Cyber Safety Assessment Review

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
How to protect yourself, your computer, and others on the internet
Internet Safety and Cyber Bullying All info came from
Developed by Technology Services 1:1 Laptop Initiative
Internet Safety in Schools
Don’t be bullied, or be a bully.
Internet Online Safety How to have FUN and Stay in Control.
Cybersafety Elimbah State School Cybersafety and cyberbullying: A guide for parents and caregivers, May 2012., Dept of Education, Training and Employment.
 NYS Internet Crimes Against Children Task Force E-Safety Mr Trofimczuk E-Safety 1.
Forms of Cyberbullying
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Cyber Safety Assessment Review Grades 6-8. Question #1 Cyber bullies are generally quite mature in their behavior. TRUE FALSE.
INTERNET SAFETY FOR STUDENTS
What you don’t know CAN hurt you!
This week is anti-bullying week.
e-safety and cyber bullying
Using internet and cell phones safely
What do I need to know?.   Instant Messages  Social Networking.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Internet Safety & Online Citizenship
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Cyber Bullying By Mrs. Giambri. What is Cyber Bullying? What is Cyber Bullying? ( What is Cyber Bullying? Cyber bullying.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
TECHNOLOGY USE AGREEMENT FOR STUDENTS GRADES 3-8 This presentation was created to help students understand the district’s Technology Use Agreement before.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 S = Stay safe  M = Meet up  A = Accepting information  R = Reliable  T = Tell someone.
Cyber Safety Jamie Salazar.
Internet Safety Safely Navigating Uncharted Waters.
Let’s Get Savvy about Technology Mrs. George Dondero School.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Safety.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Online Safety! By: Michelle Deng.
Appropriate Use of Technology
Cyber Bullying.
Follow safety rules so that YOU: Avoid getting HURT.
ICT Communications Lesson 3: Internet Life and Privacy
Personal Safety Online
Internet Safety – Social Media
Presentation transcript:

Cyber Safety Assessment Review Grades 9-12

Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE

Question #1 Hurtful cell phone messages are not considered a cyber bully threat. TRUE FALSE All forms of electronic communication that harasses, threatens, or embarrasses you is considered cyber bullying.

Question #2 Violating copyright laws is: A Federal offense Against school policy Morally wrong All of the above

Question #2 Violating copyright laws is: A Federal offense Against school policy Morally wrong All of the above Copyright laws protect the rights of ownership and must be followed at all times.

Question #3 When you receive an email offering an opportunity to win fabulous prizes, you should: Sign up – you love fabulous prizes Sign up – and then forward it to your friends Leave your email site immediately Delete the email – it is most likely a scam

Question #3 When you receive an email offering an opportunity to win fabulous prizes, you should: Sign up – you love fabulous prizes Sign up – and then forward it to your friends Leave your email site immediately Delete the email – it is most likely a scam Internet scams are numerous and tricky. Don’t be a victim of this criminal deception.

Question #4 Online dating is dangerous because: You can never be sure who you are talking to online The picture that is posted of the person might be a total lie It might be a trick to lure you to a meeting All of the above

Question #4 Online dating is dangerous because: You can never be sure who you are talking to online The picture that is posted of the person might be a total lie It might be a trick to lure you to a meeting All of the above Dating someone online is dangerous because you do not know what intentions the person you meet online has, or even if they are who they say they are.

Question #5 When using blogs, chat rooms, email, or instant messaging: Never reveal your last name Never reveal personal information such as address or phone number Never reveal your user name or password Never reveal any of the above information

Question #5 When using blogs, chat rooms, email, or instant messaging: Never reveal your last name Never reveal personal information such as address or phone number Never reveal your user name or password Never reveal any of the above information Any personal information you may reveal online can be used to find you, harass you, and/or embarrass you. Be careful!

Question #6 Using a cell phone to send or receive text messages is very similar to using email or instant messaging and some of the same safety rules apply. TRUE FALSE

Question #6 Using a cell phone to send or receive text messages is very similar to using email or instant messaging and some of the same safety rules apply. TRUE FALSE Cell phones and text messaging have the same important safety rules that online chat rooms and social media have.

Question #7 If someone online is making you feel uncomfortable: Confront them online and tell them how you feel Try to find out information about the person you are uneasy about Leave the Internet site immediately and tell someone about it Immediately change the subject to one that makes you feel better

Question #7 If someone online is making you feel uncomfortable: Confront them online and tell them how you feel Try to find out information about the person you are uneasy about Leave the Internet site immediately and tell someone about it Immediately change the subject to one that makes you feel better Tell a trusted adult about the occurrence and block the person from sending you messages in the future

Question #8 When posting photos online, the most important thing to remember is: Your friends and family will appreciate your photos You must always tag each photo with your name Use only the most flattering photos available Any photos you can post can then be used without your permission

Question #8 When posting photos online, the most important thing to remember is: Your friends and family will appreciate your photos You must always tag each photo with your name Use only the most flattering photos available Any photos you can post can then be used without your permission Once you post a photo, you lose control of who has it and how it is being used

Question #9 You can usually trust the information you find on a website without evaluating it. TRUE FALSE

Question #9 You can usually trust the information you find on a website without evaluating it. TRUE FALSE Anyone can post information online, so be sure to check out facts in several places before considering it to be unbiased and/or true.

Question #10 Which of the following would be the most secure password for an online sale? “computer” “$trawb3rry” “5555555555” “football37”

Question #10 Which of the following would be the most secure password for an online sale? “computer” “$trawb3rry” “5555555555” “football37” Passwords should contain letters, numbers, and symbols.

Question #11 Violating copyright laws is: Illegal OK because no one enforces copyright laws OK because everyone does it All of the above

Question #11 Violating copyright laws is: Illegal OK because no one enforces copyright laws OK because everyone does it All of the above Copyright laws protect original music, art, literature, ideas, websites, images, logos, and lots of other things. Without copyright protection, no one would publish their work.

Question #12 Cyber bullying victims tend to be harassed by: A stranger who is much older than them A stranger who is much younger than them Someone they know from school A relative None of the above

Question #12 Cyber bullying victims tend to be harassed by: A stranger who is much older than them A stranger who is much younger than them Someone they know from school A relative None of the above Victims of cyber bullying are usually harassed by people they know from their school.

Question #13 If you find untrue information about yourself online, take appropriate steps to have it removed immediately. TRUE FALSE

Question #13 If you find untrue information about yourself online, take appropriate steps to have it removed immediately. TRUE FALSE False identity information could jeopardize you in the future, so you must take all possible steps to remove untrue data about yourself as soon as you recognize it online.

Question #14 When file-sharing programs to swap files and music: Always save your files to your computer that you receive from others You will almost always receive files or music you do not want You are violating copyright laws 100% of the time You are opening your computer up to receiving nasty viruses.

Question #14 When file-sharing programs to swap files and music: Always save your files to your computer that you receive from others You will almost always receive files or music you do not want You are violating copyright laws 100% of the time You are opening your computer up to receiving nasty viruses. Even music files that are not copyright protected and legal to swap can contain viruses that could harm your computer.

Question #15 Email attachments are: Safe for your computer Can contain viruses that could harm your computer Not a good way to send files to friends Only good for sending images

Question #15 Email attachments are: Safe for your computer Can contain viruses that could harm your computer Not a good way to send files to friends Only good for sending images Opening emails from senders you do not recognize could cause huge problems fro your computer system and might put your information in jeopardy of being stolen.

Question #16 When reading your email you should always: Carefully read all mail before you delete it Scan the from line and do not open any mail from people you don’t know Save all attachments to your computer before you open them Forward all email scam mail to your friends

Question #16 When reading your email you should always: Carefully read all mail before you delete it Scan the from line and do not open any mail from people you don’t know Save all attachments to your computer before you open them Forward all email scam mail to your friends Opening emails from senders you do not know will endanger your computer to viruses that could damage your information.

Question #17 Laptops often have built in cameras that are the size of a pinhole. TRUE FALSE

Question #17 Laptops often have built in cameras that are the size of a pinhole. TRUE FALSE Covering up your computer camera lens is a good idea unless you are absolutely certain you know the person you are communicating with.

Question #18 You should check for a secure Internet connection when: You are posting to a social networking site You are buying something online using a credit card or PayPal account You are searching for copyright free resources You are emailing a friend

Question #18 You should check for a secure Internet connection when: You are posting to a social networking site You are buying something online using a credit card or PayPal account You are searching for copyright free resources You are emailing a friend Looking for the secure Internet symbols is the only safe way to upload financial information online.

Question #19 Always unplug or cover your webcam when not in use. TRUE FALSE

Question #19 Always unplug or cover your webcam when not in use. TRUE FALSE It is a good idea to protect your privacy by disconnecting or covering your webcam when it is not in use.

Question #20 How do you know that a web site has a secure connection? There is a lock in the top right or bottom right of your web browser There is a red flashing pop-up that informs you The web address looks to be legitimate It is impossible to know

Question #20 How do you know that a web site has a secure connection? There is a lock in the top right or bottom right of your web browser There is a red flashing pop-up that informs you The web address looks to be legitimate It is impossible to know You should always look for the locked lock on the web browser page to make sure the site is secure before giving any personal information concerning finances.