Important Facts you should know about the Net

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Mayfield Intermediate
Information and resources
Internet Safety in Schools
© 2010 i-SAFE Inc. an i-SAFE presentation. © 2010 i-SAFE Inc. Learning Goals YOU WILL: Understand the need for being safe in the cyber community - just.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
The Internet.
The Plan Today you will be learning about personal safety when online. This unit consists of four mini lessons. The slide show covers all lessons.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
Stranger Danger: Internet Safety. Not everyone on the internet are who they say they are…  Sometimes a stranger can try to gain your trust by pretending.
Identifying Online Predators
Community Level 7. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The Internet & Using it Safely! Morgan Johnson. Benefits of the Internet Plethora of information delivered quickly The internet can be helpful when creating.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Let’s talk about Internet Safety!
A Student’s Guide to Proper and Safe Web Behavior
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
INTERNET SAFETY Tips for becoming a “surfer” dude!
IT security By Tilly Gerlack.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
YOU Only YOU Can Stop Internet Hazards NETS: 5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
What are your kids doing online?
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Internet Safety Tips.
Personal Safety Online There are many dangers youth face while online, such as: Predators – strangers who may cause harm Cyber bullies Inappropriate websites.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
Acceptable Use of Internet & Technology and Netiquette for High School Students.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Safety and the Internet Created by Lynne Schalman The Original Teaching Company
Appropriate Online Behavior
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Internet Safety Mrs. Lijó. Some Names for the Internet Cyberspace The Web The Net The Information Highway The World Wide Web.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Safety.
Protect Your Computer Against Harmful Attacks!
Rules To Help You Navigate the Internet Safely
Personal Safety Online
Presentation transcript:

Important Facts you should know about the Net Online Safety Important Facts you should know about the Net

The Cyber Community Cyberspace, the Internet, can be thought of as a community called the cyber community. It is comprised of places (websites) in which real people interact.

Since the Internet community is made up of real people and real places, it’s important to think about the safety issues it presents. Both communities contain inappropriate, as well as appropriate places to visit. Just like in the real community, inappropriate places in the cyber community are unsafe, and should be avoided.

Websites that are inappropriate for kids and teens include: Sites that ask for money for any reason Sites that ask for your personal information such as name and e-mail address, Gambling sites Sites which contain adult content Sites which tell about violence or hate towards people.

Harmful Internet Material While your using your E-mail account you are exposed to: Spam Scam Flaming Virus such as: Trojan, Worms

Harmful Internet Material While your opening a website you are exposed to: Identity theft Pop-ups Hackers Spyware Phishing Virus such as: Trojan, Worms

Remember that people online may not be who they say they are.

The Internet presents a special problem - You can get to inappropriate places just by clicking on links from searches, advertisements, or e-mail that seem perfectly appropriate. OOPS!

Think About It - Websites like this are taking away YOUR FREEDOM to travel where you want to go on the Internet! The important thing to remember is that it’s not your fault if you get to an inappropriate website by mistake.

The best way to handle inappropriate websites is to immediately exit.

Online Predators Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators.

Minimize Dangers Choose screen name carefully Don’t reveal information online Never tell anyone: Your name or family names Address,  Age, Phone number         Never give a stranger your picture School Choose people to communicate with online carefully No matter what – Tell an adult if you are made to feel uncomfortable online. Tell an adult if you are approached by someone who discusses inappropriate things or wants to meet you offline.

A Little Prevention… Prepare yourself - Many online problems can be avoided or dealt with safely. Keep in mind the 4 R’s RECOGNIZE REFUSE RESPOND REPORT It is best to act smartly when online. These 4 R’s can apply to many online safety hazards. For example – being aware of how a predator finds the victim and understanding that people online are strangers, allows one to act appropriately when faced with those situations: RECOGNIZE techniques used by online predators to deceive or intimidate their victims. REFUSE requests for personal information or a face-to-face meeting. RESPOND assertively by exiting the program, logging off, or turning off the computer. REPORT any suspicious or dangerous contact that makes you or your child feel uncomfortable. The 4 R’s also hold true for cyber bullying: RECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address. REFUSE to open or read any message from a cyber bully. RESPOND assertively by leaving the chat room without responding or the letter unopened. REPORT cyber bullying to the ISP, the school, or law enforcement as needed to stop it immediately. And it is also true for identity theft scams. By being aware of the latest ploys such as phishing emails (sending what looks like a reputable email asking for personal information) one is better equipped to deal appropriately with them. RECOGNIZE techniques used by identity thieves to obtain people’s personal information. REFUSE to provide personal information by phone or email if you didn’t initiate the communication. RESPOND assertively by contacting the three U.S. credit bureaus and put a fraud alert on your credit. REPORT any unusual, suspicious, or fraudulent activities to law enforcement authorities.

RECOGNIZE RECOGNIZE techniques used by online predators to deceive or intimidate their victims. RECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address. RECOGNIZE techniques used by identity thieves to obtain people’s personal information.

REFUSE REFUSE requests for personal information or a face-to-face meeting. REFUSE to open or read any message from a cyber bully. REFUSE to provide personal information by phone or email if you didn’t initiate the communication.

RESPOND RESPOND assertively by exiting the program, logging off, or turning off the computer. RESPOND assertively by leaving the chat room without responding or leaving the letter unopened.

REPORT REPORT any suspicious or dangerous contact that makes you feel uncomfortable. REPORT cyber bullying to your parents and the school as needed to stop it immediately. REPORT to your parents all the phishing emails (sending what looks like a reputable email asking for personal information). .

It is in your hands! Pledge of Safe Surfing Reglas Familiares Promesa de Navegar Seguro

Internet Security Software These programs help you to stay protected and includes: Firewalls can limit or stop access to a computer by unauthorized people or systems. Filters can restrict what is viewed and downloaded from the Internet. Anti Spam pop-up blocker

Safe Engines and Searchers NetTrekker OneKey.Com Ask for Kids Activity Search Yahooligans Web Guide KidsClick Web Search

http://www.kidshield.com/safetytest/

Spam Spam is the e-mail equivalent of junk mail or annoying phone calls. Electronic mail that is not requested by the recipient, usually of an advertising or promotional nature.

Scam Scammers use the Internet in a number of ways to promote fraud through email or the World Wide Web. Scams are often set up for a financial benefit.

Flaming Flaming is the sending of messages that include bad language or repeat messaging especially of undesirable or obscene text.

Virus A virus is a software program designed to infect, destroy, modify or cause other undesirable effects on computer systems

Trojan A program that pretends to be useful (e.g. screen saver) but once installed performs malicious functions, such as allowing others access.

Worm A worm is a malicious self-replicating software program able to gain access to computers or networks and cause harm by erasing, changing, distributing or manipulating information.

Anti-Spam Software installed on a home computer or ISP e-mail server to block or filter unsolicited junk e-mail (spam).

pop-up blocker A pop-up blocker is a program designed to prevent a pop-up ad from opening in a browser. E.g. Internet Explorer

Identity theft Identity theft occurs when somebody steals personal information for fraudulent or criminal purposes.

Pop-ups Pop-ups are small windows that appear in the foreground (Pop-up) or background (Pop-under) of a browser window. It may contain unwanted content.

Hacker/Hacking In computer circles a 'hack' is defined as a clever solution to a computer programming problem, so a 'hacker' is a clever programmer. The term 'hacker' has come to be generally applied to anyone who breaks into web sites or computer systems, although 'cracker' is more appropriate.

Spyware Spyware is a program intentionally installed on a computer for the purpose of collecting information and sending it back to another source.

Phishing Phishing is where a fraudster pretending to be from a legitimate organization, such as a bank, sends misleading e-mails requesting confidential personal and financial details.