Presentation on theme: "Important Facts you should know about the Net"— Presentation transcript:
1 Important Facts you should know about the Net Online SafetyImportant Facts you should know about the Net
2 The Cyber CommunityCyberspace, the Internet, can be thought of as a community called the cyber community. It is comprised of places (websites) in which real people interact.
3 Since the Internet community is made up of real people and real places, it’s important to think about the safety issues it presents.Both communities contain inappropriate, as well as appropriate places to visit.Just like in the real community, inappropriate places in the cyber community are unsafe, and should be avoided.
4 Websites that are inappropriate for kids and teens include: Sites that ask for money for any reasonSites that ask for your personal information such as name and address,Gambling sitesSites which contain adult contentSites which tell about violence or hate towards people.
5 Harmful Internet Material While your using your account you are exposed to:SpamScamFlamingVirus such as: Trojan, Worms
6 Harmful Internet Material While your opening a website you are exposed to:Identity theftPop-upsHackersSpywarePhishingVirus such as: Trojan, Worms
7 Remember that people online may not be who they say they are.
8 The Internet presents a special problem - You can get to inappropriate places just by clicking on links from searches, advertisements, or that seem perfectly appropriate.OOPS!
9 Think About It -Websites like this are taking away YOUR FREEDOM to travel where you want to go on the Internet!The important thing to remember is that it’s not your fault if you get to an inappropriate website by mistake.
10 The best way to handle inappropriate websites is to immediately exit.
11 Online PredatorsSome people lie about who they are and what they want on the Internet for various reasons.Sometimes it is to steal an identity or to bully.Other times it is to meet children and teens to form an inappropriate relationship. These people are known as online predators.
12 Minimize Dangers Choose screen name carefully Don’t reveal information onlineNever tell anyone:Your name or family namesAddress, Age, Phone number Never give a stranger your pictureSchoolChoose people to communicate with online carefullyNo matter what – Tell an adult if you are made to feel uncomfortable online.Tell an adult if you are approached by someone who discusses inappropriate things or wants to meet you offline.
13 A Little Prevention…Prepare yourself - Many online problems can be avoided or dealt with safely. Keep in mind the 4 R’sRECOGNIZEREFUSERESPONDREPORTIt is best to act smartly when online. These 4 R’s can apply to many online safety hazards.For example – being aware of how a predator finds the victim and understanding that people online are strangers, allows one to act appropriately when faced with those situations:RECOGNIZE techniques used by online predators to deceive or intimidate their victims.REFUSE requests for personal information or a face-to-face meeting.RESPOND assertively by exiting the program, logging off, or turning off the computer.REPORT any suspicious or dangerous contact that makes you or your child feel uncomfortable.The 4 R’s also hold true for cyber bullying:RECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address.REFUSE to open or read any message from a cyber bully.RESPOND assertively by leaving the chat room without responding or the letter unopened.REPORT cyber bullying to the ISP, the school, or law enforcement as needed to stop it immediately.And it is also true for identity theft scams. By being aware of the latest ploys such as phishing s (sending what looks like a reputable asking for personal information) one is better equipped to deal appropriately with them.RECOGNIZE techniques used by identity thieves to obtain people’s personal information.REFUSE to provide personal information by phone or if you didn’t initiate the communication.RESPOND assertively by contacting the three U.S. credit bureaus and put a fraud alert on your credit.REPORT any unusual, suspicious, or fraudulent activities to law enforcement authorities.
14 RECOGNIZERECOGNIZE techniques used by online predators to deceive or intimidate their victims.RECOGNIZE ‘flaming’ and cyber bullying techniques and the bully’s screen name or address.RECOGNIZE techniques used by identity thieves to obtain people’s personal information.
15 REFUSEREFUSE requests for personal information or a face-to-face meeting.REFUSE to open or read any message from a cyber bully.REFUSE to provide personal information by phone or if you didn’t initiate the communication.
16 RESPONDRESPOND assertively by exiting the program, logging off, or turning off the computer.RESPOND assertively by leaving the chat room without responding or leaving the letter unopened.
17 REPORTREPORT any suspicious or dangerous contact that makes you feel uncomfortable.REPORT cyber bullying to your parents and the school as needed to stop it immediately.REPORT to your parents all the phishing s (sending what looks like a reputable asking for personal information)..
18 It is in your hands! Pledge of Safe Surfing Reglas Familiares Promesa de Navegar Seguro
19 Internet Security Software These programs help you to stay protected and includes:Firewalls can limit or stop access to a computer by unauthorized people or systems.Filters can restrict what is viewed and downloaded from the Internet.Anti Spampop-up blocker
20 Safe Engines and Searchers NetTrekkerOneKey.ComAsk for KidsActivity SearchYahooligans Web GuideKidsClick Web Search
23 SpamSpam is the equivalent of junk mail or annoying phone calls.Electronic mail that is not requested by the recipient, usually of an advertising or promotional nature.
24 ScamScammers use the Internet in a number of ways to promote fraud through or the World Wide Web. Scams are often set up for a financial benefit.
25 FlamingFlaming is the sending of messages that include bad language or repeat messaging especially of undesirable or obscene text.
26 VirusA virus is a software program designed to infect, destroy, modify or cause other undesirable effects on computer systems
27 TrojanA program that pretends to be useful (e.g. screen saver) but once installed performs malicious functions, such as allowing others access.
28 WormA worm is a malicious self-replicating software program able to gain access to computers or networks and cause harm by erasing, changing, distributing or manipulating information.
29 Anti-SpamSoftware installed on a home computer or ISP server to block or filter unsolicited junk (spam).
30 pop-up blockerA pop-up blocker is a program designed to prevent a pop-up ad from opening in a browser. E.g. Internet Explorer
31 Identity theftIdentity theft occurs when somebody steals personal information for fraudulent or criminal purposes.
32 Pop-upsPop-ups are small windows that appear in the foreground (Pop-up) or background (Pop-under) of a browser window. It may contain unwanted content.
33 Hacker/HackingIn computer circles a 'hack' is defined as a clever solution to a computer programming problem, so a 'hacker' is a clever programmer. The term 'hacker' has come to be generally applied to anyone who breaks into web sites or computer systems, although 'cracker' is more appropriate.
34 SpywareSpyware is a program intentionally installed on a computer for the purpose of collecting information and sending it back to another source.
35 PhishingPhishing is where a fraudster pretending to be from a legitimate organization, such as a bank, sends misleading s requesting confidential personal and financial details.