your
computer?
• Use anti-virus
software
• Save and
back-up your
work
Incorrect Information
• It is often very difficult to tell between real
and bogus information
Harmful Ideas
• People can
spread ideas for
destructive
purposes
• How can we
prevent this from
happening?
Cyber-Bullying
• The internet and cell phones
make it easier for people to say
mean things they wouldn’t usually
say in person
• Report any inappropriate actions
online by others to your teacher or
parents
• Cyber-bullying is a serious threat
– “Sticks and Stones”
Distraction
• Online games
• Waste time
• Internet
addiction
• You can
become very
unhealthy
Benefits of the Internet
• Educational
Purposes
• Asking questions
• Connecting people
• Increasing business
• Saving time
Educational Purposes
• Infinite
resources to
answer
questions
• Get answers
fast
• No need for
library
Asking Questions
• You can get
almost any
question
answered on
the internet
• Very diverse
audience
• Discussion
boards
Connecting People
• Skype
• Facebook
• Twitter
• Email
• Instant messenger
Save Time
• Find recipes
online
• Buy things
online
• Communicatio
n
• Pay bills online
Things to Know When Surfing
• Never give out
personal
information
• Stay away from
untrusted
websites
• Don’t accept
email from people
you don’t know
• Know which sites
are legitimate
Password Selection
• Strength of password
depends on length, use
of many characters.
– Weak: “harrypotter”
– Strong: “ek95*.DS0P?
2593”
• Occasionally change
passwords
• Never tell anyone your
password
• http://strongpasswordgen
erator.com
Parental controls software
• Parental Control Software like NetNanny
to control when your kids can go online
and what they are allowed to see.
• ALERTS & REPORTING
• TIME CONTROLS
• PROFANITY MASKING
• MONITORING IM CLIENTS
• http://netnanny.in
Communication
• There are workarounds for everything.
Your best bet is to get buy in. Talk to them,
talk to them frequently.
• Explain why you’re telling them what
you’re telling them
• The screen should be facing the room.
Q&A
• Please feel free to ask any questions you
may have.
• All the material used for building this
presentation is available online. Google is
your friend.

More Related Content

What's hot

An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / Blockchain
Bernard Leong
 
Coin vs token
Coin vs tokenCoin vs token
Coin vs token
shira william
 
The future of crypto wallets
The future of crypto walletsThe future of crypto wallets
The future of crypto wallets
Ouriel Ohayon
 
What's cryptocurrency ?
What's cryptocurrency ?What's cryptocurrency ?
What's cryptocurrency ?
Everythingcrypto
 
Crypto & Crpyocurrencies Intro
Crypto & Crpyocurrencies IntroCrypto & Crpyocurrencies Intro
Crypto & Crpyocurrencies Intro
Tal Shmueli
 
The Ultimate NFT and Crypto Art Guidebook
The Ultimate NFT and Crypto Art GuidebookThe Ultimate NFT and Crypto Art Guidebook
The Ultimate NFT and Crypto Art Guidebook
OlgaBashchuk
 
From 500 Startups to 500 VCs
From 500 Startups to 500 VCsFrom 500 Startups to 500 VCs
From 500 Startups to 500 VCs
Dave McClure
 
The Helpful VC (June 2019)
The Helpful VC (June 2019)The Helpful VC (June 2019)
The Helpful VC (June 2019)
Dave McClure
 
What is the future of cryptocurrency
What is the future of cryptocurrencyWhat is the future of cryptocurrency
What is the future of cryptocurrency
Cryptoknowmics
 
VC Marketing and Branding Strategies
VC Marketing and Branding StrategiesVC Marketing and Branding Strategies
VC Marketing and Branding Strategies
Dave McClure
 
Blockchain and the Future of Real Estate Industry: Is Revolution Coming?
Blockchain and the Future of Real Estate Industry: Is Revolution Coming?Blockchain and the Future of Real Estate Industry: Is Revolution Coming?
Blockchain and the Future of Real Estate Industry: Is Revolution Coming?
Denis Nemtsev
 
Graph protocol for accessing information about blockchains and d apps
Graph protocol for accessing information about blockchains and d appsGraph protocol for accessing information about blockchains and d apps
Graph protocol for accessing information about blockchains and d apps
Gene Leybzon
 
Career as a VC
Career as a VCCareer as a VC
Career as a VC
Manish Singhal
 
Web3 Incubator_Accelerator Landscape.pdf
Web3 Incubator_Accelerator Landscape.pdfWeb3 Incubator_Accelerator Landscape.pdf
Web3 Incubator_Accelerator Landscape.pdf
JungruethaiSongthamm
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain Presentation
MaxWheelock
 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre Gholam
PMILebanonChapter
 
Blockchain Real Estate
Blockchain Real EstateBlockchain Real Estate
Blockchain Real Estate
Inman News
 
Cryptocurrency
Cryptocurrency   Cryptocurrency
Cryptocurrency
RonakKoshti1
 
Skip the J-Curve: An Intro to Venture Capital Secondary
Skip the J-Curve: An Intro to Venture Capital SecondarySkip the J-Curve: An Intro to Venture Capital Secondary
Skip the J-Curve: An Intro to Venture Capital Secondary
Dave McClure
 
Crypto wallets
Crypto walletsCrypto wallets
Crypto wallets
Christian Kameir
 

What's hot (20)

An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / Blockchain
 
Coin vs token
Coin vs tokenCoin vs token
Coin vs token
 
The future of crypto wallets
The future of crypto walletsThe future of crypto wallets
The future of crypto wallets
 
What's cryptocurrency ?
What's cryptocurrency ?What's cryptocurrency ?
What's cryptocurrency ?
 
Crypto & Crpyocurrencies Intro
Crypto & Crpyocurrencies IntroCrypto & Crpyocurrencies Intro
Crypto & Crpyocurrencies Intro
 
The Ultimate NFT and Crypto Art Guidebook
The Ultimate NFT and Crypto Art GuidebookThe Ultimate NFT and Crypto Art Guidebook
The Ultimate NFT and Crypto Art Guidebook
 
From 500 Startups to 500 VCs
From 500 Startups to 500 VCsFrom 500 Startups to 500 VCs
From 500 Startups to 500 VCs
 
The Helpful VC (June 2019)
The Helpful VC (June 2019)The Helpful VC (June 2019)
The Helpful VC (June 2019)
 
What is the future of cryptocurrency
What is the future of cryptocurrencyWhat is the future of cryptocurrency
What is the future of cryptocurrency
 
VC Marketing and Branding Strategies
VC Marketing and Branding StrategiesVC Marketing and Branding Strategies
VC Marketing and Branding Strategies
 
Blockchain and the Future of Real Estate Industry: Is Revolution Coming?
Blockchain and the Future of Real Estate Industry: Is Revolution Coming?Blockchain and the Future of Real Estate Industry: Is Revolution Coming?
Blockchain and the Future of Real Estate Industry: Is Revolution Coming?
 
Graph protocol for accessing information about blockchains and d apps
Graph protocol for accessing information about blockchains and d appsGraph protocol for accessing information about blockchains and d apps
Graph protocol for accessing information about blockchains and d apps
 
Career as a VC
Career as a VCCareer as a VC
Career as a VC
 
Web3 Incubator_Accelerator Landscape.pdf
Web3 Incubator_Accelerator Landscape.pdfWeb3 Incubator_Accelerator Landscape.pdf
Web3 Incubator_Accelerator Landscape.pdf
 
Bitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain PresentationBitcoin, Cryptocurrency, & Blockchain Presentation
Bitcoin, Cryptocurrency, & Blockchain Presentation
 
Crypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre GholamCrypto currencies presentation by Dr. Andre Gholam
Crypto currencies presentation by Dr. Andre Gholam
 
Blockchain Real Estate
Blockchain Real EstateBlockchain Real Estate
Blockchain Real Estate
 
Cryptocurrency
Cryptocurrency   Cryptocurrency
Cryptocurrency
 
Skip the J-Curve: An Intro to Venture Capital Secondary
Skip the J-Curve: An Intro to Venture Capital SecondarySkip the J-Curve: An Intro to Venture Capital Secondary
Skip the J-Curve: An Intro to Venture Capital Secondary
 
Crypto wallets
Crypto walletsCrypto wallets
Crypto wallets
 

Similar to Internet safety presentation sv

Disadvatages of internet
Disadvatages of internetDisadvatages of internet
Disadvatages of internet
Toseef Abbasi
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
Amit Pal Singh
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
14071828
 
Internet safety
Internet safetyInternet safety
Internet safetymyasinpak
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
Emmanuel Arthur
 
iiiii.ppt
iiiii.pptiiiii.ppt
iiiii.ppt
AlvinDawod1
 
intrnet sfty.ppt
intrnet sfty.pptintrnet sfty.ppt
intrnet sfty.ppt
VipanAulakh2
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
chimwemweshaba1
 
internet and safety.pdf
internet and safety.pdfinternet and safety.pdf
internet and safety.pdf
SiddharthD8
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
robert83603
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
ahad55
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
jaenjenny
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Quick Heal Technologies Ltd.
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safetybenlangley-efc
 

Similar to Internet safety presentation sv (20)

Disadvatages of internet
Disadvatages of internetDisadvatages of internet
Disadvatages of internet
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Internet safety
Internet safetyInternet safety
Internet safety
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
iiiii.ppt
iiiii.pptiiiii.ppt
iiiii.ppt
 
intrnet sfty.ppt
intrnet sfty.pptintrnet sfty.ppt
intrnet sfty.ppt
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
internet and safety.pdf
internet and safety.pdfinternet and safety.pdf
internet and safety.pdf
 
K-5-internet_safety.ppt
K-5-internet_safety.pptK-5-internet_safety.ppt
K-5-internet_safety.ppt
 
K 5-internet safety
K 5-internet safetyK 5-internet safety
K 5-internet safety
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Internet safety presentation sv

  • 1. How to Surf the web safely
  • 2. Information about the Internet • Definition and background • Why do you use the internet? • Where does the internet come from? • Facts about the internet
  • 3. Uses of the Internet
  • 4. The Bad Side of the Internet • Identity theft • Strangers • Viruses • Incorrect information • Harmful ideas • Bullying • Distraction • Inappropriate websites
  • 5. Identity Theft • How do you get your identity stolen? • Internet has made identity theft much easier • Protect yourself, don’t give out any personal information
  • 6. Viruses • What’s the easiest way to get a virus on your computer? • Use anti-virus software • Save and back-up your work
  • 7. Incorrect Information • It is often very difficult to tell between real and bogus information
  • 8. Harmful Ideas • People can spread ideas for destructive purposes • How can we prevent this from happening?
  • 9. Cyber-Bullying • The internet and cell phones make it easier for people to say mean things they wouldn’t usually say in person • Report any inappropriate actions online by others to your teacher or parents • Cyber-bullying is a serious threat – “Sticks and Stones”
  • 10. Distraction • Online games • Waste time • Internet addiction • You can become very unhealthy
  • 11. Benefits of the Internet • Educational Purposes • Asking questions • Connecting people • Increasing business • Saving time
  • 12. Educational Purposes • Infinite resources to answer questions • Get answers fast • No need for library
  • 13. Asking Questions • You can get almost any question answered on the internet • Very diverse audience • Discussion boards
  • 14. Connecting People • Skype • Facebook • Twitter • Email • Instant messenger
  • 15. Save Time • Find recipes online • Buy things online • Communicatio n • Pay bills online
  • 16. Things to Know When Surfing • Never give out personal information • Stay away from untrusted websites • Don’t accept email from people you don’t know • Know which sites are legitimate
  • 17. Password Selection • Strength of password depends on length, use of many characters. – Weak: “harrypotter” – Strong: “ek95*.DS0P? 2593” • Occasionally change passwords • Never tell anyone your password • http://strongpasswordgen erator.com
  • 18. Parental controls software • Parental Control Software like NetNanny to control when your kids can go online and what they are allowed to see. • ALERTS & REPORTING • TIME CONTROLS • PROFANITY MASKING • MONITORING IM CLIENTS • http://netnanny.in
  • 19. Communication • There are workarounds for everything. Your best bet is to get buy in. Talk to them, talk to them frequently. • Explain why you’re telling them what you’re telling them • The screen should be facing the room.
  • 20. Q&A • Please feel free to ask any questions you may have. • All the material used for building this presentation is available online. Google is your friend.