Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Cyberbullying Old Problem, New Playground. Bullies are no longer restricted to the school yard. They are often online, out of the sight and earshot of.
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Breaking Trust On The Internet
Internet Safety and Awareness Cyberbullies and Predators Enfield High School Computer Network.
What is Ciberbullying? 1: Cyberbullying is using the Internet, cell phones, video game systems, or other technology to send or post text or images intended.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
Internet Phishing Not the kind of Fishing you are used to.
Dazed, Amazed and Googled Presented by Mrs. Cline Teacher Librarian Murrieta Valley High School.
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
Company LOGO Internet Safety A Community Approach.
CYBER BULLYING Cody O’Brien. Goals for Today’s Presentation Introduce Cyber bulling Identify forms of cyber bulling Steps to prevent it What to do if.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
What are the differences between bullying and cyberbullying?
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cybersafety.
What you should know as parents by Charles McKinley Parents’ Technology Night, 2013, sponsored by your PTSO.
Question  What was the internet attended for?  What is the internet known as?  Ans. Information super high way.
Reliability & Desirability of Data
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Cyberbullying Kim Mulkey.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
What’s the Big Deal About Bullying?
Rage Reaction: What do you know about cyber-bullying?
Children and teens are bullied everyday through , instant messaging, social networking and text messaging. Cyber Bullying By:Olivia Martin.
FATIN AFIQAH BINTI JUHARI AS
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Information Security Sharon Welna Information Security Officer.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Online Safety Parent Workshop Helping to keep your children safe online.
Lauren Sayah, Abby Wills, Sara Stahl. What is Cyber Bullying?  Is the use of electronic means by a minor to torment, threaten, harass, humiliate, embarrass.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Cybersafety 4 Kids: Smart Moves in an Online World.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Cybersafety 4 Kids: Smart Moves in an Online World.
ISYM 540 Current Topics in Information System Management
Phishing, what you should know
Pics, Flicks, and Sexting
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Tips and Information for Parents
Social Media Cybersafety.
Presentation transcript:

Day 3 Cybersafety Presented by FJUHSD Teacher Librarian

What is Cyberbullying Cyberbullying involves the use of electronic devices such as cell phones and computers to support deliberate, repeated, and hostile behavior by an individual or group that is intended to harm others. According to a survey done in 2007 by the National Crime and Protection Council, 43% of teens report that they have experienced some form of cyberbullying that year. The incidence of cyberbullying is higher among females than males. More than 50% of females age 15 to 16 years of age reported at least one cyberbullying incident.

Why do teens cyberbully? 81% Because they think it is funny 64% Because they don’t like the person 45% Because they view the victim as a loser 47% Because they feel there are no consequences for cyberbullying 45% Because they don’t think they will get caught 58% of students surveyed don’t think cyberbullying is a big deal

Do you think it was a big deal to these students and their loved ones? Rachael was stalked online by anonymous bully. She died by suicide on October 9, Ryan, a 13-year old, who died by suicide as a result of bullying at school and online. A cruel online hoax by a neighbor led to the suicide death of Megan. Stop Cyber bullying

What is a cyber-predator? A cyber-predator uses the internet to hunt for victims to take advantage of in anyway, including sexually, emotionally, psychologically, and financially. They know how to manipulate people by creating trust and friendships where none should exist. 77% of the target for online predators are teens aged 14 and older. 33% of teens received an aggressive sexual solicitation online in the past year. 75% of children are willing to share personal information online about themselves and their family in exchange for goods and services.

Phishing Phishing is to request confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data. 15% of online teens have received a fraudulent message, compared with 22% of adults. Always check your URL when navigating in social networks like MySpace and Facebook. If you click on an application and the URL does not have or has a URL that is just numbers like immediately exit out of that page.

How to stop the bad guys 1. Be suspicious of any with urgent requests for personal financial information. Do not respond to it. Phishers typically ask for information such as usernames, passwords, credit card numbers, social security numbers and the like. Phisher s are typically NOT personalized, while valid messages from your bank or e-commerce company generally are. 2. Don't use the links in an to get to any web page if you suspect the message might not be authentic. Instead, call the company on the telephone, or log onto the website directly by typing in the Web address in your browser. Don’t cut and paste the link from the message into your Internet browser — phishers can make links look like they go to one place, but that actually send you to a different site. 3. Avoid filling out forms in messages that ask for personal financial information. Phishers make very good fake forms. You should only communicate information such as credit card numbers or account information via a secure website or the telephone.

4. Don’t personal or financial information. is not a secure method of transmitting personal information. Unfortunately, no indicator is foolproof; some phishers have forged security icons like the lock icon on an order form. 5. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser. To make sure you're on a secure Web server, check the beginning of the Web address in your browsers address bar - it should be " rather than just " 6. Use the internet to shop for an item. Then telephone your order to the vendor rather than using the so-called secure order form. If there is no way to telephone in the order then check out item 5 above as one way the prevent phishing.

Works Cited Chait, Jennifer. “Cyberbullying Statistics.” lovetoknow. Web. 9 Sept Lopez, Maribel D. “Online Teens Are Not Immune To Phishing.” FORRESTER. Web. 13 Sept Make A Difference For Kids, Inc. “Cyberbullying.” Make A Difference For Kids. Web. 9 Sept National Crime Prevention Council. “Teens and Cyberbullying.” NCPC. Web. 9 Sept “Phishing Scams – 12 Ways to Stop Them.” Tweakspeed. Web. 16 Sept