Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Using internet and cell phones safely
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
E-Safety Quiz Keeping safe online! A guide for parents & children.
INTERNET SAFETY FOR STUDENTS
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
How To Protect Your Privacy and Avoid Identity Theft Online.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Electronic precautions to guarantee safety Appropriate: Responsibly using securing software, updating frequently. Communicate through secure networks.
How can you protect yourself from online identity theft?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
YOU Only YOU Can Stop Internet Hazards NETS: 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Private and Personal Information Common Sense Unit l – Lesson 2 (Cross-Curricular Categories) Privacy and Security Information Literacy.
Be Cautious of Identity Theft By: Sydney Langley.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Rings of Responsibility
Cyber Safety Jamie Salazar.
By: Austin Kellogg. What’s the difference Phishing Scam where frauds send pop-up messages to lure personal information.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Protecting What’s Yours: Your Identity
Appropriate Use of Technology
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Presentation transcript:

Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be used for identity theft. Personal information – information that cannot be used to identify you. Identity Theft – when someone uses another persons information to pretend to be that person.

What sites do you like to visit? What do you like to do online?

Private vs. Personal Information Many of the websites that you visit online request user information before you are allowed to participate in the online activity. Can you name some examples? What kind of information do you need to provide? Why do you think they ask for this information?

Private and Personal Information Name the ways that information can be shared online. Online Games Social networking Online Shopping Video Sharing sites Are you giving out information that you should keep private?

Have you seen this?

What kinds of information are you asked to provide? Do you stop to consider whether providing the information requested will reveal private identity information? Facebook “Places” may reveal too much FACEBOOK

Identity Theft Kids, teens and adults, are targets for identity theft. An identity thief uses some else’s PRIVATE identity information to pretend to be that person Once that thief has a new identity, they can use it to get a driver’s license, or buy things or apply for a credit card in your name.

What IS Private information? Full name Postal address address Phone numbers Passwords Credit card numbers Social Security number Mother’s maiden name

Personal Information Are you giving out information about yourself that should be kept private? Personal Information Your age Male or female How many brothers and sisters Favorite music Favorite food Name of your pet Opinion about an issue

Todays’ Agenda Smart, Safe, and Secure Online Take out your notebook and copy the following information. Spam – commercial messages that you didn’t ask for Malware – “malicious software” created to damage your files, your computer or steal your identity Phishing – spammers who want to steal private identity information and send messages or links that look real. How computer viruses work

Smart, Safe, and Secure Online Firewall – a way to prevent outsiders getting into a computer or network. Antivirus software - software is used to prevent, detect, and remove malware and computer viruses

Tips for fighting Spam or Malware 1.Always back up your computers 2.Update your operating system 3.Use and update antivirus and other security software 4. Be sure you know what new software does before you install it 5. Report spam or phishing to your ISP (Internet Service Provider)

Strong Passwords How do people steal passwords? 1.Someone can look over your shoulder 2.Someone can get your password from a public computer (always log off and don’t save “remember password” option) 3.Be careful of “phishing” s asking for private information

Strong Passwords 1.Only your parents should know your password. 2.Don't use passwords that are easy to guess—like your nickname or your pet's name—because people who know you well can guess these kinds of passwords. 3.Never use any private identity information in your password 4.Don't use a word in the dictionary as a password because hackers use programs that will try every word in the dictionary to guess passwords. 5.Use a combination of numbers and letters 6.Don’t use obvious sequences like xyz, 123

Do you “talk” too much?? Protecting Yourself Online