SlideShare a Scribd company logo
Internet Safety Violet Kuloaugust 10, 2011
Lesson Objectives Learn about Internet safety. Learn common Internet safety terms. Explore social networking and privacy.
Introduction Have you ever searched online to see what information can be found on you? Have you ever received enticing emails or advertisements with special discount offers? Have you customized your privacy settings for your social networking accounts?
Introduction Internet safety refers to protecting your computer and yourself from threats such as viruses, identity theft, privacy violations, cyber harassment/cyber stalking. The Internet’s widespread reach, constantly changing technologies, and emerging social media have made users more vulnerable.
Internet Threats Malware-malicious software or code Spam-unsolicited email or junk mail Virus-self-replicating software program Spyware-collects user’s information without their knowledge
Internet Threats Phishing-mail or instant message scams Clickjacking- tricks users into clicking on a malicious link  Trojan horse-tricks users into allowing the program access to their computer Browser hijacking-home page is replaced by malware or spyware
Internet Threats Pharming-redirects traffic from a legitimate to an illegitimate Website Hoax-email chain letter that warns of impending viruses Mouse trapping-keeps visitors from leaving a site
Social Media How many of you have an account on a social networking site? Which social networking sites do you use? How can we use these social network sites as instructional tools?
Social Networking Social networking Websites are being used regularly by millions of people. Share, connect, and communicate with others. Collaborative construction of knowledge. Continuous conversation.
Social Networking Websites
Facebook Allows users to connect and communicate with friends, upload pictures and videos, play games. Users can create groups for people with a common interest.
Twitter An online service that enables you to broadcast short messages to your friends or "followers.” Lets you specify which Twitter users you want to follow, so you can read their messages in one place.
You Tube A video sharing site that lets users store short videos for private or public viewing. Many institutions have You Tube channels for streaming information.
Blogging Easily created and updateable Website that allows author(s) to publish instantly on the Internet. Engages readers with ideas  and questions. Comprises of reflections and conversations.
Internet Threats Troll-person who posts comments just to annoy people and cause a distraction Flame war-heated argument in a social media site Flamebait-comment posted by someone trying to provoke an angry response Sockpuppet-fake identity used to deceive others
Internet Safety Tips Avatar-use an avatar to protect your privacy Screen name-use a pseudonym on sites you commonly communicate with strangers Posts-may not always be able to change or delete posts Chats-can easily be saved and shared with others  Meme-often cute and funny thing that has gone viral
Internet Safety Tips Create strong passwords. Represent yourself safely. Review your privacy settings.
Task Add your thoughts and ideas to the blog on how we can best safeguard our students from Internet threats.
References Internet Safety. http://www.gcflearnfree.org/internetsafety Richardson, W. (2006). Blogs, Wikis, podcasts, and other powerful web tools for classrooms. Thousand Oaks, CA: Corwin Press. Social Networking. http://en.wikipedia.org/wiki/Social_Networking Twitter versus Facebook: Should you Choose One? http://www.twitip.com/twitter-versus-facebook/ You Tube. http://www.youtube.com/watch?v=BmykFKjNpdY&feature=player_embedded

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Shikhil Sharma
 
Com 6 u1 L1 Maintaining internet safety
Com 6 u1 L1 Maintaining internet safetyCom 6 u1 L1 Maintaining internet safety
Com 6 u1 L1 Maintaining internet safety
Jason Ruelo
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
DigitalLifeAdvisor.com
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
guest3e462b5
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
Robin Hastings
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
guest3d3a205b
 
C 7
C 7C 7
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
Juan Miguel Palero
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
Department of Defense
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
techexpert2345
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
Oe keeping your computer safe rev3
Oe keeping your computer safe rev3Oe keeping your computer safe rev3
Oe keeping your computer safe rev3
oeproducer
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
Benandro Palor
 
Quiz
QuizQuiz
Quiz
smithz
 
Communication Tools
Communication  ToolsCommunication  Tools
Communication Tools
Dr.Suresh Isave
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Com 6 u1 L1 Maintaining internet safety
Com 6 u1 L1 Maintaining internet safetyCom 6 u1 L1 Maintaining internet safety
Com 6 u1 L1 Maintaining internet safety
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Mac Kenzi D. Group#3
Mac Kenzi D. Group#3Mac Kenzi D. Group#3
Mac Kenzi D. Group#3
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
PCC Training - Security
PCC Training - SecurityPCC Training - Security
PCC Training - Security
 
Internet Safety Gwen
Internet Safety GwenInternet Safety Gwen
Internet Safety Gwen
 
C 7
C 7C 7
C 7
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Oe keeping your computer safe rev3
Oe keeping your computer safe rev3Oe keeping your computer safe rev3
Oe keeping your computer safe rev3
 
HELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICTHELE 4 Lesson 2: Safe and Responsible Use of ICT
HELE 4 Lesson 2: Safe and Responsible Use of ICT
 
Quiz
QuizQuiz
Quiz
 
Communication Tools
Communication  ToolsCommunication  Tools
Communication Tools
 

Viewers also liked

Truly pitch
Truly pitchTruly pitch
Truly pitch
Laura Senior
 
0819AM11
0819AM110819AM11
0819AM11
tx-9
 
test0600
test0600test0600
test0600
tx-9
 
Welcome!
Welcome!Welcome!
Welcome!
054193
 
SlideShare 한글_1.pptx
SlideShare 한글_1.pptxSlideShare 한글_1.pptx
SlideShare 한글_1.pptx
tx-9
 
0819AM11
0819AM110819AM11
0819AM11
tx-9
 
Compound sentences
Compound sentencesCompound sentences
Compound sentences
msgilmore
 
SlideShare 한글_1.pptx
SlideShare 한글_1.pptxSlideShare 한글_1.pptx
SlideShare 한글_1.pptx
tx-9
 
SlideShare 한글_1.pptx
SlideShare 한글_1.pptxSlideShare 한글_1.pptx
SlideShare 한글_1.pptx
tx-9
 
SlideShare 한글 공백입력_1.pptx
SlideShare 한글 공백입력_1.pptxSlideShare 한글 공백입력_1.pptx
SlideShare 한글 공백입력_1.pptx
tx-9
 
Cbse report 2013
Cbse report 2013Cbse report 2013
Cbse report 2013
alookulo
 
Dig Deeper 동영상 입력 가이드.ppt
Dig Deeper 동영상 입력 가이드.pptDig Deeper 동영상 입력 가이드.ppt
Dig Deeper 동영상 입력 가이드.ppttx-9
 
01 proforma pjm3101 kecergasan fizikal
01 proforma pjm3101 kecergasan fizikal01 proforma pjm3101 kecergasan fizikal
01 proforma pjm3101 kecergasan fizikalFazilah Malek
 

Viewers also liked (13)

Truly pitch
Truly pitchTruly pitch
Truly pitch
 
0819AM11
0819AM110819AM11
0819AM11
 
test0600
test0600test0600
test0600
 
Welcome!
Welcome!Welcome!
Welcome!
 
SlideShare 한글_1.pptx
SlideShare 한글_1.pptxSlideShare 한글_1.pptx
SlideShare 한글_1.pptx
 
0819AM11
0819AM110819AM11
0819AM11
 
Compound sentences
Compound sentencesCompound sentences
Compound sentences
 
SlideShare 한글_1.pptx
SlideShare 한글_1.pptxSlideShare 한글_1.pptx
SlideShare 한글_1.pptx
 
SlideShare 한글_1.pptx
SlideShare 한글_1.pptxSlideShare 한글_1.pptx
SlideShare 한글_1.pptx
 
SlideShare 한글 공백입력_1.pptx
SlideShare 한글 공백입력_1.pptxSlideShare 한글 공백입력_1.pptx
SlideShare 한글 공백입력_1.pptx
 
Cbse report 2013
Cbse report 2013Cbse report 2013
Cbse report 2013
 
Dig Deeper 동영상 입력 가이드.ppt
Dig Deeper 동영상 입력 가이드.pptDig Deeper 동영상 입력 가이드.ppt
Dig Deeper 동영상 입력 가이드.ppt
 
01 proforma pjm3101 kecergasan fizikal
01 proforma pjm3101 kecergasan fizikal01 proforma pjm3101 kecergasan fizikal
01 proforma pjm3101 kecergasan fizikal
 

Similar to Internet Security

cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Seth Reyes
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
jonadhe mondeja
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
Cathleen Richardson
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
 
IT Security
IT SecurityIT Security
IT Security
Mohsin Laiq
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
Karan Veer Singh
 
EMPOWERMENT.pptx
EMPOWERMENT.pptxEMPOWERMENT.pptx
EMPOWERMENT.pptx
JoelPimentel16
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
Jeth Cuenco
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
RheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
JakeTorio1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
EliseoBartolome1
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
TrixieAnneAlindao
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
EhraicaSaquing
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
ChadrickThompson1
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
DineLiwan
 

Similar to Internet Security (20)

cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptxetech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
etech-EMPOWERMENT-TECHNOLOGY-prformance-task-6-11-2.pptx
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
IT Security
IT SecurityIT Security
IT Security
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
EMPOWERMENT.pptx
EMPOWERMENT.pptxEMPOWERMENT.pptx
EMPOWERMENT.pptx
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 

Recently uploaded

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 

Recently uploaded (20)

How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 

Internet Security

  • 1. Internet Safety Violet Kuloaugust 10, 2011
  • 2. Lesson Objectives Learn about Internet safety. Learn common Internet safety terms. Explore social networking and privacy.
  • 3. Introduction Have you ever searched online to see what information can be found on you? Have you ever received enticing emails or advertisements with special discount offers? Have you customized your privacy settings for your social networking accounts?
  • 4. Introduction Internet safety refers to protecting your computer and yourself from threats such as viruses, identity theft, privacy violations, cyber harassment/cyber stalking. The Internet’s widespread reach, constantly changing technologies, and emerging social media have made users more vulnerable.
  • 5. Internet Threats Malware-malicious software or code Spam-unsolicited email or junk mail Virus-self-replicating software program Spyware-collects user’s information without their knowledge
  • 6. Internet Threats Phishing-mail or instant message scams Clickjacking- tricks users into clicking on a malicious link Trojan horse-tricks users into allowing the program access to their computer Browser hijacking-home page is replaced by malware or spyware
  • 7. Internet Threats Pharming-redirects traffic from a legitimate to an illegitimate Website Hoax-email chain letter that warns of impending viruses Mouse trapping-keeps visitors from leaving a site
  • 8. Social Media How many of you have an account on a social networking site? Which social networking sites do you use? How can we use these social network sites as instructional tools?
  • 9. Social Networking Social networking Websites are being used regularly by millions of people. Share, connect, and communicate with others. Collaborative construction of knowledge. Continuous conversation.
  • 11. Facebook Allows users to connect and communicate with friends, upload pictures and videos, play games. Users can create groups for people with a common interest.
  • 12. Twitter An online service that enables you to broadcast short messages to your friends or "followers.” Lets you specify which Twitter users you want to follow, so you can read their messages in one place.
  • 13. You Tube A video sharing site that lets users store short videos for private or public viewing. Many institutions have You Tube channels for streaming information.
  • 14. Blogging Easily created and updateable Website that allows author(s) to publish instantly on the Internet. Engages readers with ideas and questions. Comprises of reflections and conversations.
  • 15. Internet Threats Troll-person who posts comments just to annoy people and cause a distraction Flame war-heated argument in a social media site Flamebait-comment posted by someone trying to provoke an angry response Sockpuppet-fake identity used to deceive others
  • 16. Internet Safety Tips Avatar-use an avatar to protect your privacy Screen name-use a pseudonym on sites you commonly communicate with strangers Posts-may not always be able to change or delete posts Chats-can easily be saved and shared with others Meme-often cute and funny thing that has gone viral
  • 17. Internet Safety Tips Create strong passwords. Represent yourself safely. Review your privacy settings.
  • 18. Task Add your thoughts and ideas to the blog on how we can best safeguard our students from Internet threats.
  • 19. References Internet Safety. http://www.gcflearnfree.org/internetsafety Richardson, W. (2006). Blogs, Wikis, podcasts, and other powerful web tools for classrooms. Thousand Oaks, CA: Corwin Press. Social Networking. http://en.wikipedia.org/wiki/Social_Networking Twitter versus Facebook: Should you Choose One? http://www.twitip.com/twitter-versus-facebook/ You Tube. http://www.youtube.com/watch?v=BmykFKjNpdY&feature=player_embedded