Net safety
Download
1 / 40

Net Safety of Students - PowerPoint PPT Presentation


  • 392 Views
  • Uploaded on

Useful for student trainee.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Net Safety of Students' - sgisave


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Net safety l.jpg

Net Safety

S.G.Isave

Lecturer

Tilak College of Education

Pune


Refresher course in education l.jpg
Refresher course in Education

  • This is the presentation for seminar .

  • Topic – Net safety

S.G.ISAVE


Slide3 l.jpg

@ Background

@ Meaning

@ Need

@ Threats

@ Solution

@ Conclusion

S.G.ISAVE


Background l.jpg
Background

  • Since there is no one single controller of this huge huge network it becomes vulnerable.

  • Adults can take appropriate net safety precautions, but children are easy target for cyber criminals.

S.G.ISAVE


Meaning l.jpg
Meaning

  • ‘Net-Safety’ contains two terms- net means mainly internet. It is safety of user who takes the advantage of internet.

  • “An application of knowledge of internet threats, it’s prevention, treatment and all kinds of management is called Net-safety.”

S.G.ISAVE


Slide6 l.jpg
Need

  • Data and user, no one is safe on the internet. If we lost data we may retrieve/regenerate it ; but if we lost our small user very difficult to recover him/her.

S.G.ISAVE


Threats l.jpg
Threats

  • There are economical, psychological, physical, technological and legal threats ruled on the net.

S.G.ISAVE


1 economical threat l.jpg
1.Economical Threat

E-shopping, e-governance, e-payment, etc. Each of these facility needs username, password, e-cards.

S.G.ISAVE


Slide9 l.jpg

S.G.ISAVE


Slide10 l.jpg

S.G.ISAVE knowingly / unknowingly…


Slide11 l.jpg

S.G.ISAVE knowingly / unknowingly…


2 psychological threat l.jpg
2. Psychological Threat knowingly / unknowingly…

  • Sex, drugs, crimes, violence, terrorism.

  • Criminal minds are finding soft targets for their use via e-mail, chatting, advertise, gifts, cartoons, clip arts etc.

S.G.ISAVE


Slide13 l.jpg

S.G.ISAVE knowingly / unknowingly…


Slide14 l.jpg

S.G.ISAVE


Slide15 l.jpg

S.G.ISAVE


Slide16 l.jpg

S.G.ISAVE young one. Dating is very easy online. So many sites are there providing such ‘


Slide17 l.jpg

When the excitement is over then child comes to know what mistake he/she has done; then the psychological crises arises. He/she feel guilty, isolated, helpless; it changes innocence of their life.

S.G.ISAVE


Slide18 l.jpg

Children involves in virtual world, than the real world. They feel impatience, unsecured and unmatched in the real people. Because real people do not work on his/her ‘mouse-click’, not respond 100% according to the command given, as his/her computer does.

S.G.ISAVE


3 physical threat l.jpg
3.Physical Threat They feel impatience, unsecured and unmatched in the real people. Because real people do not work on his/her ‘mouse-click’, not respond 100% according to the command given, as his/her computer does.

  • Overuse of computer ,less exercise, seating in problematic posture, proportion of chair-table, screen brightness, contrast, resolution, size of screen etc.

S.G.ISAVE


Slide20 l.jpg

S.G.ISAVE They feel impatience, unsecured and unmatched in the real people. Because real people do not work on his/her ‘mouse-click’, not respond 100% according to the command given, as his/her computer does.


4 technological threat l.jpg
4.Technological They feel impatience, unsecured and unmatched in the real people. Because real people do not work on his/her ‘mouse-click’, not respond 100% according to the command given, as his/her computer does. Threat

  • Due to lack of proper knowledge children open your computer for Virus, Trojan horse, Worm.

S.G.ISAVE


5 legal threat l.jpg
5.Legal They feel impatience, unsecured and unmatched in the real people. Because real people do not work on his/her ‘mouse-click’, not respond 100% according to the command given, as his/her computer does. Threat

  • The information may be disclosed by user child. Cyber criminal may use this information for terrorist activities and the illegal uses.

S.G.ISAVE


Slide23 l.jpg

S.G.ISAVE


Safety solutions l.jpg
Safety Solutions download some software that is restricted under copyright act.

S.G.ISAVE


Economical l.jpg
Economical download some software that is restricted under copyright act.

  • Give and change the password frequently. Password - to start computer, to start computer account, to connect the internet, to login all types of accounts.

  • Do not on save user name and password.

  • Keep records of offline transaction and check it .

S.G.ISAVE


Do not show credit cards like important documents information to children l.jpg
Do not show credit cards like important documents information to children.

S.G.ISAVE


Psychological l.jpg
Psychological information to children.

  • Keep computer from where you can observe child using internet..

  • Check history of computer regularly.

  • Check safety settings in search engine

S.G.ISAVE


Slide28 l.jpg

S.G.ISAVE information to children.


Slide29 l.jpg

S.G.ISAVE information to children.



Psychological31 l.jpg
Psychological information to children.

  • Have ‘child lock’ software

  • Observe the use of pen drive, CD/DVD.

  • Don’t have the web camera always on. Don’t allow children to use it in privacy.

S.G.ISAVE


Slide32 l.jpg

S.G.ISAVE information to children.


Psychological33 l.jpg
Psychological information to children.

  • Continuously observe children behavior.

  • Enjoy free time with family.

  • Social development, Art and Craft work.

  • Be in touch with teachers.

S.G.ISAVE


Physical l.jpg
Physical information to children.

  • Give time bound access on internet.

  • Insist on play, exercises by setting example.

  • Show them webs related to health and hygiene.

  • Have the proper posture of seating in front of computer.

  • Surfing/gaming and eating should not go simultaneously.

S.G.ISAVE


Technological l.jpg
Technological information to children.

Have computer antivirus suit and update it.

Prevention, detection and eradication of Mal-wares.

S.G.ISAVE


Legal l.jpg
Legal information to children.

  • Give guidelines for downloading and making on line friends.

S.G.ISAVE


Conclusion l.jpg
Conclusion information to children.

  • It doesn’t mean that we should not use the internet or we should discourage our children to use internet.

  • They should become , wise net-savy.

S.G.ISAVE



References l.jpg
References highway…. !”

  • http://news.bbc.co.uk/2/hi/technology/6332619.stm

  • http://news.bbc.co.uk/2/hi/uk_news/education/5363678.stm

  • http://www.colonialhts.net/internet_safety/pledges/pledgemshs.pdf

  • http://www.fbi.gov/publications/pguide/pguidee.htm

  • http://www.getnetwise.org/

  • http://kids.getnetwise.org/safetyguide/

  • http://kids.getnetwise.org/safetyguide/

  • http://www.kidshield.com/steps/index.htm

  • http://www.learnthenet.com/english/html/10kids.htm

  • http://netsafety.nic.in/tips.htm

  • http://www.safer-internet.net/

S.G.ISAVE


I am safe in my parent s hand l.jpg

“I am safe in my parent’s hand !” highway…. !”

Thank you very much !


ad