Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

CYBER BULLYING An Overview CYBER BULLYING IS… The use of electronic communication technologies to intentionally engage in repeated or widely disseminated.
Cyber Bullying The newest form of bullying.. What is cyber bullying?  Being cruel to others by sending or posting harmful material using technological.
Bullying & Cyberbullying ◦What is it? ◦Examples ◦Impact and support for students ◦Bystander effect ◦Prevention.
Forms of Cyberbullying
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Cyberbullying Simple Guidelines for Parents, Teachers, and Students January 17, 2007.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
CYBERSAFETY Acting Sergeant Kate Brown Christchurch Police Youth Education.
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
BULLYING What Is The Definition of Bullying?
Presentation Secondary School Wexford Anti-Bullying Campaign BULLYING IS DELIBERATE, REPEATED HURTFUL BEHAVIOUR If you see it don’t support it! RECOGNISE.
CHRISTY BOWMAN ANGELA CORNETT JODI DAVIDSON KELLI JESSIE MELISSA MCDANIEL CAROLYN MITCHELL Cyberbullying and Sexting: The Grey Area.
Cyber-safety January 21, 2011 UFO. Cyber-safety Social Networking is a way of life.
Bullying & Cyber Bullying Presented by… Teresa Errickson, SMS Counselor A-L Stephanie Davis, SMS Counselor M-Z.
CYBERSAFE – PARENTING ONLINE. CYBERBULLYING DEFINITION: intended, deliberate, repeated, virtual hostile behaviour with the usage of ICT FORMS: Denigration.
Cyberbullying Internet Saftey: Information for H.S. Students.
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
By: Kinga Budziszewska, Ashley Hiralal, Jakila Maybury, and Lauren Moore.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Cyberbullying By: Kayla Banks EDF 204 Spring 2015.
CYBERBULLYING Hopkins School Guidance Program.
Anti-Bullying Presentation September 24 th, 2012.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
“Cyberbullying: a non-ending story in the digital era” Vasiliki Gountsidou Physisist MSc., member of the management committee of cost action for cyberbullying.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
WHAT WE ALL NEED TO KNOW. WHO’S BEHIND THE MASK..
As of 8/31/15 Cyberbullying. Learning Target: I can learn how to protect myself from cyberbullies. Success Criterion: I can identify 3 types of cyberbullying.
Cyberbullying A Student Guide.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
CYBER BULLYING CYBER BULLYING IS… Being cruel to others by sending or posting harmful material using technological means; an individual or group that.
Cyberbullying. Bullying vs. Cyber bullying Bullying is repeated aggressive behavior that is intentional and involves an imbalance of power or strength.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
August 24 th 2011 Digital Citizenship. Cell/Smart phones Slates and Tablets Social Network Sites Video Conferencing Online Gaming.
1 CYBER SAFETY.  Online Actions  Offline Consequences  What you type, say, or do online can have a short and/or long-term effect on your life. 2.
Cyberbullying The Digital World’s Ugly Reality Understanding the psychology behind it, the forms of it, and it’s prevention – a parent’s guide.
World of Technology Pam Bennett, Marcia Robie, Andrea Schakle.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Cyberbullying Terms & Definitions Source:
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Cyber Bullying. What is Cyber Bullying Being cruel to others by sending or posting harmful material using technological means; an individual or group.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Do unto others as you would have them do to you..
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Cyber-Bullying How to stay safe What to do if it happens to you.
Do Now Pick up a handout in the front of the room and answer the four questions to the best of your ability.
It’s Everyone’s Responsibility. Bullying Eyed in NJ Teen's Apparent Suicide: Sources NBC New York, March 31, 2012.
CAN BULLYING BE STOPPED?. What is bullying? According to the encyclopedia “Bullying is the repeated use of aggression by one or more people against another.
Internet Safety. Online Concerns: Contact Content Conduct.
Are you a bully?. 2  Cyberbullying is the use of technology for social cruelty, which can include harassment, impersonation, denigration, trickery,
Delete CyberBullying Boston Public Schools Cyber Safety Campaign.
Cyberbullying project
CYBER BULLYING.
If you see it don’t support it! RECOGNISE IT, REJECT IT, REPORT IT!
GOSSIP and CYBERBULLYING
Cyber Bullying 1. ONLINE.
Issues In media studies: Cyberbullying
Bullying and Harassment
Huntington Middle School Bully Awareness Plan
GOSSIP and CYBERBULLYING
Cyber Bullying.
Digital Citizenship Tech in TUSD.
Issues With Internet in College
Presentation transcript:

Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015

Cyber Security Program Cyberbullying Internet Security NSHA Cyber Seecurity25/2/2015

Cyberbullying The repeated use of information technology, including , instant message, blogs, chat rooms, pagers, cell phones, and gaming systems, to deliberately harass, threaten or intimidate others.” Cyberbullying, unlike physical bullying, does not provide an option for its victims to walk away NSHA Cyber Seecurity35/2/2015 Anonymity

Cyberbullying Data Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide (18 cases in 2012) NSHA Cyber Seecurity4 Cyberbullying Research Center 5/2/2015

Cyberbullying Tactics The National Crime Prevention Association lists tactics often used by teen cyberbullies. Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent NSHA Cyber Seecurity /2/2015

Cyberbullying Methods Flaming is a type of online fight. It is an act of sending or posting electronic messages that are deliberately hostile, insulting, mean, angry, vulgar or insulting, to one person or several, either privately or publicly to an online group. Denigration also known as "dissing,” occurs when a person sends or publishes cruel rumors, gossip or untrue statements about a person to intentionally damage the victim's reputation or friendships. Bash boards are online bulletin boards where people post anything they choose. Generally, the postings are mean, hateful and malicious. Impersonation can be particularly harmful and occurs when someone pretends to be or poses as another person. This is usually accomplished by breaking into someone’s account, by stealing a password and perhaps changing it, or by maliciously using that information provided by a friend (one reason to never give a password to anyone but a trusted adult). Once the impersonator has access to the victim's information, considerable damage can occur. By sending out s supposedly from the victim or by posting material online, the victim’s reputation or friendships can be irreparably harmed. Outing occurs when someone sends or publishes confidential, private, or embarrassing information, online. Private messages or images meant for private viewing, is then forwarded to others. NSHA Cyber Seecurity65/2/2015

Cyberbullying Methods cont. Trickery is when a person purposely tricks another person into divulging secrets, private information or embarrassing information, and publishes that information online. Exclusion is an indirect method of online bullying, intentionally excluding someone from an online group or community. Harassment is when the electronic bully repeatedly sends insulting, hurtful, rude, insulting messages. Images and videos are a rapidly growing concern. Due to the prevalence and accessibility of camera cell phones, photographs and videos of unsuspecting victims, taken in bathrooms, locker rooms or other compromising situations, are being distributed electronically. Some images are ed to other people, while others are published on video sites such as YouTube. Griefing involves chronically causing grief to other members of an online community, or rather, intentionally disrupting the immersion of another player in their game play. NSHA Cyber Seecurity7 5/2/2015

Bullying NYS Legislation "Harassment" AND "BULLYING" shall mean: the creation of a hostile environment by conduct or by [verbal] threats, intimidation or abuse interfering with a student's educational performance, opportunities or benefits, or mental, emotional or physical well-being; or conduct, verbal threats, intimidation or abuse that] Reasonably causes or would reasonably be expected to cause a student to fear for his or her physical safety Reasonably causes or would reason ably be expected to cause physical injury or emotional harm to a student; or )occurs off school property and creates or would foresee ably create a risk of substantial disruption within the school environment, where it is foreseeable that the conduct, threats, intimidation or abuse might reach school property NSHA Cyber Seecurity85/2/2015

Next Steps Create parent committee Adopt Cyber security program Cyber security policy's and procedures Cyberbulling policy Code of conduct Whistle blower policy 5/2/2015NSHA Cyber Seecurity9

Teacher information Review the school’s Computer and Internet AUP with students and don’t let students get away with violations. Supervise students as closely as possible when they are online, especially if your school allows instant messaging, blogs and chats. Help children understand the consequences of cyber bullying; harassment and threats can be become the basis for civil litigation and criminal action. This can include parents being sued if their children violate civil statutes relating to invasion of privacy, defamation and so on.. Instruct children on what to do it they encounter cyber bullying. Emphasize that those who are being cyber bullied are not responsible for what is happening, they are victims. Encourage students to stand up for others who are being bullied. Look for signs that students are being bullied. Continually promote positive use of technology. NSHA Cyber Seecurity10 5/2/2015

NSHA Cyber Seecurity115/2/2015

NSHA Cyber Seecurity125/2/2015

Internet Security Threats 5/2/2015NSHA Cyber Seecurity13 Criminals Child predators Cyberbullies Inappropriate content Fanatical religious groups

Types Social networking – Facebook – Twitter – Instagram – Google + Chat rooms Message boards s Texts 5/2/2015NSHA Cyber Seecurity14

5/2/2015NSHA Cyber Seecurity15 Would you leave your child alone in a playground ???

Risks Privacy leakage Age-inappropriate content Online grooming Child predators Identity theft Home theft Physical assault Emotional implications Financial loss 5/2/2015NSHA Cyber Seecurity16

5/2/2015NSHA Cyber Seecurity17 Law enforcement officials estimate that more than 50,000 sexual predators are online at any given moment. According to the FBI, Chat rooms offer the advantage of immediate communication around the world and provide the pedophile/predator with an anonymous means of recruiting children into sexually illicit relationships. Only 1/3 of households with Internet access are protecting their children with filtering or blocking software. 70% of children 7 to 18 years old have accidentally encountered online pornography, often through a web search while doing homework. There is a fifty percent chance that if your child is in a chat room designated for under aged children, the stranger he or she is talking to is a sexual predator logged in under a false identity. 86% of girls claimed to be able to conduct online chats without their parents knowing, 57% could read their parents’ , and 54% could conduct a cyber relationship. Cyber Statistics

Next Steps Acceptable usage policy Content filtering Educate parents and students 5/2/2015NSHA Cyber Seecurity18