Presentation is loading. Please wait.

Presentation is loading. Please wait.

Important Facts you should know about the Net

Similar presentations


Presentation on theme: "Important Facts you should know about the Net"— Presentation transcript:

1 Important Facts you should know about the Net
Online Safety Important Facts you should know about the Net

2 The Cyber Community Cyberspace, the Internet, can be thought of as a community called the cyber community. It is comprised of places (websites) in which real people interact.

3 Since the Internet community is made up of real people and real places, it’s important to think about the safety issues it presents. Both communities contain inappropriate, as well as appropriate places to visit. Just like in the real community, inappropriate places in the cyber community are unsafe, and should be avoided.

4 Websites that are inappropriate for kids and teens include:
Sites that ask for money for any reason Sites that ask for your personal information such as name and address, Gambling sites Sites which contain adult content Sites which tell about violence or hate towards people.

5 Harmful Internet Material
While your using your account you are exposed to: Spam Scam Flaming Virus such as: Trojan, Worms

6 Harmful Internet Material
While your opening a website you are exposed to: Identity theft Pop-ups Hackers Spyware Phishing Virus such as: Trojan, Worms

7 Remember that people online may not be who they say they are.

8 The Internet presents a special problem -
You can get to inappropriate places just by clicking on links from searches, advertisements, or that seem perfectly appropriate. OOPS!

9 Think About It - Websites like this are taking away YOUR FREEDOM to travel where you want to go on the Internet! The important thing to remember is that it’s not your fault if you get to an inappropriate website by mistake.

10 The best way to handle inappropriate websites is to immediately exit.

11 Online Predators Some people lie about who they are and what they want on the Internet for various reasons. Sometimes it is to steal an identity or to bully. Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators.

12 Minimize Dangers Choose screen name carefully
Don’t reveal information online Never tell anyone: Your name or family names Address,  Age, Phone number         Never give a stranger your picture School Choose people to communicate with online carefully No matter what – Tell an adult if you are made to feel uncomfortable online. Tell an adult if you are approached by someone who discusses inappropriate things or wants to meet you offline.

13 A Little Prevention… Prepare yourself - Many online problems can be avoided or dealt with safely. Keep in mind the 4 R’s RECOGNIZE REFUSE RESPOND REPORT It is best to act smartly when online. These 4 R’s can apply to many online safety hazards. For example – being aware of how a predator finds the victim and understanding that people online are strangers, allows one to act appropriately when faced with those situations: RECOGNIZE techniques used by online predators to deceive or intimidate their victims. REFUSE requests for personal information or a face-to-face meeting. RESPOND assertively by exiting the program, logging off, or turning off the computer. REPORT any suspicious or dangerous contact that makes you or your child feel uncomfortable. The 4 R’s also hold true for cyber bullying: RECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address. REFUSE to open or read any message from a cyber bully. RESPOND assertively by leaving the chat room without responding or the letter unopened. REPORT cyber bullying to the ISP, the school, or law enforcement as needed to stop it immediately. And it is also true for identity theft scams. By being aware of the latest ploys such as phishing s (sending what looks like a reputable asking for personal information) one is better equipped to deal appropriately with them. RECOGNIZE techniques used by identity thieves to obtain people’s personal information. REFUSE to provide personal information by phone or if you didn’t initiate the communication. RESPOND assertively by contacting the three U.S. credit bureaus and put a fraud alert on your credit. REPORT any unusual, suspicious, or fraudulent activities to law enforcement authorities.

14 RECOGNIZE RECOGNIZE techniques used by online predators to deceive or intimidate their victims. RECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address. RECOGNIZE techniques used by identity thieves to obtain people’s personal information.

15 REFUSE REFUSE requests for personal information or a face-to-face meeting. REFUSE to open or read any message from a cyber bully. REFUSE to provide personal information by phone or if you didn’t initiate the communication.

16 RESPOND RESPOND assertively by exiting the program, logging off, or turning off the computer. RESPOND assertively by leaving the chat room without responding or leaving the letter unopened.

17 REPORT REPORT any suspicious or dangerous contact that makes you feel uncomfortable. REPORT cyber bullying to your parents and the school as needed to stop it immediately. REPORT to your parents all the phishing s (sending what looks like a reputable asking for personal information). .

18 It is in your hands! Pledge of Safe Surfing Reglas Familiares
Promesa de Navegar Seguro

19 Internet Security Software
These programs help you to stay protected and includes: Firewalls can limit or stop access to a computer by unauthorized people or systems. Filters can restrict what is viewed and downloaded from the Internet. Anti Spam pop-up blocker

20 Safe Engines and Searchers
NetTrekker OneKey.Com Ask for Kids Activity Search Yahooligans Web Guide KidsClick Web Search

21

22

23 Spam Spam is the equivalent of junk mail or annoying phone calls. Electronic mail that is not requested by the recipient, usually of an advertising or promotional nature.

24 Scam Scammers use the Internet in a number of ways to promote fraud through or the World Wide Web. Scams are often set up for a financial benefit.

25 Flaming Flaming is the sending of messages that include bad language or repeat messaging especially of undesirable or obscene text.

26 Virus A virus is a software program designed to infect, destroy, modify or cause other undesirable effects on computer systems

27 Trojan A program that pretends to be useful (e.g. screen saver) but once installed performs malicious functions, such as allowing others access.

28 Worm A worm is a malicious self-replicating software program able to gain access to computers or networks and cause harm by erasing, changing, distributing or manipulating information.

29 Anti-Spam Software installed on a home computer or ISP server to block or filter unsolicited junk (spam).

30 pop-up blocker A pop-up blocker is a program designed to prevent a pop-up ad from opening in a browser. E.g. Internet Explorer

31 Identity theft Identity theft occurs when somebody steals personal information for fraudulent or criminal purposes.

32 Pop-ups Pop-ups are small windows that appear in the foreground (Pop-up) or background (Pop-under) of a browser window. It may contain unwanted content.

33 Hacker/Hacking In computer circles a 'hack' is defined as a clever solution to a computer programming problem, so a 'hacker' is a clever programmer. The term 'hacker' has come to be generally applied to anyone who breaks into web sites or computer systems, although 'cracker' is more appropriate.

34 Spyware Spyware is a program intentionally installed on a computer for the purpose of collecting information and sending it back to another source.

35 Phishing Phishing is where a fraudster pretending to be from a legitimate organization, such as a bank, sends misleading s requesting confidential personal and financial details.


Download ppt "Important Facts you should know about the Net"

Similar presentations


Ads by Google