1 / 23

INTERNET SAFETY

INTERNET SAFETY. Table of contents. Identity theft (Marine L-Ségolène) Harassement (Alice-Aline) Fake identity (Juliette-Marine B-Pauline) Virus (Baptiste-Nicolas) Hackers (Colomban) Stolen information (Dorine- Estolline ) Social network (Jack) Pornography (Diane-Nadia).

ravi
Download Presentation

INTERNET SAFETY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTERNET SAFETY

  2. Table of contents • Identitytheft(Marine L-Ségolène) • Harassement (Alice-Aline) • Fakeidentity(Juliette-Marine B-Pauline) • Virus (Baptiste-Nicolas) • Hackers (Colomban) • Stolen information (Dorine-Estolline) • Social network (Jack) • Pornography(Diane-Nadia)

  3. Identity Theft. Identitythievessteal your name, address and your creditcardnumber. Theythen use all your information to buy or rip off other people by pretending to beyou. So youcanlosesome money or evenworsebecharged for somethingyouhaven’tdone !

  4. Tips. • You shouldn’t post your name, age, address online. • You shouldn’t chat withpersonyoudon’t know. • Don’t trust anyone. • Check the identity of personyou chat with. • Check if the websiteissecure.

  5. Whatiscyberbullying ? • Cyber bullying affects many adolescents and teens on a daily basis. Cyber bullying involves using technology, like cell phones and the Internet, to bully or harass another person.

  6. Cyber bullying can take many forms : • Sending mean messages or threats to a person's email account or cell phone • Spreading rumors online or through texts • Posting hurtful or threatening messages on social networking sites or web pages • Stealing a person's account information to break into their account and send fake messages • Pretending to be someone else online to hurt another person • Taking unflattering pictures of a person and spreading them through cell phones or the Internet • circulating sexually suggestive pictures or messages about a person .

  7. Solutions : • you should never give any private information over the internet. • You should delete suspicious emails without opening it • You should never share a password or personal info with anyone.

  8. Now, pay attention to whatyou post on the internet and think of others…

  9. An adultwhowantsteens to believethatthey are the sameage as youand wouldlike to beyourfriend … theywant to get information about you: address , phone number … Fakeidentity…

  10. …canbea child Molester A login couldhideanyone ! Be careful on the internet

  11. These people are twofaced. Theytemptchildren on the web, by usingchatrooms. Theyinvent a login, chat withyoung people, get close to them and finallyaskthem to meet face to face. Or sometimestheycollectpersonalinformation about children and try to organise a kidnapping. Theyalso use the internet to exchange photos withnaked images.

  12. Advice • Never giveyourname, address, phone number on the internet… • If someoneasksyou for personal information, or harassyou , you must report it to your parents! • Don’tagree for a meeting with people youdon’t know! Never trust appearances !!

  13. Whatis Virus ? Virus is a software whichis sent by differentwebsites or Hackers to introduceyour computer or createerrors.

  14. How to get Virus and what are the risks? • In the Mail Box with a virus message • On differentwebsites as Chatrooms, Online Game… • By downloading on websiteswithmusic or movies… • Computer slowdown • Computer access

  15. Solutions against Virus • Have a good antivirus • Be carefulon the Internet • Don’tgiveanyinformation on your computer • Don’tdownloadanything

  16. Whois a hacker? • -A Hacker issomebodywhoisreally good at computers and who uses hisskills to realise exploits such as stealing secret files or hacking devices to installillegal programmes. • They are pirates of the web

  17. Hacking risks • -Personal files theft and use of thesefiles • -Theft of youridentity • -Virus

  18. Dangers of social networks Solutions • Whensigning up to theese social networks beselective on whatimfromationyougive and adjustyouprivacy settings soonlyyourfreindscanseeyour page. • Be carefullwhatyousay and whatpictures and videos of you are posted on the web. When You sign up to a social network itwillusualyask for somepersonaldetails, whilethismaybeuseful for meeting new freinds and finding out imfromation about yourownfreindsitmayalsobeused by poreditorsto gain your trust and lureyouinto a trap. The imfromationgivenmayalsobeused for identitytheft. Photos, Videos and statementsthat are posted on the web are then out of your control. Future employers mite get the wrong impression of youfromthingsthat have been posted in the past.

  19. How not to behacked? • -Have a good antivirus • -Don’tgiveyourpassword and username • -Deletestrange mails or files • -Don’tdownloadanythinganywhere

  20. pornography

  21. The risk of the pornography on the net : a child can fall on a pornographic picture, It’s not good for himbecause he can be shocked to see such things. Pornography is violent. Now, pornography is everywhere you can get pornographic ads for example when you open your E-mails or you visit a site.

More Related