What Would You Do? The Risks of Behavior on the Internet
Internet Uses Aol Instant Messaging Facebook Instagram Skype Yahoo! Messenger Twitter
Social Networking Members Age Gender Pictures Hobbies Schools Employers City
Social Networking Behavior –Would you do or say the same things in person? Pictures –Once it’s out there you cannot get it back Do you really know this person? –How many friends do you have?
The Results are In!
The Results are In!
Predators Use Social Networking to connect with people, usually children Piece together information Create profiles based on information that isn’t true (Dateline NBC)
Beyond the Information Phishing –An attempt to gain information by posing as a legitimate entity Secure Connections –Should not connect to networks that you do not know Passwords –Should be at least 8 characters, combination of upper/lower case, numbers, special characters – –
The Results are In!
Protecting Yourself Secure Networks Use secure passwords Set your accounts to private Limit personal information Don’t accept friend requests or request people you’ve never met Don’t open from strangers
What does this all mean? Careers Friendships Running for office College entrance Scholarship applications Identity Theft
What Will You Do? Questions??
References 6 th, 7 th, and 8 th grade class at The Montessori Middle School Principles of Information Security by Michael E. Whitman, Herbert J. Mattord security/#.UJb_uYbfSSohttp:// security/#.UJb_uYbfSSo s%20for%20Kids.pdfhttp://ia.unm.edu/pdf/outreach/Handouts/Ten%20Internet%20Safety%20Tip s%20for%20Kids.pdf &list=PL491CCE4D1B59A5ADhttp:// 1&list=PL491CCE4D1B59A5AD “Computers, Security, and You”, “Privacy Settings for Facebook”, “Danger Zones of the Internet”, “Ten Internet Safety Tips for Kids”