Online Safety 2.02 Remember the rules of online safety.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
INTERNET SAFETY.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
You Want Me To Do What? Part 2 Presented by Keystone Computer Concepts
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
SACHIN DEDHIA Cyber Crime Investigator Cert. Ethical Hacker(USA)
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
IT security By Tilly Gerlack.
Surfing the Internet Teaching Children about the SMARTS of using the Internet Are you being responsible when you use the Internet??? B E SMART! B E RESPONSIBLE!
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
Agenda for August 27, 2014 Daily Prayer (Student will be chosen to read) Typing Teacher’s Lecture (Electronic Communication and Online Safety) –Student.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Information Security Sharon Welna Information Security Officer.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
I promise…. To always ask my parents before going online.
Safety and Security issues of using ICT Alys brooks.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Managing Windows Security
2.02 Remember the rules of online safety.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Remember the rules of online safety.
2.02 Remember the rules of online safety.
HOW DO I KEEP MY COMPUTER SAFE?
ICT Communications Lesson 3: Internet Life and Privacy
What devices use the internet?
Presentation transcript:

Online Safety 2.02 Remember the rules of online safety.

2.02 Rememberl the rules of online safety. Slide 2 Never disclose personal information Full name Home address Phone number Social security number Passwords Names of family members Credit card numbers Your photograph Why?

2.02 Rememberl the rules of online safety. Slide 3 Do you have a My Space account? According to the article published by Scott J. Cech, “..., a significant percentage of colleges and universities sometimes dig into would-be undergraduates’ social networking profiles.” The article describes how some college admissions officers research a potential student’s Internet information to assist in the careful and limited selection of students. “No school wants to give a very prestigious scholarship to some [student] who’s going to show up in the newspaper the next day with pictures of [student] standing on a beer keg.” Employers are also investigating social networking profiles of potential employees.

2.02 Rememberl the rules of online safety. Slide 4 Personal Safety – Warning Signs What does online yelling look like? What should you do if someone is yelling at you online? What is a cyberbully? What should you do if you are bullied online? What should you do if someone sends you explicit materials?

2.02 Rememberl the rules of online safety. Slide 5 Safeguard against financial risk If purchasing something online, make sure that the site is secure. The URL should begin with https: A lock icon is displayed and is interactive – not just a graphic image. Does the site contain a site seal? Many, but not all sites will contain a seal that is highly visible and difficult to copy which indicates a safe site.

2.02 Rememberl the rules of online safety. Slide 6 What are computer hazards? Viruses – software that attaches to programs installed on a computer or that are programmed to load when an is opened. Spam – unwanted s from advertisers and users that contain malicious and explicit material or try to sell products or services. Spyware – malicious software designed to take partial control of a computer’s operation without the knowledge or consent of the user. Often used to track a user’s browsing and spending habits while online and also to mine for personal information.

2.02 Rememberl the rules of online safety. Slide 7 Protect against online hazards Beware of any s or sites that promise you will get rich quick. These s are usually a way for hackers to mine your computer for personal or financial information. Never open an from someone you do not know. Never download programs unless you know they are safe and contain no hidden files.