Internet Safety
    Mr Eric Castro
Tell a neighbor: What do you remember
  from your grammar school internet
           safety presentations?
Create a Positive Digital Footprint

       Protect Your Privacy

Protect Yourself from Identity Theft

   Protect Yourself from Bullies

 Protect Yourself from Predators

  Protect Yourself from Yourself
Create a Positive
Digital Footprint


                    1
Tell a neighbor: What are you most
proud of having produced or created
             that’s online?
Our digital footprint
is the evidence of our
online activities.
You want to
  leave positive
digital footprints.



          Lost by Stephen Nicholas
The New Yorker,
  3/22/2010
Protect Your Privacy


                       2
1) Do not inadvertently reveal
 personal information online
Block cookies
2) Keep a “clean” email
       account
3) Realize that you may be
        monitored
4) Do not reply to spammers,
            ever
5) Be conscious of web
       security
Passwords
Use a different secure password for
              each site
• Make sure your password is as long as possible

• Use as many different characters as possible

• Do not use personal information

• Do not use common words

• Do not use passwords that are easy to spot while
  you are typing them in
Come up with a sentence that is easy to remember




        Use the first letter of each word,
           including the punctuation
Come up with a sentence that is easy to remember

       Tron was a complete waste of money!

        Use the first letter of each word,
           including the punctuation

                   Twacwom!
Encryption
http://




https://
6) Be conscious of security on
      shared computers
7) Be conscious of home
   computer security
Protect Yourself from
    Identity Theft


                        3
Raise your hand: Has anyone that you
  know had their identity stolen?
IMG_4511 by John R Southern
To
  oM
    uc
       hC
         red
            it b
                yA
                  nd
                     re
                       sR
                          ue
                             da
It’s not about
     cash ...




       To
         oM
           uc

                                         it’s about
              hC
                red
                   it b
                       yA
                         nd

                                            debt
                            re
                              sR
                                 ue
                                    da
• Destroy private records and statements

• Secure your snail mail

• Safeguard your Social Security number

• Don’t leave a paper trail

• Monitor your credit report

• Review credit card statements carefully
Protect Yourself from
       Bullies


                        4
First ...
First ...




Change Begins Here by Trista Emlet
What exactly is
cyberbullying?
• IM/ Text             • Interactive gaming
  harassment
                       • Malicious code
• Stealing passwords
                       • Sending porn or
• Blogs                  junk email

• Web sites            • Impersonation

• Sending pictures     • Cyberbullying by
  through email &        proxy
  cell phones

• Internet polling
Why cyberbully?
What to do
• Don’t bully

• Don’t reciprocate

• Save evidence

• Tell a trusted adult
King on the march to Montgomery by Eliel Johnson
“In the end, we will remember not the words of
  our enemies, but the silence of our friends.”
                               King on the march to Montgomery by Eliel Johnson
Protect Yourself from
     Predators


                        5
http://i.imgur.com/cbRmA.jpg
Emotionally vulnerable

   Seeking attention


   Seeking affection

   Seeking validation
Chatroulette
Protect Yourself from
      Yourself


                        6
Tell a neighbor: What is the least
intelligent thing that you’ve seen
        someone put online?
http://failbook.failblog.org
http://failbook.failblog.org
http://failbook.failblog.org
e to his alleg ed attacker
Rocque pos    ted a messag
saying th  ey are 'done'.
                        ages can escal ate quickly.
Police   say such mess
                             the Internet  and they are
 "If a  young  person is on                 g in nature,
                ments that a  re threatenin
 mak   ing com                 e could be     looking at
    ey need     to realize w               ation because
 th
              harges, unwa  rranted retali
  cri minal c                  well as ha   mpering an
       their  comments as                      Sgt. Kelly
  of
               olice investig  ation," said
  ongoing p
         au, school res ource officer.
   Rosn
What to do?
• Remain alert

• Keep a low profile

• Trust your instincts
Control your information
Control your information
Be smart

Internet safety slides

Editor's Notes

  • #2 \n
  • #3 \n
  • #4 6 things\n
  • #5 \n
  • #6 In an interview with the Harvard admissions committee, what could you show them online?\n
  • #7 Think of every web service you use, or are associated with.\nWhat is there?\nPictures? Video? Poetry? Stories? Reflections on life?\n
  • #8 \n
  • #9 For college and for jobs\n
  • #10 \n
  • #11 82% of 16—18 year-olds use FB daily\n
  • #12 There is NO privacy on the internet.\nWhat’s there is there forever\n
  • #13 NEVER your Social Security number\nBeware that cookies store information and share it automatically w/ websites you visit\n
  • #14 \n
  • #15 \n
  • #16 \n
  • #17 \n
  • #18 \n
  • #19 \n
  • #20 \n
  • #21 \n
  • #22 \n
  • #23 \n
  • #24 and don’t SHARE passwords\n
  • #25 \n
  • #26 \n
  • #27 \n
  • #28 \n
  • #29 \n
  • #30 \n
  • #31 \n
  • #32 \n
  • #33 \n
  • #34 \n
  • #35 Do NOT have your computer save passwords\n
  • #36 More likely to be hit by lightening, or the victim of identity theft?\n750,000 new cases of identity fraud each year in the US\n
  • #37 \n
  • #38 More likely to be hit by lightning, or affected by a computer security problem?\n70% of computer users have been hacked, phished, or the victim of a virus — compared to 0.000102% chance of being struck by lightning?\n
  • #39 \n
  • #40 \n
  • #41 Most materials for identity theft are stolen from trash cans\n
  • #42 \n
  • #43 \n
  • #44 FIRST: Don’t be a bully\nMost bullies were victims\n
  • #45 \n
  • #46 do not SHARE passwords either\n
  • #47 Anger, revenge, frustration\nEntertainment; bored, laughs, to get a reaction, \nBolster or remind ppl of their social standing \nSometimes by accident\n
  • #48 \n
  • #49 \n
  • #50 \n
  • #51 \n
  • #52 Not much harm that a predator can do to you like this\nit’s when you meet IRL …\nIt’s not all men ...\n
  • #53 \n
  • #54 \n
  • #55 \n
  • #56 \n
  • #57 In an interview with the Harvard admissions committee, what could you show them online?\n
  • #58 \n
  • #59 “Her offense: Posting on Facebook a photograph of herself posing with a human placenta in class.”\n
  • #60 \n
  • #61 \n
  • #62 \n
  • #63 \n
  • #64 \n
  • #65 \n
  • #66 Scheduled for same day as Omaha, NB teen shot principal & assistant principal\n
  • #67 \n
  • #68 \n
  • #69 \n
  • #70 \n
  • #71 \n
  • #72 \n
  • #73 \n