Cyberspace Risks and Defenses

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
Keeping Your Child Safe on the Internet
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
The Internet.
INTERNET SAFETY FOR STUDENTS
Cyber bullying and internet safety Parents meeting: staying safe online.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
INTERNET SAFETY Tips for becoming a “surfer” dude!
YOU Only YOU Can Stop Internet Hazards NETS: 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
1. Read the following presentation and watch the videos for your grade level. 2. Write your name on your index card and answer the “Bob” questions at the.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Category.
Are your children safe online?. Welcome You are first-generation Internet parents Our children are the first generation to be born and raised with the.
Safety.
Gosbecks E-Safety Guide
How to stay safe using the internet & App’s
Cyber and Internet Safety (Parents’ Night)
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
How to stay safe using the internet and app’s?
Keeping Children Safe Online
Cyberbullying on Instagram and Snapchat
E-Safety What are the dangers: Seeing disturbing information or images
8 online danger tips By: kailee bariring.
Digital Citizenship.
Internet Identity, Safety, & Security
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Discussion – what kind of bullying is taking place in the images
Gosbecks E-Safety Guide 2017
Our Children and Social Media
Appropriate Use of Technology
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
SOCIAL MEDIA: ARE YOU PLAYING IT SAFE?.
JMU GenCyber Boot Camp Wrap up
Online Safety! Created by Educational Technology Network
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Freedom Independence Transition
Internet Safety – Social Media
Our internet, our choice
Online Safety; Privacy and Sharing
Presentation transcript:

Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp © James Madison university

© James Madison university Facebook Facebook is a popular social media platform Minimum age is 13 years old Many students use it to: Stay in touch with friends Share news, pictures, and (cat) videos Chat, Etc. A Parent’s Guide to Facebook GenCyber 2015 © James Madison university

© James Madison university Facebook (cont) Special protections for users 13-17: Teens not listed in public searches Only friends and friends of friends can “tag” teens Teens cannot share with “the public” (only friends and friends of friends) Location sharing is off by default Friend requests only from friends and friends of friends Teens can only chat with friends Messaging is off by default No ads about adult content, alcohol, dating, gambling, and subscription services JMU GenCyber Boot Camp © James Madison university

Social Networking Risks Posting information about themselves that: Could be used to embarrass or manipulate them Could cause psychological harm Could be used by criminals to steal their identity or property Could be used by criminals to determine their physical location to cause physical harm JMU GenCyber Boot Camp © James Madison university

Social Networking Risks (cont.) Damage to reputation or future prospects: Unkind or angry posts Compromising photos or videos Group conflict depicted in text and/or imagery Spending “too much time online” (subjective) Exposure to inappropriate content (subjective) Potential for inappropriate contact with adults JMU GenCyber Boot Camp © James Madison university

Social Networking Risks (cont.) Harassment or online bullying (cyberbullying) Perpetrator and/or victim This website contains downloadable tip sheets, cyberbullying stats, and a downloadable PDF book entitled, Words Wound: Delete Cyberbullying and Make Kindness Go Viral. https://cyberbullying.org/resources Link to PDF of book that could be used for journal activities: The Price of Shame: Monica Lewinsky TedTalk The Amanda Todd Story JMU GenCyber Boot Camp © James Madison university

© James Madison university Snapchat (Mobile) users take a photo or video Add a caption Send it to friends User sets a time limit (1-10 seconds) of how long recipient can view photo/video Unless they take a screenshot JMU GenCyber Boot Camp © James Madison university

© James Madison university Apps Many application programs (“apps”) can be installed via phone or social networking page Risks include: Accidentally sharing information about yourself and your friends with the app developer Apps can contain spyware or malware You could wind up paying a lot for “free” apps Ads In-app purchase JMU GenCyber Boot Camp © James Madison university

© James Madison university P2P Filesharing Risks Many easy-to-use apps allow people to share music, movies, and software online Risks include: Accidentally sharing private files Legal issues from copyright violations Shared software could include spyware or malware JMU GenCyber Boot Camp © James Madison university

© James Madison university Craigslist Free advertisement website Rules of thumb: Deal locally Face-to-face (but safely!) JMU GenCyber Boot Camp © James Madison university

© James Madison university Craigslist (cont) https://www.craigslist.org/about/scams To these we add: use common sense when arranging to meet someone face-to-face JMU GenCyber Boot Camp © James Madison university

© James Madison university Scams Before we get into specifics some rules of thumb: Protect your passwords Understand what information is private (SSN, account information, passwords) and be very suspicious when someone asks for it Check out requests and find out who you are really dealing with If warranted, give personal information over encrypted web connections only If something sounds too good to be true it probably is (especially on the Internet!) JMU GenCyber Boot Camp © James Madison university

© James Madison university Scams (cont) Common things to stop and think about: JMU GenCyber Boot Camp © James Madison university

© James Madison university Scams – Scareware JMU GenCyber Boot Camp © James Madison university

Scams – Scareware Defenses JMU GenCyber Boot Camp © James Madison university

Scams – Nigerian Prince Scam JMU GenCyber Boot Camp © James Madison university

© James Madison university Scams – Phishing JMU GenCyber Boot Camp © James Madison university

Scams – Phishing (cont) JMU GenCyber Boot Camp © James Madison university

Scams – Phishing Defenses Be cautious/suspicious JMU policy: we will never ask you for your password over the phone or e-mail JMU policy: only a few trusted JMU websites as for your password Look where you are going: Before clicking on a link hover over it with the mouse and view the URL Look where you are at: If you click a link, check the address bar and make sure it took you to the proper domain and you weren’t redirected JMU GenCyber Boot Camp © James Madison university

Summary of Cyberspace Risks and Defenses Be careful/suspicious: Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp © James Madison university