Presentation is loading. Please wait.

Presentation is loading. Please wait.

Nancy A. George Cooperating School Districts Internet Safety for Everyone.

Similar presentations


Presentation on theme: "Nancy A. George Cooperating School Districts Internet Safety for Everyone."— Presentation transcript:

1 Nancy A. George Cooperating School Districts Internet Safety for Everyone

2 Cyber Security

3 Spam Identity Theft Malicious Code Steganography

4 Cyber Security Spam Unsolicited email sent to a large number of addresses. May contain: –Inappropriate graphic images –Viruses –Fraudulent information or requests for information

5 Cyber Security Can-Spam Act Requires spammer to follow certain guidelines including honoring unsubscribe requests, but does not ban spam

6 Cyber Security Reduce the amount of spam you receive: Choose a non-obvious email address. Limit where you enter your email address Use spam-blocking software. Don’t open spam email (or anything that looks suspicious. Don’t respond to spam email. Report spam to your ISP and the sender’s ISP.

7 Cyber Security Identity Theft Theft of person identifying information –Name –Address –Credit Card Number –Social Security Number and use of that data to open new charge accounts, order merchandise, or borrow money.

8 Cyber Security Phishing Phishing attacks use spoofed emails and fraudulent websites which imitate legitimate companies to entice people to share passwords or credit card numbers.

9

10 Cyber Security Protect yourself against Phishing: Be wary of any email asking for personal information. Avoid hyperlinks that may take you to a fraudulent site. If you have been phished, report it to your local police and financial institutions. Save all correspondence that may serve as evidence.

11 Cyber Security Malicious Code Virus –A small program written to alter the way a computer operates without the permission or knowledge of the user. Worm –A program that replicates itself from system to system without the use of the host file. Trojan Horse –Imposters/files that claim to be something desirable, but in fact are malicious

12 Cyber Security Steganography Hiding a message within an image, audio or video file. Used as an alternative to encryption because unlike encrypted messages, it is undetectable.

13 Cyber Security Some people believe that terrorists, corporate raiders, and drug traffickers use steganography to commit crimes and plan attacks. To avoid playing a role in the transmission of illegal messages, do not forward email to people you do not know.

14 The need for Internet safety from the student perspective….

15 Internet Safety Issues During a 2003-2004 I-SAFE survey of 20,000 middle school students, it was reported that while online: 10% were asked to meet someone face-to- face. 16% received mean or threatening messages while on the Internet. 40% visited an inappropriate place on the Internet.

16 Internet Safety Issues Students do not always have the skills to respond appropriately and responsibly. In the same survey: 24% saw nothing wrong with chatting with a stranger on the Internet and 39% trusted those with whom they chatted. 10% met someone from the Internet face-to- face. 4% more than once. 52% said hurtful or angry things to another person online.

17 How Do We Use the Internet? Kids & TeensAdults PlaygroundAccomplish Tasks Pay bills Book travel Shop ResearchEntertainment Chat rooms Download music Online games Instant Message Blog News gathering

18 What Guidelines or Laws Are in Place in Our Physical Communities to Protect Youth? Stranger Danger Don’t believe everything you see. Movie, video game, television ratings Tobacco and alcohol restrictions Societal parameters

19 What Guidelines Are in Place for the Virtual Community?

20 Internet Safety Concepts Inappropriate Material Cyber Bullying Personal Safety Predator Identification

21 What types of online material do you believe are inappropriate for kids and teens?

22

23 Cyber Community Citizenship Inappropriate material appears in: Advertisements Key Word Searches Typo squatting Spam email

24

25 Personal Safety Screen Names Profiles Chat rooms Instant messaging Online conversations FBI Cyber Safety Tips

26 Personal Safety During a 2003-2004 i-SAFE survey of 20,000 middle school students, it was reported that while online: 55% joined at least one website requesting personal information. 25% saw nothing wrong with chatting with a stranger online. 10% believed it was OK to post their picture online.

27 What if a stranger from the Internet followed one of your students home from school one day…

28 Personal Safety Screen Name A name used when communicating with others online.

29 Personal Safety LiLGrl41390 syracusebabe footballstar#5 jesse2Hot4ya Clip art licensed from the Clip Art Gallery on DiscoverySchool.com

30 Personal Safety Profile Online description of the user. They are searchable and can be viewed by anyone.

31

32

33

34 Personal Safety Chat Room A website, part of a website, or part of an online service that provides a venue for communities of users with a common interest to communicate in real time.

35

36 Personal Safety Instant Messaging The ability to exchange text messages with another Internet user in real time.

37

38 Personal Safety LOL BRB BWL DIKU DOM IPN P CTN P911 PAL 9 999 Clip art licensed from the Clip Art Gallery on DiscoverySchool.com

39 Personal Safety LOL Laugh out loud BRB Be right back BWL Bursting with laughter DIKU Do I know you? DOM Dirty old man IPN I’m posting naked PM Private message CTN Can’t talk now P911 Parent in room watch your language PAL Parents are listening 9 Someone is looking over my shoulder 999 The person has left the room Clip art licensed from the Clip Art Gallery on DiscoverySchool.com

40 Personal Safety 60% of online teens have received email or instant messages from a perfect stranger. 63% of those have responded.

41 Personal Safety Analyze a chat dialog. Clip art licensed from the Clip Art Gallery on DiscoverySchool.com

42 Personal Safety A/S/L?

43

44 Personal Safety Review Personal Safety Tips: Never reveal identifying information in your screen name, profile, or conversations to people you don’t know. Identifying information includes a name, address, phone number, and school name. Never arrange a face-to-face meeting with a stranger from the Internet, without first discussing with your parents.

45 Cyber Predators

46 During a 2003-2004 i-SAFE survey of 20,000 middle school students, it was reported that while online: 39% trusted those with whom they chatted. 19% were upset by something a stranger said. 10% were asked by someone they met on the Internet to meet face-to-face. 10% met a new person from the Internet face- to-face.

47 Cyber Predators Common Characteristics of Predators Computer Savvy College Graduates Successful Careers Male

48 Cyber Predators Communication Tools Chat Rooms Private Chats Instant Messaging Email Phone

49

50

51

52 Remember, Internet Safety is for Everyone!

53 Wrap-Up Thank you for attending! i-SAFE America education@isafe.org outreach@isafe.org media@isafe.org (760) 603-7911


Download ppt "Nancy A. George Cooperating School Districts Internet Safety for Everyone."

Similar presentations


Ads by Google