1 / 21

Living In The Information Age

Living In The Information Age. Keeping your Information Safe. Secure ways to access the internet. Posting personal information on Facebook and other social networking sites. Think before pressing Enter! Cyber-bullying. Example of revealing too much.

shantelr
Download Presentation

Living In The Information Age

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Living In The Information Age

  2. Keeping your Information Safe • Secure ways to access the internet. • Posting personal information on Facebook and other social networking sites. Think before pressing Enter! • Cyber-bullying. • Example of revealing too much. • Securing your passwords and choosing strong passwords. • Securing your smart phones and other mobile devices. • The power of Google. • “Would I want my Mom to see this?”

  3. Accessing the Internet Safely Protect your home computer with passwords Secure your Wi-Fi Utilize virus protection software like Norton, AVG Antivirus, McAfee

  4. Facebook Drama • Revealing too much. Images, and personal information • Use all privacy options available on social networking sites. • Stranger Danger – accepting all friend requests. • Choosing an email address foreverprincess2001@gmail.com Your Future Think twice before pressing enter

  5. Cyber bullying facts Nearly 43% of kids have been bullied online. One in four has had it happen more than once.One in three teens has experienced cyber-threats online.Nine out of ten middle school students have had their feelings hurt online.About 75% have visited a website bashing another student.Four out of ten middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them.The psychological and emotional outcomes of cyber bullying are similar to real-life bullying outcomes,

  6. Cyber bullying facts (con’t) except for the reality that with cyber bullying there is often no escape. School ends at 3 p.m., while the Internet is available all the time.Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying.Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying.About 58% of kids admit someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once.90% of victims will not inform a parent or trusted adult of their abuse.Cyber bullying has increased in recent years. In a national survey of 10-17 year olds, twice as many children indicated they had been victims and perpetrators.http://www.dosomething.org/tipsandtools/11-facts-about-cyber-bullying

  7. Girl commits suicide after being cyber bullied Amanda Todd began using the internet in for cyber chatting in 7th grade. She gained confidence from the kind words that other people had to say about her. However, one day she made the mistake of posting a picture of herself topless. The person took the picture and began to use it to blackmail her. The trouble followed her from the point on and she couldn’t escape it. http://www.thestar.com/news/canada/article/1270262--b-c-victim-of-cyber-bullying-commits-suicide

  8. Choosing strong passwords • Length. Make your passwords long, with eight or more characters. • Complexity. Include letters, punctuation, symbols, and numbers. Use the entire keyboard, not just the letters and characters you use or see most often. • Variation. Change your password often. • Variety. Don't use the same password for everything. • Sharing. Never share your passwords. • Management. Keep track of all your passwords with a utility like KeePass or LastPass. http://www.microsoft.com/security/online-privacy/passwords-create.aspx

  9. Strong Password Example Who is my fave singer? Justin Bieber, of course! Select the first letter from each word... Who is my fave singer?Justin Bieber,of course. ...and combine into a new word. Wimfs?JB,oc. Then, replace a few letters with numbers or punctuation. W1mf$?JB,0c.

  10. Just How Secure? happiness 5,429,503,678,976 possible combinations 22 minutes Happiness 2,779,905,883,635,712 possible combinations 8 days

  11. Just How Secure? H@ppiness 27,206,534,396,294,948 possible combinations 78 days H@pp1ness 95,151,694,449,171,440 possible combinations 275 days

  12. Just How Secure? H@pp1ness? 66,483,263,599,150,105,000 possible combinations 526 years W1mf$?JB,0c. 612,709,757,329,767,400,000,000 possible combinations 4,854,003 years

  13. Celebrities Hacked • 34-year old Jacksonville, Florida resident Christopher Chaney hacked into several celebrity e-mail accounts by simply resetting their passwords by accurately guessing their security questions. Scarlett Johansson was born in New York City to an Ashkenazi Jewish mother, Melanie Sloan and a Danish father, Karsten Johansson. Scarlett showed a passion for acting at a young age and starred in many plays. She has a sister named Vanessa Johansson, a brother named Adrian, and a twin brother named Hunter Johansson born three minutes after her... See full bio » Born: Scarlett Ingrid Johansson November 22, 1984 in New York City, New York, USA http://www.imdb.com/name/nm0424060/

  14. Lock Your Mobile Device • Computer. Your phone or tablet is really a computer. It contains contacts, documents, text messages, pictures, and other personal data. • Privacy. Like a computer, no one should be able to access your private information except for you. • Why Lock? In case you lose device or it is stolen, to prevent snooping, not to mention limiting pocket calls. • Preventing Access. You can lock your device using a passcode or PIN, a password, or a special swiping gesture. • Handout. More information.

  15. Use Google to your advantage Google your name and search the links for false information. Try other search engines too, like Bing. See how your information is making it to the world.

  16. “Would I want my Mom to see this?” • Family members • Potential colleges/ schools • Potential employers • Friends • Co-workers Use the Internet to your advantage, not to put yourself in a negative light.

  17. “Would I want my Mom to see this”

  18. “Would I want my Mom to see this”

  19. “Would I want my Mom to see this”

  20. “Would I want my Mom to see this”

  21. “Would I want my Mom to see this”

More Related