SlideShare a Scribd company logo
Safety in Cyberspace A tutorial designed to help parents keep children safe online.
Lesson #1: Real life concepts translate easily to the world of the internet
Lesson #1    As a parent, you already know most of what will be taught in this tutorial. You have to think of the internet as a world that has rules and dangers just like the real world.
Lesson #2: More about those strangers.
Lesson #2 Always know who your children are talking to online.  Set strict boundaries on email and social media. Follow the age rules on social media.
Lesson #3: monitor the sites your children are visiting.
Lesson #3 If you don’t know where your child has been, you cannot monitor where they will be tomorrow.  You can view the history of sites visited in Internet Explorer or install software designed to block websites that are not child friendly.
Lesson #3 To find websites your child has visited On the toolbar, click the Favorites Center button .  Click the History button.  Click the day that you visited the website.  In the list of websites that you visited on that day, click the site you want to go to.
Lesson #3 Low cost option filters are available to help your children make wise choices when surfing the web. PC Magazine has a very helpful database of available filters.
Lesson #4: Make your child aware of the boundaries.
Lesson #4 Open and clear lines of communication can stop problems before they happen. Discuss your expectations with your child about the internet. Together, come up with a set of household rules or make an internet contract so everyone is clear on what is expected.
Lesson #4 A few basic suggestions for a list of rules… 	1. Set time limits for daily usage.  2. Limit the types of websites that can be visited or type of search engine that can be used.  3. Require that parents have access to all accounts and passwords.  4. Prohibit internet usage after a certain time of night or before homework is completed.
Lesson #4 Every good list of household rules should talk about cyber bullying. Cyber bullying is just as harmful to a child’s self esteem as bullying in real life. You must both prohibit your children from bullying and encourage them to confide in you if they feel threatened online in any way.
Lesson #5: Keep your computer in an open area if possible.
Lesson #5 Keeping the computer in the living room or family room encourages accountability.  Allowing a child to have a computer in his or her room is a personal choice, but it’s strongly advised against.
Review…. Even if you are new to the internet yourself, the five basic rules discussed can provide a firm foundation for keeping your child safe.

More Related Content

What's hot

Internet Safety
Internet SafetyInternet Safety
Internet Safety
mcgeet
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
sanjeev kumar
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
alyssacarricato
 
Parents Guide to Smartphone Safety
Parents Guide to Smartphone SafetyParents Guide to Smartphone Safety
Parents Guide to Smartphone Safety
- Mark - Fullbright
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
Ernest Staats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
harriscountypubliclibrary
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
Maricrs Alfarö
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
mcmullan
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
Anirudh Anirudh
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
sirchriss
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
MsCCostello
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
cey.ruth
 
Internet safety
Internet safetyInternet safety
Internet safety
Aleksandra Brmbota
 
Guide to internet safety
Guide to internet safetyGuide to internet safety
Guide to internet safety
indycolt18pm
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
guestd3478bf
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
reshmimohanan
 
Internet safety
Internet safetyInternet safety
Internet safety
erinmarkus
 

What's hot (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Parents Guide to Smartphone Safety
Parents Guide to Smartphone SafetyParents Guide to Smartphone Safety
Parents Guide to Smartphone Safety
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Netiquette on using internet
Netiquette  on using internetNetiquette  on using internet
Netiquette on using internet
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Safety @ Cyber
Safety @ CyberSafety @ Cyber
Safety @ Cyber
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Guide to internet safety
Guide to internet safetyGuide to internet safety
Guide to internet safety
 
Internet Safty
Internet SaftyInternet Safty
Internet Safty
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Viewers also liked

Os Perigos da Internet
Os Perigos da InternetOs Perigos da Internet
Os Perigos da Internet
ROFLCOPTER
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSS
Rachel Andrew
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
Shelly Sanchez Terrell
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
Ethos3
 
How to Battle Bad Reviews
How to Battle Bad ReviewsHow to Battle Bad Reviews
How to Battle Bad Reviews
Glassdoor
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
Chris Lema
 

Viewers also liked (6)

Os Perigos da Internet
Os Perigos da InternetOs Perigos da Internet
Os Perigos da Internet
 
The Near Future of CSS
The Near Future of CSSThe Near Future of CSS
The Near Future of CSS
 
Classroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and AdolescentsClassroom Management Tips for Kids and Adolescents
Classroom Management Tips for Kids and Adolescents
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 
How to Battle Bad Reviews
How to Battle Bad ReviewsHow to Battle Bad Reviews
How to Battle Bad Reviews
 
The Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris LemaThe Buyer's Journey - by Chris Lema
The Buyer's Journey - by Chris Lema
 

Similar to Safety in cyberspace

E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
sharoncindrich
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
- Mark - Fullbright
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
Mr_Elliott
 
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
 
Online safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parentsOnline safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parents
indika rathninda
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
sabrinacotta
 
Internet safety open house 2011
Internet safety open house 2011Internet safety open house 2011
Internet safety open house 2011
Houston ISD
 
Ouch 201705 en
Ouch 201705 enOuch 201705 en
Ouch 201705 en
Michael Clemons
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
jtiggs
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
Your eKavach
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
E Robertson
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
Shaun Bent
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
Shaun Bent
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
Pratima Nayak ,Kendriya Vidyalaya Sangathan
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
ronak56
 
Assignment 3 Formative Task
Assignment 3 Formative TaskAssignment 3 Formative Task
Assignment 3 Formative Task
daniel.mawdsley
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
wwihead
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
Barb Jansen
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 

Similar to Safety in cyberspace (20)

E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Online safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parentsOnline safety strategy - non technical guide for parents
Online safety strategy - non technical guide for parents
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Internet safety open house 2011
Internet safety open house 2011Internet safety open house 2011
Internet safety open house 2011
 
Ouch 201705 en
Ouch 201705 enOuch 201705 en
Ouch 201705 en
 
Angelique s Do Something Project
Angelique s Do Something ProjectAngelique s Do Something Project
Angelique s Do Something Project
 
6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent6 Ways to Become a Better Digital Parent
6 Ways to Become a Better Digital Parent
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docxreSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
reSearch with teacher commentIMG_0418.JPGreSearch with teac.docx
 
Assignment 3 Formative Task
Assignment 3 Formative TaskAssignment 3 Formative Task
Assignment 3 Formative Task
 
E safety-parent-workshop
E safety-parent-workshop E safety-parent-workshop
E safety-parent-workshop
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Safety in cyberspace

  • 1. Safety in Cyberspace A tutorial designed to help parents keep children safe online.
  • 2. Lesson #1: Real life concepts translate easily to the world of the internet
  • 3. Lesson #1 As a parent, you already know most of what will be taught in this tutorial. You have to think of the internet as a world that has rules and dangers just like the real world.
  • 4. Lesson #2: More about those strangers.
  • 5. Lesson #2 Always know who your children are talking to online. Set strict boundaries on email and social media. Follow the age rules on social media.
  • 6. Lesson #3: monitor the sites your children are visiting.
  • 7. Lesson #3 If you don’t know where your child has been, you cannot monitor where they will be tomorrow. You can view the history of sites visited in Internet Explorer or install software designed to block websites that are not child friendly.
  • 8. Lesson #3 To find websites your child has visited On the toolbar, click the Favorites Center button . Click the History button. Click the day that you visited the website. In the list of websites that you visited on that day, click the site you want to go to.
  • 9. Lesson #3 Low cost option filters are available to help your children make wise choices when surfing the web. PC Magazine has a very helpful database of available filters.
  • 10. Lesson #4: Make your child aware of the boundaries.
  • 11. Lesson #4 Open and clear lines of communication can stop problems before they happen. Discuss your expectations with your child about the internet. Together, come up with a set of household rules or make an internet contract so everyone is clear on what is expected.
  • 12. Lesson #4 A few basic suggestions for a list of rules… 1. Set time limits for daily usage. 2. Limit the types of websites that can be visited or type of search engine that can be used. 3. Require that parents have access to all accounts and passwords. 4. Prohibit internet usage after a certain time of night or before homework is completed.
  • 13. Lesson #4 Every good list of household rules should talk about cyber bullying. Cyber bullying is just as harmful to a child’s self esteem as bullying in real life. You must both prohibit your children from bullying and encourage them to confide in you if they feel threatened online in any way.
  • 14. Lesson #5: Keep your computer in an open area if possible.
  • 15. Lesson #5 Keeping the computer in the living room or family room encourages accountability. Allowing a child to have a computer in his or her room is a personal choice, but it’s strongly advised against.
  • 16. Review…. Even if you are new to the internet yourself, the five basic rules discussed can provide a firm foundation for keeping your child safe.