SlideShare a Scribd company logo
1 of 4
Cyber Safety By Mitchell  withers-brodie
Don’ts No full names No locations No age  No bullying No emails No phone numbers No other personal details No giving out other peoples information without their permission No threatening others No discriminating  No excluding others No spamming
Things to Watch Out for  Your website is public so even if you think nobody can see it they can. When you delete something it doesn’t mean that it still cant be found. You can never know if the people you add are who they say that they are. Freedom of speech is a right but it can still get you into trouble. Predators have ways of monitoring what you do. Don’t post any unusual pictures of youself.
If you give an internet predator any piece of information they can use it to find out as much  as they want about you which puts you at major risk. So be smart Be CyberSafe. What happens if  You hand out  information

More Related Content

What's hot

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Cyber Bullying Student Presentation
Cyber Bullying Student PresentationCyber Bullying Student Presentation
Cyber Bullying Student Presentationcynthia.warner
 
How to stand against cyberbullying
How to stand against cyberbullyingHow to stand against cyberbullying
How to stand against cyberbullyingtechexpert2345
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safelyinsightmentors
 
Britany and sarah
Britany and sarahBritany and sarah
Britany and sarahdkanine
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usagedemiboyazis
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquetteguestc38192
 
Top 10 Internet Safety
Top 10 Internet SafetyTop 10 Internet Safety
Top 10 Internet Safetydarrylstott1
 
Molly
MollyMolly
Mollymorag
 
5b Digital Citizenship 1
5b Digital Citizenship 15b Digital Citizenship 1
5b Digital Citizenship 1Anja Junginger
 
Dakota2
Dakota2Dakota2
Dakota2morag
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Rick
RickRick
Rickmorag
 

What's hot (17)

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber Bullying Student Presentation
Cyber Bullying Student PresentationCyber Bullying Student Presentation
Cyber Bullying Student Presentation
 
How to stand against cyberbullying
How to stand against cyberbullyingHow to stand against cyberbullying
How to stand against cyberbullying
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Using the internet safely
Using the internet safelyUsing the internet safely
Using the internet safely
 
Britany and sarah
Britany and sarahBritany and sarah
Britany and sarah
 
Responsible social media usage
Responsible social media usageResponsible social media usage
Responsible social media usage
 
What Is Digital Etiquette
What Is Digital EtiquetteWhat Is Digital Etiquette
What Is Digital Etiquette
 
Top 10 Internet Safety
Top 10 Internet SafetyTop 10 Internet Safety
Top 10 Internet Safety
 
Project
ProjectProject
Project
 
Molly
MollyMolly
Molly
 
5b Digital Citizenship 1
5b Digital Citizenship 15b Digital Citizenship 1
5b Digital Citizenship 1
 
Dakota2
Dakota2Dakota2
Dakota2
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Rick
RickRick
Rick
 

Viewers also liked

Pipe M.D. Power Point
Pipe M.D. Power PointPipe M.D. Power Point
Pipe M.D. Power PointMatt Sullivan
 
Feb Seek Job Data
Feb Seek Job DataFeb Seek Job Data
Feb Seek Job Dataiainmacg
 
April Seek Job Data
April Seek Job DataApril Seek Job Data
April Seek Job Dataiainmacg
 
Concepts That Empower Project Managers
Concepts That Empower Project ManagersConcepts That Empower Project Managers
Concepts That Empower Project ManagersCosmas Marimbe
 
Halberg Trust Webinar Slides
Halberg Trust Webinar SlidesHalberg Trust Webinar Slides
Halberg Trust Webinar Slidesiainmacg
 
Seek May Data The Christchurch Story
Seek May Data The Christchurch StorySeek May Data The Christchurch Story
Seek May Data The Christchurch Storyiainmacg
 
NZ and Australia Job Ads data
NZ and Australia Job Ads dataNZ and Australia Job Ads data
NZ and Australia Job Ads dataiainmacg
 
Mavambo The Beginning Art Collection
Mavambo The Beginning Art CollectionMavambo The Beginning Art Collection
Mavambo The Beginning Art CollectionCosmas Marimbe
 
Deck the Halls
Deck the HallsDeck the Halls
Deck the Hallskgcowbelle
 
Powerpoint
PowerpointPowerpoint
Powerpointmitch
 
Powerpoint
PowerpointPowerpoint
Powerpointmitch
 
Stop the Cavalry
Stop the CavalryStop the Cavalry
Stop the Cavalrykgcowbelle
 

Viewers also liked (16)

Pipe M.D. Power Point
Pipe M.D. Power PointPipe M.D. Power Point
Pipe M.D. Power Point
 
Feb Seek Job Data
Feb Seek Job DataFeb Seek Job Data
Feb Seek Job Data
 
April Seek Job Data
April Seek Job DataApril Seek Job Data
April Seek Job Data
 
Concepts That Empower Project Managers
Concepts That Empower Project ManagersConcepts That Empower Project Managers
Concepts That Empower Project Managers
 
Halberg Trust Webinar Slides
Halberg Trust Webinar SlidesHalberg Trust Webinar Slides
Halberg Trust Webinar Slides
 
Seek May Data The Christchurch Story
Seek May Data The Christchurch StorySeek May Data The Christchurch Story
Seek May Data The Christchurch Story
 
3.1
3.13.1
3.1
 
NZ and Australia Job Ads data
NZ and Australia Job Ads dataNZ and Australia Job Ads data
NZ and Australia Job Ads data
 
Mavambo The Beginning Art Collection
Mavambo The Beginning Art CollectionMavambo The Beginning Art Collection
Mavambo The Beginning Art Collection
 
Deck the Halls
Deck the HallsDeck the Halls
Deck the Halls
 
Five top media pitching tips
Five top media pitching tipsFive top media pitching tips
Five top media pitching tips
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
2 4
2 42 4
2 4
 
1.2
1.21.2
1.2
 
Stop the Cavalry
Stop the CavalryStop the Cavalry
Stop the Cavalry
 

Similar to Powerpoint

Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingNuraySmat
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2Chu Yuan
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdfSysvoot Antivirus
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Yjcs social media digital dirt
Yjcs social media digital dirtYjcs social media digital dirt
Yjcs social media digital dirtRobyn Cook-Ritchie
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 

Similar to Powerpoint (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Socialmediatips
SocialmediatipsSocialmediatips
Socialmediatips
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Cj internet safty
Cj internet saftyCj internet safty
Cj internet safty
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
 
Chatter
ChatterChatter
Chatter
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyberbullying!!!
Cyberbullying!!! Cyberbullying!!!
Cyberbullying!!!
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf6 Ways to Protect  Yourself  From Online  Catfishing Scams.pdf
6 Ways to Protect Yourself From Online Catfishing Scams.pdf
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Yjcs social media digital dirt
Yjcs social media digital dirtYjcs social media digital dirt
Yjcs social media digital dirt
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
social networking
social networkingsocial networking
social networking
 

Recently uploaded

Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Powerpoint

  • 1. Cyber Safety By Mitchell withers-brodie
  • 2. Don’ts No full names No locations No age No bullying No emails No phone numbers No other personal details No giving out other peoples information without their permission No threatening others No discriminating No excluding others No spamming
  • 3. Things to Watch Out for Your website is public so even if you think nobody can see it they can. When you delete something it doesn’t mean that it still cant be found. You can never know if the people you add are who they say that they are. Freedom of speech is a right but it can still get you into trouble. Predators have ways of monitoring what you do. Don’t post any unusual pictures of youself.
  • 4. If you give an internet predator any piece of information they can use it to find out as much as they want about you which puts you at major risk. So be smart Be CyberSafe. What happens if You hand out information