SlideShare uma empresa Scribd logo
1 de 77
Internet Safety
    Mr Eric Castro
Tell a neighbor: What do you remember
  from your grammar school internet
           safety presentations?
Create a Positive Digital Footprint

       Protect Your Privacy

Protect Yourself from Identity Theft

   Protect Yourself from Bullies

 Protect Yourself from Predators

  Protect Yourself from Yourself
Create a Positive
Digital Footprint


                    1
Tell a neighbor: What are you most
proud of having produced or created
             that’s online?
Our digital footprint
is the evidence of our
online activities.
You want to
  leave positive
digital footprints.



          Lost by Stephen Nicholas
The New Yorker,
  3/22/2010
Protect Your Privacy


                       2
1) Do not inadvertently reveal
 personal information online
Block cookies
2) Keep a “clean” email
       account
3) Realize that you may be
        monitored
4) Do not reply to spammers,
            ever
5) Be conscious of web
       security
Passwords
Use a different secure password for
              each site
• Make sure your password is as long as possible

• Use as many different characters as possible

• Do not use personal information

• Do not use common words

• Do not use passwords that are easy to spot while
  you are typing them in
Come up with a sentence that is easy to remember




        Use the first letter of each word,
           including the punctuation
Come up with a sentence that is easy to remember

       Tron was a complete waste of money!

        Use the first letter of each word,
           including the punctuation

                   Twacwom!
Encryption
http://




https://
6) Be conscious of security on
      shared computers
7) Be conscious of home
   computer security
Protect Yourself from
    Identity Theft


                        3
Raise your hand: Has anyone that you
  know had their identity stolen?
IMG_4511 by John R Southern
To
  oM
    uc
       hC
         red
            it b
                yA
                  nd
                     re
                       sR
                          ue
                             da
It’s not about
     cash ...




       To
         oM
           uc

                                         it’s about
              hC
                red
                   it b
                       yA
                         nd

                                            debt
                            re
                              sR
                                 ue
                                    da
• Destroy private records and statements

• Secure your snail mail

• Safeguard your Social Security number

• Don’t leave a paper trail

• Monitor your credit report

• Review credit card statements carefully
Protect Yourself from
       Bullies


                        4
First ...
First ...




Change Begins Here by Trista Emlet
What exactly is
cyberbullying?
• IM/ Text             • Interactive gaming
  harassment
                       • Malicious code
• Stealing passwords
                       • Sending porn or
• Blogs                  junk email

• Web sites            • Impersonation

• Sending pictures     • Cyberbullying by
  through email &        proxy
  cell phones

• Internet polling
Why cyberbully?
What to do
• Don’t bully

• Don’t reciprocate

• Save evidence

• Tell a trusted adult
King on the march to Montgomery by Eliel Johnson
“In the end, we will remember not the words of
  our enemies, but the silence of our friends.”
                               King on the march to Montgomery by Eliel Johnson
Protect Yourself from
     Predators


                        5
http://i.imgur.com/cbRmA.jpg
Emotionally vulnerable

   Seeking attention


   Seeking affection

   Seeking validation
Chatroulette
Protect Yourself from
      Yourself


                        6
Tell a neighbor: What is the least
intelligent thing that you’ve seen
        someone put online?
http://failbook.failblog.org
http://failbook.failblog.org
http://failbook.failblog.org
e to his alleg ed attacker
Rocque pos    ted a messag
saying th  ey are 'done'.
                        ages can escal ate quickly.
Police   say such mess
                             the Internet  and they are
 "If a  young  person is on                 g in nature,
                ments that a  re threatenin
 mak   ing com                 e could be     looking at
    ey need     to realize w               ation because
 th
              harges, unwa  rranted retali
  cri minal c                  well as ha   mpering an
       their  comments as                      Sgt. Kelly
  of
               olice investig  ation," said
  ongoing p
         au, school res ource officer.
   Rosn
What to do?
• Remain alert

• Keep a low profile

• Trust your instincts
Control your information
Control your information
Be smart

Mais conteúdo relacionado

Destaque

English 101. Antecedent & Referent
English 101. Antecedent & ReferentEnglish 101. Antecedent & Referent
English 101. Antecedent & ReferentJo Ål
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
Level2 lesson11 v2
Level2 lesson11 v2Level2 lesson11 v2
Level2 lesson11 v2Angela Wolfe
 
Successful writing. Lecture three.
Successful writing. Lecture three.Successful writing. Lecture three.
Successful writing. Lecture three.TamaraMontgomery
 
Comp I Section 33 Ppt
Comp I Section 33 PptComp I Section 33 Ppt
Comp I Section 33 Pptcasanchez
 
Cross cultural communication
Cross  cultural      communicationCross  cultural      communication
Cross cultural communicationChandan Baruah
 
Presentation1 pronoun
Presentation1 pronounPresentation1 pronoun
Presentation1 pronounEsti Ratih
 
Introduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingIntroduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingJustinsite eLearning Solutions
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
03. directly answered questions
03. directly answered questions03. directly answered questions
03. directly answered questionsmissfifit
 
Pronoun.antecedent
Pronoun.antecedentPronoun.antecedent
Pronoun.antecedentmsnancy
 
Pronoun Agreement - Number, Person, & Special Circumstances
Pronoun Agreement - Number, Person, & Special CircumstancesPronoun Agreement - Number, Person, & Special Circumstances
Pronoun Agreement - Number, Person, & Special CircumstancesAudrey Lynn
 
Relative pronouns presentation[1]
Relative pronouns presentation[1]Relative pronouns presentation[1]
Relative pronouns presentation[1]luisrios789
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety AisaElsa Freire
 

Destaque (20)

English 101. Antecedent & Referent
English 101. Antecedent & ReferentEnglish 101. Antecedent & Referent
English 101. Antecedent & Referent
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
Level2 lesson11 v2
Level2 lesson11 v2Level2 lesson11 v2
Level2 lesson11 v2
 
Successful writing. Lecture three.
Successful writing. Lecture three.Successful writing. Lecture three.
Successful writing. Lecture three.
 
Comp I Section 33 Ppt
Comp I Section 33 PptComp I Section 33 Ppt
Comp I Section 33 Ppt
 
Cross cultural communication
Cross  cultural      communicationCross  cultural      communication
Cross cultural communication
 
pronouns
pronounspronouns
pronouns
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Presentation1 pronoun
Presentation1 pronounPresentation1 pronoun
Presentation1 pronoun
 
Problems with Pronouns
Problems with PronounsProblems with Pronouns
Problems with Pronouns
 
Introduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingIntroduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and Blogging
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
03. directly answered questions
03. directly answered questions03. directly answered questions
03. directly answered questions
 
Pronoun.antecedent
Pronoun.antecedentPronoun.antecedent
Pronoun.antecedent
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Pronoun other
Pronoun otherPronoun other
Pronoun other
 
Pronoun Agreement - Number, Person, & Special Circumstances
Pronoun Agreement - Number, Person, & Special CircumstancesPronoun Agreement - Number, Person, & Special Circumstances
Pronoun Agreement - Number, Person, & Special Circumstances
 
Relative pronouns presentation[1]
Relative pronouns presentation[1]Relative pronouns presentation[1]
Relative pronouns presentation[1]
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety Aisa
 
Pronouns
PronounsPronouns
Pronouns
 

Semelhante a Internet safety slides

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social mediaChas Stephens
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Teddy Njoroge
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital CitizenshipAnja Junginger
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Internet safety
Internet safetyInternet safety
Internet safetykohlerj
 

Semelhante a Internet safety slides (20)

Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social media
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age.
 
5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
The internet
The internetThe internet
The internet
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Mais de Eric Castro

Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Eric Castro
 
21st century Parenting: A brave new world
21st century Parenting: A brave new world21st century Parenting: A brave new world
21st century Parenting: A brave new worldEric Castro
 
Building and Sustaining a PLN
Building and Sustaining a PLNBuilding and Sustaining a PLN
Building and Sustaining a PLNEric Castro
 
What's after going 1:1?
What's after going 1:1?What's after going 1:1?
What's after going 1:1?Eric Castro
 
Transformative Uses of the iPad
Transformative Uses of the iPadTransformative Uses of the iPad
Transformative Uses of the iPadEric Castro
 
Google apps introduction
Google apps introductionGoogle apps introduction
Google apps introductionEric Castro
 
Draw something 2012
Draw something 2012Draw something 2012
Draw something 2012Eric Castro
 
U16 social psych 2011
U16 social psych 2011U16 social psych 2011
U16 social psych 2011Eric Castro
 
M37 Motivation at Work slides
M37 Motivation at Work slidesM37 Motivation at Work slides
M37 Motivation at Work slidesEric Castro
 
Fall Final review
Fall Final reviewFall Final review
Fall Final reviewEric Castro
 
M31 intelligence slides
M31 intelligence slidesM31 intelligence slides
M31 intelligence slidesEric Castro
 
M30 language slides
M30 language slidesM30 language slides
M30 language slidesEric Castro
 
M29 thinking slides
M29 thinking slidesM29 thinking slides
M29 thinking slidesEric Castro
 
U08 memory slides
U08 memory slidesU08 memory slides
U08 memory slidesEric Castro
 
U07 learning slides 2011
U07 learning slides 2011U07 learning slides 2011
U07 learning slides 2011Eric Castro
 
U05 Sensation slides 2011
U05 Sensation slides 2011U05 Sensation slides 2011
U05 Sensation slides 2011Eric Castro
 

Mais de Eric Castro (20)

Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023
 
21st century Parenting: A brave new world
21st century Parenting: A brave new world21st century Parenting: A brave new world
21st century Parenting: A brave new world
 
Building and Sustaining a PLN
Building and Sustaining a PLNBuilding and Sustaining a PLN
Building and Sustaining a PLN
 
What's after going 1:1?
What's after going 1:1?What's after going 1:1?
What's after going 1:1?
 
Transformative Uses of the iPad
Transformative Uses of the iPadTransformative Uses of the iPad
Transformative Uses of the iPad
 
1600 iPads
1600 iPads1600 iPads
1600 iPads
 
Google apps introduction
Google apps introductionGoogle apps introduction
Google apps introduction
 
Draw something 2012
Draw something 2012Draw something 2012
Draw something 2012
 
U16 social psych 2011
U16 social psych 2011U16 social psych 2011
U16 social psych 2011
 
M37 Motivation at Work slides
M37 Motivation at Work slidesM37 Motivation at Work slides
M37 Motivation at Work slides
 
Fall Final review
Fall Final reviewFall Final review
Fall Final review
 
M31 intelligence slides
M31 intelligence slidesM31 intelligence slides
M31 intelligence slides
 
M30 language slides
M30 language slidesM30 language slides
M30 language slides
 
M29 thinking slides
M29 thinking slidesM29 thinking slides
M29 thinking slides
 
U08 memory slides
U08 memory slidesU08 memory slides
U08 memory slides
 
U07 learning slides 2011
U07 learning slides 2011U07 learning slides 2011
U07 learning slides 2011
 
M18 slides
M18 slidesM18 slides
M18 slides
 
m19 Hypnosis
m19 Hypnosism19 Hypnosis
m19 Hypnosis
 
M20 drugs
M20 drugsM20 drugs
M20 drugs
 
U05 Sensation slides 2011
U05 Sensation slides 2011U05 Sensation slides 2011
U05 Sensation slides 2011
 

Último

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Último (20)

URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Internet safety slides

Notas do Editor

  1. \n
  2. \n
  3. 6 things\n
  4. \n
  5. In an interview with the Harvard admissions committee, what could you show them online?\n
  6. Think of every web service you use, or are associated with.\nWhat is there?\nPictures? Video? Poetry? Stories? Reflections on life?\n
  7. \n
  8. For college and for jobs\n
  9. \n
  10. 82% of 16—18 year-olds use FB daily\n
  11. There is NO privacy on the internet.\nWhat’s there is there forever\n
  12. NEVER your Social Security number\nBeware that cookies store information and share it automatically w/ websites you visit\n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. and don’t SHARE passwords\n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. Do NOT have your computer save passwords\n
  35. More likely to be hit by lightening, or the victim of identity theft?\n750,000 new cases of identity fraud each year in the US\n
  36. \n
  37. More likely to be hit by lightning, or affected by a computer security problem?\n70% of computer users have been hacked, phished, or the victim of a virus — compared to 0.000102% chance of being struck by lightning?\n
  38. \n
  39. \n
  40. Most materials for identity theft are stolen from trash cans\n
  41. \n
  42. \n
  43. FIRST: Don’t be a bully\nMost bullies were victims\n
  44. \n
  45. do not SHARE passwords either\n
  46. Anger, revenge, frustration\nEntertainment; bored, laughs, to get a reaction, \nBolster or remind ppl of their social standing \nSometimes by accident\n
  47. \n
  48. \n
  49. \n
  50. \n
  51. Not much harm that a predator can do to you like this\nit’s when you meet IRL …\nIt’s not all men ...\n
  52. \n
  53. \n
  54. \n
  55. \n
  56. In an interview with the Harvard admissions committee, what could you show them online?\n
  57. \n
  58. “Her offense: Posting on Facebook a photograph of herself posing with a human placenta in class.”\n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. Scheduled for same day as Omaha, NB teen shot principal & assistant principal\n
  66. \n
  67. \n
  68. \n
  69. \n
  70. \n
  71. \n
  72. \n