SlideShare a Scribd company logo
You choose what you put
online
By Lauren and Emese
PASSWORDS
   When you get an account on a
    device, you should make a
    strong password. To make a
    strong password put CAPITALLS
    and numbers to make it harder
    E.G: !@#$%&cybersaftey!335.
    Always write your password on
    a piece of paper, keep were you
    can find it and nobody else can
    see it. Don’t tell your password
    to anyone except M
Having an account means you
have to have a strong password.
You need a strong password
because, if you have a weak
password hackers can log
into Facebook, email Skype
,Hotmail ,messenger ,kik or
Gmail accounts , so on. If
hackers log into your account
then they can find out all
your personal information,
including were you live. So if
they know all that
PICS ONLINE
 When you put a picture
 online always confirm
 with an adult to make
 sure that your putting
 appropriate pictures
 online. NEVER EVER put a
 picture online with rude
 pictures or personal
 information on or around
Information on a website

Hackers get personal
information from another
website that you have already
put information on. E.g. my mum’s
credit card had fravdelent
activity on it. Someone tried to
make a purchase for $9.00. The
bank cancelled the card for my
mum. My mum’s card was only
issued a few days earlier. She
had only used it on one website,
Safe website
1) Check the web page URL
Sometimes, when browsing the
  web, the URLs (web page
  addresses) begin with the
  letters "http". However, over
  a secure connection the
  address displayed should
  begin with "https" - note the
  "s" at the end. That is how you
  know it is a safe and secure.
2) Check for the "Lock" icon
Example of lock
icon
You choose what you put online
You choose what you put online

More Related Content

What's hot

Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
Catherine MacAllister
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked inPayza
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
How to make screens and the internet safe for Children
How to make screens and the internet safe for Children How to make screens and the internet safe for Children
How to make screens and the internet safe for Children
Tharindu Weerasinghe
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
Kigose
 

What's hot (8)

Security Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got MailSecurity Awareness 9-10-09 v5 You've Got Mail
Security Awareness 9-10-09 v5 You've Got Mail
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Lesson learned from linked in
Lesson learned from linked inLesson learned from linked in
Lesson learned from linked in
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
How to make screens and the internet safe for Children
How to make screens and the internet safe for Children How to make screens and the internet safe for Children
How to make screens and the internet safe for Children
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 

Viewers also liked

Christmas Caroling
Christmas CarolingChristmas Caroling
Christmas Carolingfloralai
 
20130212 lokale omroepen en collectieve content
20130212 lokale omroepen en collectieve content20130212 lokale omroepen en collectieve content
20130212 lokale omroepen en collectieve contentJennifer Feaster
 
3314 Christmas Carol
3314 Christmas Carol3314 Christmas Carol
3314 Christmas Carolfloralai
 
3314 Christmas Carol
3314 Christmas Carol3314 Christmas Carol
3314 Christmas Carolfloralai
 
Xm adobe symposium2013_180713_lite
Xm adobe symposium2013_180713_liteXm adobe symposium2013_180713_lite
Xm adobe symposium2013_180713_litePaul Soon
 
Cyber Safety Cookies
Cyber Safety Cookies   Cyber Safety Cookies
Cyber Safety Cookies
itmadesimple
 

Viewers also liked (8)

Christmas Caroling
Christmas CarolingChristmas Caroling
Christmas Caroling
 
20130212 lokale omroepen en collectieve content
20130212 lokale omroepen en collectieve content20130212 lokale omroepen en collectieve content
20130212 lokale omroepen en collectieve content
 
3314 Christmas Carol
3314 Christmas Carol3314 Christmas Carol
3314 Christmas Carol
 
Steel Concrete 01.07.08
Steel Concrete 01.07.08Steel Concrete 01.07.08
Steel Concrete 01.07.08
 
3314 Christmas Carol
3314 Christmas Carol3314 Christmas Carol
3314 Christmas Carol
 
Xm adobe symposium2013_180713_lite
Xm adobe symposium2013_180713_liteXm adobe symposium2013_180713_lite
Xm adobe symposium2013_180713_lite
 
Libro digital
Libro digitalLibro digital
Libro digital
 
Cyber Safety Cookies
Cyber Safety Cookies   Cyber Safety Cookies
Cyber Safety Cookies
 

Similar to You choose what you put online

S_A_T.pptx
S_A_T.pptxS_A_T.pptx
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
Wizer - Cyber Security Awareness
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
Dale Rapp
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
Billy Warero
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
Momina Mateen
 
Email and web security
Email and web securityEmail and web security
Email and web securityshahhardik27
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
Rajesh Soundararajan
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
seema Vishwakarma
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
Data Hops
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
Phishing
PhishingPhishing
PhishingSyahida
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
ECE6054PRIYADHARSHIN
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
harpinderkaur123
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Sanoop Nair
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 

Similar to You choose what you put online (20)

S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Email and web security
Email and web securityEmail and web security
Email and web security
 
Phishing
PhishingPhishing
Phishing
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers11 ways to keep your emails safe from hackers
11 ways to keep your emails safe from hackers
 
FREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social EngineeringFREE A4 Cyber Security Awareness Posters-Social Engineering
FREE A4 Cyber Security Awareness Posters-Social Engineering
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing
PhishingPhishing
Phishing
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 

More from itmadesimple

Cyber-Safety Awareness
Cyber-Safety Awareness Cyber-Safety Awareness
Cyber-Safety Awareness
itmadesimple
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
itmadesimple
 
Keep your info Safe
Keep your info SafeKeep your info Safe
Keep your info Safe
itmadesimple
 
Cybullying
Cybullying Cybullying
Cybullying
itmadesimple
 
Ethics NowConference08
Ethics NowConference08Ethics NowConference08
Ethics NowConference08
itmadesimple
 
45min Digital Camera Activity
45min Digital Camera Activity45min Digital Camera Activity
45min Digital Camera Activity
itmadesimple
 

More from itmadesimple (6)

Cyber-Safety Awareness
Cyber-Safety Awareness Cyber-Safety Awareness
Cyber-Safety Awareness
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Keep your info Safe
Keep your info SafeKeep your info Safe
Keep your info Safe
 
Cybullying
Cybullying Cybullying
Cybullying
 
Ethics NowConference08
Ethics NowConference08Ethics NowConference08
Ethics NowConference08
 
45min Digital Camera Activity
45min Digital Camera Activity45min Digital Camera Activity
45min Digital Camera Activity
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

You choose what you put online

  • 1. You choose what you put online By Lauren and Emese
  • 2. PASSWORDS  When you get an account on a device, you should make a strong password. To make a strong password put CAPITALLS and numbers to make it harder E.G: !@#$%&cybersaftey!335. Always write your password on a piece of paper, keep were you can find it and nobody else can see it. Don’t tell your password to anyone except M
  • 3. Having an account means you have to have a strong password. You need a strong password because, if you have a weak password hackers can log into Facebook, email Skype ,Hotmail ,messenger ,kik or Gmail accounts , so on. If hackers log into your account then they can find out all your personal information, including were you live. So if they know all that
  • 4. PICS ONLINE  When you put a picture online always confirm with an adult to make sure that your putting appropriate pictures online. NEVER EVER put a picture online with rude pictures or personal information on or around
  • 5. Information on a website Hackers get personal information from another website that you have already put information on. E.g. my mum’s credit card had fravdelent activity on it. Someone tried to make a purchase for $9.00. The bank cancelled the card for my mum. My mum’s card was only issued a few days earlier. She had only used it on one website,
  • 6. Safe website 1) Check the web page URL Sometimes, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https" - note the "s" at the end. That is how you know it is a safe and secure. 2) Check for the "Lock" icon