SlideShare uma empresa Scribd logo
1 de 27
Internet Safety A Christian Perceptive Philippians 4:13 "I can do all things  through Christ who strengthens me."
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
There is always a risk in meeting an online friend. People aren’t always who or what they claim to be .
[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
* Frank – Mark – Valleyguy …... Arrested  and sentenced to prison for 1 ½ years. Photo of Frank by  Bob Child,  Associated Press Both photos published in People Magazine,  May 29 th , 2000
Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting X X X X X X
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutteMudgeoTorso1091
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Teens Presentation
Teens PresentationTeens Presentation
Teens Presentationsharon7111
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Faiza Ahmed PP Quiz
Faiza Ahmed PP QuizFaiza Ahmed PP Quiz
Faiza Ahmed PP Quiztonybattista
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingst josephs
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety PresentationPamela Moeai
 
Emily Slocombe E-Safty Quiz
Emily Slocombe E-Safty QuizEmily Slocombe E-Safty Quiz
Emily Slocombe E-Safty Quiztonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiztonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiztonybattista
 

Mais procurados (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
The 10 core rules of netiqutte
The 10 core rules of netiqutteThe 10 core rules of netiqutte
The 10 core rules of netiqutte
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Teens Presentation
Teens PresentationTeens Presentation
Teens Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Test
TestTest
Test
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Faiza Ahmed PP Quiz
Faiza Ahmed PP QuizFaiza Ahmed PP Quiz
Faiza Ahmed PP Quiz
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Emily Slocombe E-Safty Quiz
Emily Slocombe E-Safty QuizEmily Slocombe E-Safty Quiz
Emily Slocombe E-Safty Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 

Destaque

Spectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the WorldSpectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the WorldKB Enterprises LLC
 
E³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro EE³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro Eguest2ef4ed
 
Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?Ingria. Technopark St. Petersburg
 
телемаркетинг Commerce Ver.
телемаркетинг   Commerce Ver.телемаркетинг   Commerce Ver.
телемаркетинг Commerce Ver.Nikolay Surtsukov
 
Pro Keynote 4
Pro Keynote 4Pro Keynote 4
Pro Keynote 4beerguy
 
himno nacional del Ecuador
himno nacional del Ecuadorhimno nacional del Ecuador
himno nacional del Ecuadorguest0e53baa2
 
Thematic Unit Story Board
Thematic Unit Story BoardThematic Unit Story Board
Thematic Unit Story BoardAmcconnell
 
Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012Smithsonian Libraries
 
Food, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity StudioFood, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity StudioBiocity Studio
 
EPiServer CMS 6 UI
EPiServer CMS 6 UIEPiServer CMS 6 UI
EPiServer CMS 6 UITed Nyberg
 

Destaque (20)

Information Literacy
Information LiteracyInformation Literacy
Information Literacy
 
Spectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the WorldSpectrum Auctions: Lessons from Around the World
Spectrum Auctions: Lessons from Around the World
 
Social Media Branding
Social Media BrandingSocial Media Branding
Social Media Branding
 
Ked Tech10
Ked Tech10Ked Tech10
Ked Tech10
 
E³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro EE³.series - E³.bridge CAD 3D Pro E
E³.series - E³.bridge CAD 3D Pro E
 
NHS Points 11-3-09
NHS Points 11-3-09NHS Points 11-3-09
NHS Points 11-3-09
 
Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?Анастасия Ли_ Как компании используют SMM?
Анастасия Ли_ Как компании используют SMM?
 
Portraits
PortraitsPortraits
Portraits
 
телемаркетинг Commerce Ver.
телемаркетинг   Commerce Ver.телемаркетинг   Commerce Ver.
телемаркетинг Commerce Ver.
 
NO INVERNADOIRO
NO INVERNADOIRONO INVERNADOIRO
NO INVERNADOIRO
 
Pro Keynote 4
Pro Keynote 4Pro Keynote 4
Pro Keynote 4
 
himno nacional del Ecuador
himno nacional del Ecuadorhimno nacional del Ecuador
himno nacional del Ecuador
 
Thematic Unit Story Board
Thematic Unit Story BoardThematic Unit Story Board
Thematic Unit Story Board
 
Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012Suzanne Pilsk Presentation to SIL Board 2012
Suzanne Pilsk Presentation to SIL Board 2012
 
Picnic Two
Picnic TwoPicnic Two
Picnic Two
 
Food, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity StudioFood, Distance and Energy | Biocity Studio
Food, Distance and Energy | Biocity Studio
 
board of directors
board of directorsboard of directors
board of directors
 
Delta M
Delta MDelta M
Delta M
 
Micky Ds
Micky DsMicky Ds
Micky Ds
 
EPiServer CMS 6 UI
EPiServer CMS 6 UIEPiServer CMS 6 UI
EPiServer CMS 6 UI
 

Semelhante a Cyber covenant

Internet safety
Internet safetyInternet safety
Internet safetydarlinga
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kidsceiland
 
Hugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPointHugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPointtonybattista
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide WebTony L
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenshipcrosbye
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In CyberspaceCarolyn Argo
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetysharon7111
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationcey.ruth
 

Semelhante a Cyber covenant (20)

Pupil esafety
Pupil esafetyPupil esafety
Pupil esafety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Opsec for Kids
Opsec for KidsOpsec for Kids
Opsec for Kids
 
OPSEC for Kids
OPSEC for KidsOPSEC for Kids
OPSEC for Kids
 
Hugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPointHugh Raynor E-Saftey PowerPoint
Hugh Raynor E-Saftey PowerPoint
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Internet safety
Internet safetyInternet safety
Internet safety
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Crosbye digitialcitizenship
Crosbye digitialcitizenshipCrosbye digitialcitizenship
Crosbye digitialcitizenship
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
cyber safety
cyber safetycyber safety
cyber safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Stay Safe In Cyberspace
Stay  Safe In  CyberspaceStay  Safe In  Cyberspace
Stay Safe In Cyberspace
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Safetyquizkids
SafetyquizkidsSafetyquizkids
Safetyquizkids
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Cyber covenant

  • 1. Internet Safety A Christian Perceptive Philippians 4:13 "I can do all things through Christ who strengthens me."
  • 2.
  • 3.
  • 4.
  • 5.  
  • 6.
  • 7.  
  • 8.
  • 9.  
  • 10.  
  • 11.  
  • 12. There is always a risk in meeting an online friend. People aren’t always who or what they claim to be .
  • 13.
  • 14.  
  • 15.
  • 16.  
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. * Frank – Mark – Valleyguy …... Arrested and sentenced to prison for 1 ½ years. Photo of Frank by Bob Child, Associated Press Both photos published in People Magazine, May 29 th , 2000
  • 22. Similar Interests Trust Secrecy Break Down Barriers Threats Face-to-Face Meeting X X X X X X
  • 23.
  • 24.  
  • 25.  
  • 26.
  • 27.

Notas do Editor

  1. Story of Ofir Rachum He was bright and outgoing 16 year old high school student who enjoyed computers One day he met a 20 year old woman Amana Muna in a chat room about computers. They exchanged email addresses and began communicating on a regular basis. Soon they were speaking with one another on the phone. They decided to meet. Ofir was thrilled to date an older woman. He was 16 she was 20. Their first Friday night encounter was a success and they arranged a second meeting later that week. This time she drove him to a deserted area where four of her friends were waiting. They shot him 15 times and threw his body in the trunk of his car. Amuna and her friends were members of an Anti-Semitic hate group. She had been online searching for a Jewish target . Ofir only know what she told him. He had no idea his death was her intent.
  2. Katie Tarbox Story Katie a 13 year old girl began using a computer, the Internet, and a chat rooms, aware of only the excitement and not the danger in connecting with millions of others. One Sunday morning in a teen chat room, she met a guy named Mark who said he was 23 and a college student. Although Katie recognized the discrepancy, she though their conversation harmless. It was just the Internet. Katie thought herself too smart an d too clever to become a victim. She was high honors student, a national swimmer and a very accomplished musician. Katie and Mark had an amazing connection. They liked the same music, clothing styles, movies, and food. Over a six-month period, they developed a friendship Katie characterized as platonic but important. She could tell him anything and did She discussed school, her family, her friends and always got it… But he wanted to meet her. Her parents knew nothing, so his coming to CT was not an option, nor was traveling to CA alone. So Katie came up with Texas. She would be there with her swim team and Mom as a chaperone. It was perfect. Katie shared her secret plans with her best friend as they arrived in Texas. She was gong to meet her cyber friend! Her confidence waned when he opened the hotel room door. And when he began molesting her, shefroze. Fortunately, Katie’s friend did not keep her secret. Katie’s mom and the hotl security arrived in the nick of time. Katie was shocked to learn Mark was not Mark but Frank Kufrovick, a 41 year old financial analyst and a sordid past. He had raped numerous other young girls and one boy.