Скачать презентацию How Secure Are You When You Use the Скачать презентацию How Secure Are You When You Use the

54aeb88c2e78f9a191a78c05c536420e.ppt

  • Количество слайдов: 21

How Secure Are You When You Use the Internet? How Secure Are You When You Use the Internet?

Overview • What is the Internet? And what it is commonly used for? • Overview • What is the Internet? And what it is commonly used for? • • • o Parents vs. Teens/Kids Use Ways of accessing the Internet Common cyber threats Facts What’s being done? What you can do? Questions

What is the Internet? • A communication system that connects computers and computer networks What is the Internet? • A communication system that connects computers and computer networks all over the world • Popular communication tool (like the telephone) • Familiar community environment (like the mall, movie theater) • Other names: Web, Information Highway, The Net, Cyberspace • http: //www. youtube. com/watch? v=qv 0 XCa. Ukf. Nk

What is the Internet Used For? Parents vs. Teens/Kids What is the Internet Used For? Parents vs. Teens/Kids

Your Parents – Primarily for work-related activities o o Shop/Sell Online banking Catch up Your Parents – Primarily for work-related activities o o Shop/Sell Online banking Catch up on news Communication § Email (Electronic mail) § Co-workers § Family/Friends § Child's Teachers

YOU • Education, socialize and entertainment o Education § Skill Building/Training § Researching § YOU • Education, socialize and entertainment o Education § Skill Building/Training § Researching § Encyclopedias/magazines/newspapers § Homework help § School reports o Socializing § Email § Social Networks § Instant messaging

YOU continued. . . o o o Gaming Surfing Downloading § Music § Pictures YOU continued. . . o o o Gaming Surfing Downloading § Music § Pictures § Videos

Ways of Accessing the Internet • Personal Computers o Home, school, library, café, friends Ways of Accessing the Internet • Personal Computers o Home, school, library, café, friends house o Cell phone, other mobile devices • Mobile devices • Game consoles

Cyber Threats • Cyber bullying • What it is • Types o Harassment, Flaming, Cyber Threats • Cyber bullying • What it is • Types o Harassment, Flaming, Denigration, Impersonation, Outing and Trickery, Exclusion, Cyberstalking • Cyber predators • What it is • Meeting strangers online o Threats this can lead to o Facts of incidents

Cyber Bullying Example Amanda Marcuson of Birmingham, Michigan • Reported girls in her 8 Cyber Bullying Example Amanda Marcuson of Birmingham, Michigan • Reported girls in her 8 th grade class for stealing something that belonged to her • Instant messages full of ugly insults were sent to her home computer • Instant messages were delivered to her phone and by the end of the evening she had 50 instant messages • People can say a lot worse things to someone online than when they're actually talking to them

Cyber Threats continued. . . • Online Scams o What it is § Found Cyber Threats continued. . . • Online Scams o What it is § Found in websites, email, chat rooms, message boards § Auction Fraud, Phishing scams, Nigerian 419 Letter, Postal Forwarding/Reshipping scams, "Congratulations, You've won an Xbox (i. Pod, TV, etc)" • Identity theft o o What it is Kids can be victims too!

Identity Theft Example Tina Price of Uniontown, Pennsylvania • Used the names of her Identity Theft Example Tina Price of Uniontown, Pennsylvania • Used the names of her children (ages 7 and 2) to apply for 25 credit cards • Charged with 64 counts of identity theft • Also used her father's personal information to submit 39 credit applications

Cyber Threats continued. . . • SPAM o What it is • Viruses/Spyware • Cyber Threats continued. . . • SPAM o What it is • Viruses/Spyware • Plagiarism o What it is • Exposure to inappropriate material

How to Protect Yourself • Cyber bullying o Tell an adult (Teacher, Parent, Police, How to Protect Yourself • Cyber bullying o Tell an adult (Teacher, Parent, Police, etc. ) • Cyber predators Privatize your social networking webpage o Tell an adult (Teacher, Parent, Police, etc. ) o • SPAM o Don't open emails from senders you do not know • Virus/Spyware o Use virus/spyware protection software (Symantec, Mc. Afee, etc) • Plagerism o No copying!

How to Protect Yourself continued. . . • Online scams o o Don't open How to Protect Yourself continued. . . • Online scams o o Don't open emails from senders you do not know Be careful what you click on a website o o Change passwords regularly Use virus protection Close Internet browsers Do not check boxes that save your username and password o Be aware of your surroundings • Identity theft

What's being done? • FBI o Connecticut Computer Crimes Task Force (CCCTF) + 92 What's being done? • FBI o Connecticut Computer Crimes Task Force (CCCTF) + 92 others • Schools are monitoring kids computer use • Parents are setting parental controls on home computers o Google's Safe. Search

What You Can Do! • • Hey kids don't chat or meet with STRANGERS! What You Can Do! • • Hey kids don't chat or meet with STRANGERS! Always ask your parents before you surf! Never display or give out your personal information! Tell an adult if you are being bullied or feel threatened by material on the Internet! • Use passwords and do not share them! • Do not open email, messages, etc, from people you don't know!

 Classroom Assignment on Cyber Security for Kids Classroom Assignment on Cyber Security for Kids

Conslusion Handouts • Ten Internet safety Tips for Kids: o http: //www. scpo. net/brochures/KIDSInternet. Conslusion Handouts • Ten Internet safety Tips for Kids: o http: //www. scpo. net/brochures/KIDSInternet. Tips. pdf o http: //www. mrdzhistoryclaz. com/blogger/uploaded_images/internetsafety-798013. jpg • Stay Safe Online:

Questions Questions

Works Cited • • • http: //royal. pingdom. com/2009/01/22/internet-2008 -in-numbers/ http: //www. fbi. gov Works Cited • • • http: //royal. pingdom. com/2009/01/22/internet-2008 -in-numbers/ http: //www. fbi. gov http: //www. theage. com. au/national/teens-view-of-cyber-threats-20090725 -dww 9. html http: //www. cyberbully. org/onlinedocs/cskcstschools. pdf http: //www. projectsafekids. org/cyber. html http: //kids. yahoo. com/reference/dictionary/English http: //www. safekids. com/ http: //www. us-cert. gov/cas/tips/ST 05 -002. html http: //kids. getnetwise. org/ http: //www. slais. ubc. ca/COURSES/libr 500/04 -05 -wt 2/www/D_Jackson/examples. htm http: //www. foxnews. com/story/0, 2933, 576347, 00. html http: //www. pcworld. com/article/119941/top_five_online_scams. html