1 / 51

400

Staying Incognito. Talk to Me. Let’s Get Together. If you can’t say something nice…. Miscellaneous. 100. 100. 100. 100. 100. 200. 200. 200. 200. 200. 300. 300. 300. 300. 300. 400. 400. 400. 400. 400. 500. 500. 500. 500. 500.

amanda-chen
Download Presentation

400

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Staying Incognito Talk to Me Let’s Get Together If you can’t say something nice… Miscellaneous 100 100 100 100 100 200 200 200 200 200 300 300 300 300 300 400 400 400 400 400 500 500 500 500 500

  2. This should be at least eight characters long; contain a combination of letters, numbers, and special characters; and should not contain your login name, your first or last name, or any other information that is easy to find out about you.

  3. What is a strong, secure password? Source: http://www.microsoft.com/athome/security/privacy/password.mspx

  4. To do this, choose a favorite quote, phrase, saying, song, then use the first letter or syllable from each word of the quote.

  5. What is a good way to create a secure password?

  6. Before doing this, make sure the Web site address starts with "https" and that your browser's status bar displays the "lock" icon.

  7. What is submit financial information through a Web site? Remember: never in an e-mail

  8. These products allow adults to closely and specifically control what their children access.

  9. What are Parental Control Tools/Software?

  10. Examples of this category are: pictures, names and addresses, schools you attend, cell or phone numbers and many other things, such as the name of your school team.

  11. What is Personal Information? Source: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec13.htm

  12. LOL, POS, ROFL

  13. What is Chat lingo, cyber talk, etc? Source: http://www.missingkids.com/adcouncil/lingo.html

  14. What you should do if you receive unsolicited emails with attachments from unknown senders.

  15. What is do not open them and/or delete them? Source: http://dispatch.mcafee.com/virus_tips.asp

  16. This Internet technology notifies a user when a friend is online and allows them to "converse" by exchanging text messages.

  17. What is IM (Instant Messaging)?

  18. ICQ, an instant messaging computer program, owned by Time Warner's AOL subsidiary, got its name from this phrase.

  19. What is “I Seek You”? Source: http://www.answers.com/topic/icq

  20. A Web site to which one or more people post their personal observations on particular subjects.

  21. What is a Blog (web log)?

  22. MySpace, Facebook and Xanga

  23. What are popular social networking sites?

  24. Blurring, morphing or changing photos you post on your site makes them interesting, but also does this.

  25. What helps protect your identity? Sources: http://www.wiredsafety.org/resources/pdf/socialnetworktips.pdf

  26. Go alone to meet someone you’ve only known online

  27. What is something you should never do? Source: http://www.wiredsafety.org/safety/chat_safety/index.html

  28. You are practicing this when you are courteous, honest and polite when using the Internet.

  29. What is Netiquette? Source: http://www.answers.com/netiquette&r=67

  30. These should be set so that :1. people can only be added as your friend if you approve them2. people can only view your profile if you have approved them as a friend

  31. What are the Privacy Settings? Source: http://tcs.cybertipline.com/knowthedangers7.htm

  32. Posting or sending a deliberately confrontational message via newsgroup, e-mail, etc., usually in response to a previous message.

  33. What is flaming? Source: http://www.netsmartz.org/safety/definitions.htm

  34. In this type of cyberbullying, the cyberbully doesn’t see themselves as a bully at all. They see themselves as righting wrongs, or protecting themselves or others from the “bad guy” they are now victimizing.

  35. What is “The Vengeful Angel”? Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html

  36. These cyberbullies want to exert their authority, show that they are powerful enough to make others do what they want and control others with fear.

  37. What are The “Power-Hungry” (and/or) “Revenge of the Nerds”? Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html

  38. This cyberbullying is usually done or planned in a group, either virtually or together - and is done for entertainment.

  39. What is “Mean Girls”? Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html

  40. These cyberbullies usually don’t think they are cyberbullies at all. They tend to respond in anger or frustration.

  41. What is “Inadvertent” or “Because I Can”? Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html

  42. An online scam where users think they are going to a legitimate web site, when in fact they are unknowingly redirected to an illegitimate site that steals their personal information.

  43. What is Pharming? Source: http://www.netsmartz.org/safety/definitions.htm

  44. Emails or web sites are used to solicit personal and financial information for purposes of gaining access to those accounts.

  45. What is Phishing? Source: http://www.netsmartz.org/safety/definitions.htm

  46. This Internet behavior is almost always characterized by the individual relentlessly pursuing his\her victim online and is very likely to include some form of offline attack, as well.

  47. What is Cyberstalking? Source: http://www.netsmartz.org/safety/definitions.htm

  48. If mis-configured, these programs may expose the contents of your entire hard drive to all other users of the program.

  49. What is file-sharing? Source: http://security.getnetwise.org/tips/filesharing/

  50. This group of 13-18 year-old volunteers has been specially trained in all aspects of online safety, privacy, and security. They run unique programs in schools to spread the word about responsible and safe surfing.

More Related