Вы находитесь на странице: 1из 86

Internet Safety

Mr Eric Castro
http://about.me/eecastro

Tell a neighbor: What do you remember from your grammar school internet safety presentations?

Create a Positive Digital Footprint Protect Your Privacy Protect Yourself from Identity Theft Protect Yourself from Bullies Protect Yourself from Predators Protect Yourself from Yourself

Create a Positive Digital Footprint

Tell a neighbor: What are you most proud of having produced or created thats online?

Our digital footprint is the evidence of our online activities.

You want to leave positive digital footprints.

Lost by Stephen Nicholas

The New Yorker, 3/22/2010

Protect Your Privacy

1) Do not inadvertently reveal personal information online

Block cookies

2) Keep a clean email account

3) Realize that you may be monitored

4) Do not reply to spammers, ever

5) Be conscious of web security

Passwords

Use a different secure passphrase for each site

PassPHRASES are more secure than passwords Passphrases are easier to remember than passwords Do not use personal information

Come up with a short sentence that is easy to remember

Add one extra variable

Come up with a short sentence that is easy to remember Ted was a bad movie Add one extra variable Ted sux0rs H@ted Ted! Refund 4 Ted?

Encryption

http://

https://

6) Be conscious of security on shared computers

7) Be conscious of home computer security

8) Be wary of unsecured wi

Protect Yourself from Identity Theft

Raise your hand: Has anyone that you know had their identity stolen?

TECHNICAL IS FROM OUR HIS MESSAGE T PPORT TEAM SU he computer. tomatically by t ssage is sent au This me eansthat your is message it m are receiving th If you ctivation; this queued for dea dress has been email ad script (code: ntinuous error a result of a co was as ess. Click here this emailaddr receiving from 505) lve this problem ed eld to reso l out the requir and l y ignoring this et your email b e: Failure to res Not tion will result wrong informa ge or inputting messa emailaddress tivation of this to instant deac

To o

M uc hC re d

it b yA

nd re

sR

ue

da

Its not about cash ...

To o

M uc hC re d

it b yA

nd re

sR

ue

da

its about debt

Destroy private records and statements Secure your snail mail Safeguard your Social Security number Dont leave a paper trail Monitor your credit report Review credit card statements carefully

Protect Yourself from Bullies

First ...

First ...
Change Begins Here by Trista Emlet

What exactly is cyberbullying?

IM/ Text harassment Stealing passwords Blogs Web sites Sending pictures through email & cell phones Internet polling

Interactive gaming Malicious code Sending porn or junk email Impersonation Cyberbullying by proxy

Why cyberbully?

What to do

Dont bully Dont reciprocate Save evidence Tell a trusted adult

King on the march to Montgomery by Eliel Johnson

In the end, we will remember not the words of our enemies, but the silence of our friends.
King on the march to Montgomery by Eliel Johnson

Protect Yourself from Predators

http://i.imgur.com/cbRmA.jpg

Emotionally vulnerable Seeking attention Seeking affection Seeking validation

Chatroulette

Protect Yourself from Yourself

Tell a neighbor: What is the least intelligent thing that youve seen someone else put online?

FIRED

http://failbook.failblog.org

http://failbook.failblog.org

http://failbook.failblog.org

ed attacker e to his alleg ted a messag Rocque pos ey are 'done'. saying th ate quickly. ages can escal say such mess Police and they are the Internet person is on young g in nature, "If a re threatenin ments that a looking at ing com mak e cou ld be to realize w ey need ation because th rranted retali harges, unwa mpering an minal c cri well as ha comments as Sgt. Kelly their of ation," said olice investig ongoing p ource officer. au, school res Rosn

What to do?

Remain alert Keep a low prole Trust your instincts

Control your information

Control your information

Be smart

Вам также может понравиться