Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT 1 4.0 Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.

Similar presentations


Presentation on theme: "Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT 1 4.0 Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply."— Presentation transcript:

1 Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT 1 4.0 Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply Copyright Fair Use Guidelines

2 Privacy What do you like to do online? What does the word “privacy” mean to you? How does the meaning change between the real world and the online world? How is your privacy affected when someone knows your name? your address? How about when someone reads your e-mail? How is it affected when someone follows you around all day? These examples represent a loss of privacy.

3 My Privacy Everyday - https://www.priv.gc.ca/youth- jeunes/fs-fi/day-quotidien_e.asp https://www.priv.gc.ca/youth- jeunes/fs-fi/day-quotidien_e.asp think about which of the breaches of privacy discussed here would worry you. Which private information would you not mind sharing with the world? On a separate sheet of paper create a list of 4 online activities, and then rank the breaches from most invasive to least invasive. (exit ticket) https://www.priv.gc.ca/youth-jeunes/fs-fi/day-quotidien_e.asp

4 Digital Footprint Every time you go online you leave a trail This is called your digital footprint What kind of digital footprint do you leave behind?

5 Digital Dossier Dossier - a file of papers containing a detailed report Digital Dossier - a collection of all your online data that includes secure private records as well as your public online identity.

6 Social Networking Sites and Privacy Social network - an online community of people with a commo n interest who use a website or other technologies to communicate with each other and share information, resources, etc. Social networking sites are one of the most popular online activities and it poses the greatest risk to privacy.

7 Using Social Networking Safely Go to http://www.gcflearnfree.org/internets afetyforkids/4 http://www.gcflearnfree.org/internets afetyforkids/4 On a sheet of paper list the guidelines you should follow when using social networks (pg 2) (exit ticket) Do the interactive to learn about creating a social networking profile (pg 3)

8 Two Kinds of Stupid Discussion Questions On a sheet of paper write down your answers to these questions (exit ticket) Why does Eduardo say he was two kinds of stupid? What could Eduardo have done to prevent the pictures from getting out? What are the possible consequences for posting party pictures online? Other than party pictures, what other kinds of information or images are inappropriate to post online? How do cell phones and social media play a role in how information travels?

9 Cyber-Safety Techniques Privacy Settings on Social Networking Sites: Facebook - http://www.gcflearnfree.org/facebook101/5http://www.gcflearnfree.org/facebook101/5 Pintrest - http://www.gcflearnfree.org/pinterest/settings-and-privacyhttp://www.gcflearnfree.org/pinterest/settings-and-privacy Safely represent yourself in an online profile - http://www.gcflearnfree.org/onlinesafety/internetsafety/7.3 http://www.gcflearnfree.org/onlinesafety/internetsafety/7.3

10 Managing your Digital Footprint 1. Use Privacy Settings 2. Keep A List Of Accounts, then delete the ones you don’t use anymore 3. Don’t Overshare 4. Use A Password Keeper 5. Google yourself 6. Monitor linking accounts 7. Use a secondary e-mail 8. You don’t need 12 e-mail addresses 9. Sending is like publishing forever 10. Understand that searches are social 11. Use digital tools to manage your footprint Source: http://www.teachthought.com/technology/11-tips-for-students-tomanage-their-digital-footprints/http://www.teachthought.com/technology/11-tips-for-students-tomanage-their-digital-footprints/

11 Netiquette Netiquette refers to network etiquette for online communications Netiquette tips: Be respectful. Always treat others as you would like to be treated. A good rule of thumb is not to communicate anything online that you would not be willing to say to a person's face. Don't be too quick to take offense. In online communication, we usually cannot see facial expressions, judge body language, or hear tone of voice. Therefore, it's easy to misinterpret the meaning of a message or post. Also, the technology itself tends to make us less personable. Before taking the offensive, clarify a message with the sender. Use emoticons and abbreviations to convey meaning. To convey tone, humor, and meaning, learn common abbreviations, like lol (laugh out loud) and jk (just kidding), or use emoticons, such as :) or :(. However, be careful not to overuse these symbols or your messages might become annoying or difficult to read. Protect the privacy of others. As a courtesy, you should ask permission before posting photos or videos of others online. You should also protect the email addresses of others by deleting them from emails you forward. Check your language. Using offensive language online is unpleasant and can cause people to view you negatively. Take a few moments to check your communication before sending it, and avoid using foul or inappropriate language. Source: http://www.gcflearnfree.org/onlinesafety/internetsafety/7.4http://www.gcflearnfree.org/onlinesafety/internetsafety/7.4

12 Online Predators Online predators are bad people who watch and read your personal information online for the purpose of harassing you or doing you harm. Some of them have a sexual desire for minors and try to involve them in sexual conversations, images and face-to-face meetings for sex.

13 Video: Six Degrees of Information

14 Video: your photo fate

15 Video: Split Decisions


Download ppt "Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT 1 4.0 Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply."

Similar presentations


Ads by Google