Living In The Information Age. Keeping your Information Safe Secure ways to access the internet. Posting personal information on Facebook and other social.

Slides:



Advertisements
Similar presentations
E - safety How e-safe are you?.
Advertisements

“Cyber bullying is when someone uses different types of technology, like mobile phones, games consoles (PS3 or XBOX 360) and computers to threaten,
Don’t be bullied, or be a bully.
Internet Online Safety How to have FUN and Stay in Control.
R U CYBERSAFE? – BEAT THE CYBERBULLY It’s not smart It’s not funny It’s not even amusing It’s darn right ignorant and the actions of a coward!!
Bullying and Protecting Children in the Virtual World Dan Wilchek Exeter Township School Distirct
What is Cyber-Bullying? Cyber-Bullying is the use of technology to harass, threaten, embarrass or target another person. Social Networks Instant.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
The Internet is Forever
Cyber bullying Lara Climer and Michele Fesenbek. Interesting Tidbits  Over 87% of teens age use the internet  95% of parents do not understand.
Information for Students and Families
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Do you know how to keep yourself safe?

Cyber bullying Aj Newman Per 2 Jan/26/11. Cyber bullying  Cyber bullying is everywhere and its true.  Cyber bullying is horrible and there are multiple.
Internet Safety By: Brianna Brown. Index What Is Internet Safety? Passwords Cyber Bullying Safety Tips Quiz.
Cyber Bullying By Elizabeth Ward. What is Cyber Bullying? Cyber Bullying is when one minor is targeted by another minor through threats, torments, harassment,
How To Protect Your Privacy and Avoid Identity Theft Online.
Being Good Digital Citizens with Today’s Technologies.
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
What is cyberbullying? Contributed by Joanne Thompson All resources in the "Safeguarding Resources" section of our resource bank have been submitted by.
What are the differences between bullying and cyberbullying?
By: Sophia Dermouche & Maheen Khalid
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Stay Safe in Cyberspace By: Mrs. Marple Never Give out personal information. Such as: Your home address Your phone number The name and location of your.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Anti- bullying week Year 4.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Controlling Your Social Networking Privacy Settings Stay safe online!
By: Anthony Miele, Matt McCune Shamar Potter  Cyber bullying statistics refers to Internet bullying. Cyber bullying is a form of teen violence that.
Internet Safety Mrs. Oliver Technology
Nearly 42% of kids have been bullied online and almost one in four have had it happen more than once.
Do pictures always give truthful information? Can publishing it be hurtful??
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Internet Safety Blue Hills School. Internet Safety Use these Tips Don’t share your address, phone number, school name or your parents credit card number.
STOP CYBERBULLYING By Brandon Tremblay “Suicide does not end the chances of life getting worse, it simply eliminates the chances of it getting better”
Cyberbullying By:Ali Komorek. What is Cyberbullying O Cyberbullying is bullying that takes place using electronic technology. (
Overview Internet Privacy & Safeguards Social Networking Potential Threats Cyber-bullying.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
Stop the madness!!!  1. Nearly 35% of kids have been threatened online and almost 1/5 have had it happen more then once  2. Among this percentage,
Information System Security. Agenda Survey Results Social Networking Multi-Factor Authentication & Passwords Phishing Schemes Cyber Bullying Advice.
By: Jithin and Rey.  Cyber bullying is a form of bullying, which is carried out through an internet service such as , chat room, discussion group,
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Cyber Bullying By: Timothy Alexander Paul Cuffe Room 315.
E-safety By Nicholas + Jamie. What is E-safety  E-Saftery stands for electronic safety. Its all about staying safe on your elctronic divices. It is concerned.
CYBER BULLYING!. WHAT IS CYBER BULLYING? Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology,
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
Cyber Bullies “Cyber bullying is the use of modern communication technologies to embarrass, humiliate, threaten, or intimidate an individual in the attempt.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Social Networks are a website or other application which enables users to communicate with each other by posting information, comments, messages, images,
Cyber Safety. Privacy What is safe to talk about online?
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
What Would You Do? The Risks of Behavior on the Internet.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
E-safety Helping your children stay safe on-line A presentation for Parents.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Internet Safety Training For WYWLA Middle School Students.
Internet Safety Training For WYWLA High School Students Intro for Parents Responsible Use Policy.
Hoover Middle School Cyber Safety Discussion
Internet Safety How to stay safe online.
Carroll County Schools Advisement
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
Online Safety! Created by Educational Technology Network
Presentation transcript:

Living In The Information Age

Keeping your Information Safe Secure ways to access the internet. Posting personal information on Facebook and other social networking sites. Think before pressing Enter! Cyber-bullying. Example of revealing too much. Securing your passwords and choosing strong passwords. Securing your smart phones and other mobile devices. The power of Google. “Would I want my Mom to see this?”

Accessing the Internet Safely Protect your home computer with passwords Secure your Wi-Fi Utilize virus protection software like Norton, AVG Antivirus, McAfee

Facebook Drama Revealing too much. Images, and personal information Use all privacy options available on social networking sites. Stranger Danger – accepting all friend requests. Choosing an address Your Future Think twice before pressing enter

Cyber bullying facts Nearly 43% of kids have been bullied online. One in four has had it happen more than once. One in three teens has experienced cyber-threats online. Nine out of ten middle school students have had their feelings hurt online. About 75% have visited a website bashing another student. Four out of ten middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them. The psychological and emotional outcomes of cyber bullying are similar to real-life bullying outcomes,

Cyber bullying facts (con’t) except for the reality that with cyber bullying there is often no escape. School ends at 3 p.m., while the Internet is available all the time. Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying. Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying. About 58% of kids admit someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once. 90% of victims will not inform a parent or trusted adult of their abuse. Cyber bullying has increased in recent years. In a national survey of year olds, twice as many children indicated they had been victims and perpetrators.

Girl commits suicide after being cyber bullied Amanda Todd began using the internet in for cyber chatting in 7 th grade. She gained confidence from the kind words that other people had to say about her. However, one day she made the mistake of posting a picture of herself topless. The person took the picture and began to use it to blackmail her. The trouble followed her from the point on and she couldn’t escape it. ada/article/ b-c-victim- of-cyber-bullying-commits-suicide

Choosing strong passwords Length. Make your passwords long, with eight or more characters. Complexity. Include letters, punctuation, symbols, and numbers. Use the entire keyboard, not just the letters and characters you use or see most often. Variation. Change your password often. Variety. Don't use the same password for everything. Sharing. Never share your passwords. Management. Keep track of all your passwords with a utility like KeePass or LastPass.

Strong Password Example Who is my fave singer? Justin Bieber, of course! Select the first letter from each word... Who is my fave singer? Justin Bieber, of course....and combine into a new word. Wimfs?JB,oc. Then, replace a few letters with numbers or punctuation. W1mf$?JB,0c.

Just How Secure? happiness 5,429,503,678,976 possible combinations 22 minutes Happiness 2,779,905,883,635,712 possible combinations 8 days

Just How Secure? 27,206,534,396,294,948 possible combinations 78 days 95,151,694,449,171,440 possible combinations 275 days

Just How Secure? 66,483,263,599,150,105,000 possible combinations 526 years W1mf$?JB,0c. 612,709,757,329,767,400,000,000 possible combinations 4,854,003 years

Celebrities Hacked 34-year old Jacksonville, Florida resident Christopher Chaney hacked into several celebrity accounts by simply resetting their passwords by accurately guessing their security questions. Scarlett Johansson was born in New York City to an Ashkenazi Jewish mother, Melanie Sloan and a Danish father, Karsten Johansson. Scarlett showed a passion for acting at a young age and starred in many plays. She has a sister named Vanessa Johansson, a brother named Adrian, and a twin brother named Hunter Johansson born three minutes after her... See full bio » Born: Scarlett Ingrid Johansson November 22, 1984 in New York City, New York, USA

Lock Your Mobile Device Computer. Your phone or tablet is really a computer. It contains contacts, documents, text messages, pictures, and other personal data. Privacy. Like a computer, no one should be able to access your private information except for you. Why Lock? In case you lose device or it is stolen, to prevent snooping, not to mention limiting pocket calls. Preventing Access. You can lock your device using a passcode or PIN, a password, or a special swiping gesture. Handout. More information.

USE GOOGLE TO YOUR ADVANTAGE GOOGLE YOUR NAME AND SEARCH THE LINKS FOR FALSE INFORMATION. TRY OTHER SEARCH ENGINES TOO, LIKE BING. SEE HOW YOUR INFORMATION IS MAKING IT TO THE WORLD.

“Would I want my Mom to see this?” Family members Potential colleges/ schools Potential employers Friends Co-workers Use the Internet to your advantage, not to put yourself in a negative light.

“Would I want my Mom to see this”