1 / 21

How Secure Are You When You Use the Internet?

How Secure Are You When You Use the Internet?. What is the Internet? And what it is commonly used for? Parents vs. Teens/Kids Use Ways of accessing the Internet Common cyber threats Facts What’s being done? What you can do? Questions. Overview.

perry-pena
Download Presentation

How Secure Are You When You Use the Internet?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How Secure Are You When You Use the Internet?

  2. What is the Internet? And what it is commonly used for? • Parents vs. Teens/Kids Use • Ways of accessing the Internet • Common cyber threats • Facts • What’s being done? What you can do? • Questions Overview

  3. A communication system that connects computers and computer networks all over the world • Popular communication tool (like the telephone) • Familiar community environment (like the mall, movie theater) • Other names: Web, Information Highway, The Net, Cyberspace • http://www.youtube.com/watch?v=qv0XCaUkfNk What is the Internet?

  4. Parents          vs.             Teens/Kids What is the Internet Used For?

  5. – Primarily for work-related activities • Shop/Sell • Online banking • Catch up on news • Communication • Email (Electronic mail) • Co-workers • Family/Friends • Child's Teachers Your Parents

  6. Education, socialize and entertainment • Education • Skill Building/Training • Researching • Encyclopedias/magazines/newspapers • Homework help • School reports • Socializing • Email • Social Networks • Instant messaging YOU

  7. Gaming • Surfing • Downloading • Music • Pictures • Videos YOU continued. . .

  8. Personal Computers • Home, school, library, café, friends house • Mobile devices • Cell phone, other mobile devices • Game consoles Ways of accessing the Internet?

  9. Cyber bullying • What it is • Types • Harassment, Flaming, Denigration, Impersonation, Outing and Trickery, Exclusion, Cyberstalking • Cyber predators • What it is • Meeting strangers online • Threats this can lead to • Facts of incidents Cyber Threats

  10. Cyber Bullying Examples Amanda Marcuson of Birmingham, Michigan • Reported girls in her 8th grade class for stealing something that belonged to her  • Instant messages full of ugly insults were sent to her home computer  • Instant messages were delivered to her phone and by the end of the evening she had 50 instant messages • People can say a lot worse things to someone online than when they're actually talking to them

  11. Online Scams • What it is • Found in websites, email, chat rooms, message boards • Auction Fraud, Phishing scams,Nigerian 419 Letter,Postal Forwarding/Reshipping scams,"Congratulations, You've won an Xbox (iPod, TV, etc)" • Identity theft • Kids can be victims too! • What it is Cyber Threats continued. . .

  12. Identity Theft Example Tina Price of Uniontown, Pennsylvania • Used the names of her children (ages 7 and 2) to apply for 25 credit cards • Charged with 64 counts of identity theft • Also used her father's personal information to submit 39 credit applications

  13. SPAM • What it is • Viruses/Spyware • What it is • Plagiarism • What it is • Exposure to inappropriate •     material Cyber Threats continued. . .

  14. Cyber bullying • Tell an adult (Teacher, Parent, Police, etc.) • Cyber predators • Privatize your social networking webpage • Tell an adult (Teacher, Parent, Police, etc.) • SPAM • Don't open emails from senders you do not know • Virus/Spyware • Use virus/spyware protection software (Symantec, McAfee, etc) • Plagerism • No copying! How to Protect Yourself

  15. Online scams • Don't open emails from senders you do not know • Be careful what you click on a website • Identity theft • Change passwords regularly • Use virus protection • Close Internet browsers • Do not check boxes that save your username and password • Be aware of your surroundings How to Protect Yourself

  16. FBI • Connecticut Computer Crimes Task Force (CCCTF) + 92 others • Schools are monitoring kids computer use • Parents are setting parental controls on home computers • Google's SafeSearch What’s being done?

  17. Hey kids don't chat or meet with STRANGERS! • Always ask your parents before you surf! • Never display or give out your personal information! • Tell an adult if you are being bullied or feel threatened by material on the Internet!  • Use passwords and do not share them! • Do not open email, messages, etc, from people you don't know! What you can do?

  18. Classroom Assignment on Cyber Security for Kids

  19. Handouts • Ten Internet safety Tips for Kids: • http://www.scpo.net/brochures/KIDSInternetTips.pdf • Stay Safe Online: • http://www.mrdzhistoryclaz.com/blogger/uploaded_images/internet-safety-798013.jpg Conclusion

  20. Questions

  21. http://royal.pingdom.com/2009/01/22/internet-2008-in-numbers/http://royal.pingdom.com/2009/01/22/internet-2008-in-numbers/ • http://www.fbi.gov  • http://www.theage.com.au/national/teens-view-of-cyber-threats-20090725-dww9.html • http://www.cyberbully.org/onlinedocs/cskcstschools.pdf • http://www.projectsafekids.org/cyber.html • http://kids.yahoo.com/reference/dictionary/English • http://www.safekids.com/ • http://www.us-cert.gov/cas/tips/ST05-002.html  • http://kids.getnetwise.org/  • http://www.slais.ubc.ca/COURSES/libr500/04-05-wt2/www/D_Jackson/examples.htm  • http://www.foxnews.com/story/0,2933,576347,00.html  • http://www.pcworld.com/article/119941/top_five_online_scams.html Works Cited

More Related