SlideShare une entreprise Scribd logo
1  sur  80
INTERNET SAFETY October 2011
Household Internet Access ,[object Object],[object Object]
The Internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Today’s Session ,[object Object],[object Object],[object Object],[object Object]
Today’s Session ,[object Object],[object Object],[object Object],[object Object],[object Object]
Today’s Session ,[object Object],[object Object],[object Object],[object Object]
INTERNET ACTIVITIES
WWW Activities  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Emailing
Social Networking
Chatting
IM
Gaming
Blogging
Web Surfing
INTERNET  SAFETY ISSUES
Internet Safety Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Safety Issues ,[object Object],[object Object],[object Object],[object Object]
Internet Safety Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Safety Issues ,[object Object],[object Object],[object Object]
Internet Safety Issues ,[object Object],[object Object],[object Object]
PROTECTION
Computer Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Protection ,[object Object],[object Object],Government website with useful information for computer protection www.staysmartonline.gov.au
Computer Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Protection ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Protection ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Protection ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Protection ,[object Object],[object Object],[object Object]
Content Filters ,[object Object],[object Object],[object Object],[object Object]
Content Filters ,[object Object]
Content Filters ,[object Object]
Wireless Internet Connection ,[object Object],[object Object],[object Object],[object Object]
Protecting Wireless Internet Connection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCAMS, PHISHING AND ONLINE FRAUD
Person Fraud and Scams ,[object Object],[object Object],[object Object]
Person Fraud and Scams
Scams ,[object Object],[object Object],[object Object],[object Object],[object Object]
Email Scam ,[object Object]
Email Scam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing
Email Scams and Phishing
Email
Email – protecting yourself ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Email – protecting yourself ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY AND  IDENTITY THEFT
Privacy and Identity Theft ,[object Object]
Privacy and Identity Theft
SOCIAL NETWORKING
Social Networking ,[object Object]
Social Networking
Social Networking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CYBER BULLYING
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object]
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Bullying ,[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION FOR FAMILIES AND YOUNG PEOPLE
Families and Young People ,[object Object]
What young people do on the internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risks for young people ,[object Object],[object Object],[object Object],[object Object]
Risks for young people ,[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Yourself and Your Family
Protecting Yourself and Your Family ,[object Object],[object Object]
Protecting Yourself and Your Family ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Yourself and Your Family ,[object Object],[object Object],[object Object]
Families and Young People ,[object Object],[object Object]
Families and Young People ,[object Object]
Families and Young People ,[object Object],[object Object]
Families and Young People ,[object Object],[object Object]
SMART PHONES
Securing Your Smart Phone ,[object Object],[object Object],[object Object],[object Object]
Securing Your Smart Phone ,[object Object],[object Object],[object Object],[object Object]
Securing Your Smart Phone ,[object Object],[object Object]
CONCLUSION
Conclusion ,[object Object],[object Object],[object Object],[object Object]
Conclusion ,[object Object]
Conclusion ,[object Object]

Contenu connexe

Tendances

CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteJuan Miguel Palero
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 

Tendances (20)

CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Internet security
Internet securityInternet security
Internet security
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 

En vedette

Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety AisaElsa Freire
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Successful writing. Lecture three.
Successful writing. Lecture three.Successful writing. Lecture three.
Successful writing. Lecture three.TamaraMontgomery
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
English 101. Antecedent & Referent
English 101. Antecedent & ReferentEnglish 101. Antecedent & Referent
English 101. Antecedent & ReferentJo Ål
 
Level2 lesson11 v2
Level2 lesson11 v2Level2 lesson11 v2
Level2 lesson11 v2Angela Wolfe
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 
Comp I Section 33 Ppt
Comp I Section 33 PptComp I Section 33 Ppt
Comp I Section 33 Pptcasanchez
 
Cross cultural communication
Cross  cultural      communicationCross  cultural      communication
Cross cultural communicationChandan Baruah
 
Presentation1 pronoun
Presentation1 pronounPresentation1 pronoun
Presentation1 pronounEsti Ratih
 
Introduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingIntroduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingJustinsite eLearning Solutions
 

En vedette (20)

Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety Aisa
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Musica
MusicaMusica
Musica
 
Successful writing. Lecture three.
Successful writing. Lecture three.Successful writing. Lecture three.
Successful writing. Lecture three.
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
English 101. Antecedent & Referent
English 101. Antecedent & ReferentEnglish 101. Antecedent & Referent
English 101. Antecedent & Referent
 
Level2 lesson11 v2
Level2 lesson11 v2Level2 lesson11 v2
Level2 lesson11 v2
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
Comp I Section 33 Ppt
Comp I Section 33 PptComp I Section 33 Ppt
Comp I Section 33 Ppt
 
Cross cultural communication
Cross  cultural      communicationCross  cultural      communication
Cross cultural communication
 
pronouns
pronounspronouns
pronouns
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Problems with Pronouns
Problems with PronounsProblems with Pronouns
Problems with Pronouns
 
Presentation1 pronoun
Presentation1 pronounPresentation1 pronoun
Presentation1 pronoun
 
Introduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and BloggingIntroduction to Internet Safety, Social Media and Blogging
Introduction to Internet Safety, Social Media and Blogging
 

Similaire à Internet Safety Tips for Homes and Families

Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullyingparulata
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyNani Owen
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
My protection plan
My protection planMy protection plan
My protection planShakena12
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parentssirchriss
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 

Similaire à Internet Safety Tips for Homes and Families (20)

Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Abhishek cyber bullying
Abhishek   cyber bullyingAbhishek   cyber bullying
Abhishek cyber bullying
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Ass3 Sum
Ass3 SumAss3 Sum
Ass3 Sum
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
IWC - Phishing and Internet Scams
IWC - Phishing and Internet ScamsIWC - Phishing and Internet Scams
IWC - Phishing and Internet Scams
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
My protection plan
My protection planMy protection plan
My protection plan
 
E safety
E safetyE safety
E safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Presentation to parents
Presentation to parentsPresentation to parents
Presentation to parents
 
School presentation
School presentationSchool presentation
School presentation
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 

Plus de Linda Barron

Front of House Volunteers
Front of House VolunteersFront of House Volunteers
Front of House VolunteersLinda Barron
 
Museums Australasia Conference 2016
Museums Australasia Conference 2016Museums Australasia Conference 2016
Museums Australasia Conference 2016Linda Barron
 
Twenty (or more) top history resources
Twenty (or more) top history resources Twenty (or more) top history resources
Twenty (or more) top history resources Linda Barron
 
E books and bytes presentation 1
E books and bytes presentation 1E books and bytes presentation 1
E books and bytes presentation 1Linda Barron
 
Lo fi forum presentation
Lo fi forum presentationLo fi forum presentation
Lo fi forum presentationLinda Barron
 

Plus de Linda Barron (6)

Fun Palace
Fun PalaceFun Palace
Fun Palace
 
Front of House Volunteers
Front of House VolunteersFront of House Volunteers
Front of House Volunteers
 
Museums Australasia Conference 2016
Museums Australasia Conference 2016Museums Australasia Conference 2016
Museums Australasia Conference 2016
 
Twenty (or more) top history resources
Twenty (or more) top history resources Twenty (or more) top history resources
Twenty (or more) top history resources
 
E books and bytes presentation 1
E books and bytes presentation 1E books and bytes presentation 1
E books and bytes presentation 1
 
Lo fi forum presentation
Lo fi forum presentationLo fi forum presentation
Lo fi forum presentation
 

Dernier

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Dernier (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Internet Safety Tips for Homes and Families

Notes de l'éditeur

  1. Welcome Introduce self Note: I‘m an internet specialist, however am a computer user and a good knowledge of this topic Fire exits, toilets, signing up for other sessions Today’s session will be a lecture presentation. Time will be available at the end for questions. However if you have a question as we run through please ask.
  2. COMPARE THE ABOVE STAT to the ABS Survey - Patterns of internet access in Australia In 2001, 35% of Australian dwellings had access to the Internet in the week prior to the Census date. In 2006, 63% of Dwellings had access to the Internet.
  3. The internet is a great place to: Learn Connect with others Improve skills Despite this there are risks associated with using the internet. In order to protect ourselves from the risks we need to understand what some of the risks are and how we can protect ourselves.
  4. SLIDE 4 & 5: In today’s session we will be covering a range of topics relating to internet use and how to protect ourselves and children and young people.
  5. Of course as with anything you learn the information you will be given today is a guide and it is recommended that you undertake your own investigation before making any decisions relating to internet use. There are a number of people and organisations that can provide advice relating to internet safety these include your internet provider, your email account provider, your work or school internet specialists. Also the Australian Government has an online safety program call NetAlert, which offers independent, helpful and reliable advice and information about potential problems, dangers and threats on the internet and ways to minimise or avoid these problems.
  6. Some internet based activities that you may undertake include: Email Chatting IM Gaming Social Networking Blogging ‘ Surfing’
  7. Email Electronic mail that is sent over the internet to someone else. Email services are provided by your internet service provider, however there are many web based email providers as well such as Microsoft hotmail, yahoo and google’s g-mail. Email is like sending a letter instantly anywhere in the world. You can attach virtually anything to any electronic file to an email such as images, music files and other documents. Email is great because it is almost instantaneous communication. It can reduce paper usage. The risks associated with email include spam, ‘flaming’, ‘bombing’, stalking, viruses, bullying and inappropriate content.
  8. Social Networking Social networking web sites are where people create profiles about themselves and then link with others who are members of the same network. They are free to join, all that is needed is a valid email address. These sites can be great fun. Does anyone have a facebook or myspace account? Risks associated with social networking includes no verification of personal details anyone can set up and account, identity theft through display of personal information, time wasting and addiction and cyber bullying.
  9. Chatting : This is a way of communicating with a number of people at the same time. These conversations happen in chat rooms which are virtual meeting places. You can find chat rooms on the internet and connect with people with similar interests to yourself. Chat rooms can be great for connecting with people with similar interests e.g. wine lovers, knitters The risks associated with chat rooms include people can pretend to be someone they are not. Anonymity may lead people to engage in behaviour they would not if they were known to the other participants. Care should be taken in how much personal information is given out to the people with whom you are chatting.
  10. Instant message : Is another form of online chat and is between two or more people. Instant messaging is also known as IM, Iming, internet relay chat (IRC) or ICQ (I seek you). This is an example of SLQ’s instant message service. We encourage people to use this when they have a quick query for a library staff member e.g. what time are you open? What is a good resource for my assignment. The risks associated with IM include private conversations are easy to start with anyone in realtime and personal information can be given out in error.
  11. Gaming Online gaming involves playing a game over the internet, often with other people, and is a rapidly growing pastime. No longer is it just the domain for geeky teenagers. All sorts of people of all sorts of ages play games online and there is plenty of variety. All you need is a computer which is connected to the internet. If you want to play with others then you will find plenty of people online to play the game with you. The speed of your internet connection will determine the types of games you can play, so the faster your connection the more choice you will have. What are the risks? Gaming can be a lot of fun for young people, but there are some risks associated with this activity. Addiction, Desensitisation to violence and cyber bullying
  12. Blogging The word blog is short for web log. It refers to a particular category of website where the content is presented in a continuing sequence of dated entries. Put simply, a blog is an online diary. A blog can be produced by one author or carried out collaboratively by a community of authors. Blogs are web sites that contain brief entries displayed in reverse chronological order. The newest entry is at the top of the webpage and can be updated from several times a day to just weekly or monthly. What are the risks? There are risks associated with the personal information which can be posted in a blog.   Posting too much personal information Posting inappropriate comments, images Not understanding the security features of a blogging platform  
  13. Finally General web surfing Not an exhaustive list but a general overview
  14. Let’s take a look at some general internet safety issues: Malicious computer programs Worms – these are self replicating programs that damage computer networks. Trojans – malicious programs disguised as safe ones, which give people access to your computer without your knowledge Adware – advertising message that ‘pop up’ on your computer screen Spyware – collects data from your computer – such as what you are doing on line – and then sends it to others Keystroke loggers – record information that is typed on the keyboard, which the installer then users. Viruses – computer programs designed to damage your computer in some way. They are often sent as attachments to emails. Viruses can be spread by email but also can be branded as products to download from the web such as “speed up your connection” or “your registry has an error”.
  15. Hackers Hackers are criminals who try and break into your computer system and steal your personal information or cause damage to computer programs. Exposure to inappropriate material Pornographic and sexually explicit material Offensive material Material that is hateful or violent in nature Material that encourages dangerous or illegal activity Physical danger Meeting someone you met online without taking adequate safety percautions Financial Risks Via email + Online marketing + Online gambling + phishing
  16. Harassment and Bullying cyber bullying Privacy revealing name, email address, age, gender, telephone number and other personal details completion of details and then advertising is targeted at you Unreliable Information Some websites may misrepresent the truth, be misleading, be out of date, biased or incorrect. Spam The equivalent of junk mail or telemarketing calls. Unsolicited electronic mail sent out in bulk to individuals or organisations that did not consent to receive it Identity Theft People can steal your personal information and pretend they are you for financial benefit.
  17. Two things that we can all do are educate ourselves about internet safety and make our computer safe.
  18. If you have children and young people using the internet then you should also empower them to make the right decisions through education and provide adequate supervision, based on their age.
  19. To ensure you are getting the best possible protection for your computer you should talk to a range of people about what is best for you. You could ask your internet service provider or a computer store or retailer how to keep your computer safe.
  20. Alternatively you may like to go to www.staysmartonline.gov.au. This site shows information on keeping your computer safe, information for small business along with information for keeping children and young people safe
  21. We can’t provide you with any product recommendations however, you may like to research these items to help protect your computer.
  22. Anti-virus software Viruses have the ability to destroy files on your computer including photos. They may also prevent you from accessing your computer. Antivirus software is important to protect your computer from malicious computer programs. You should ensure the automatic update option is always on and you regularly update your subscription. There are a number of free or relatively inexpensive anti virus software available for down load from the internet.
  23. Anti spyware software Use anti spyware software to protect your computer from Spyware. Spyware is software that is installed on a computer and takes information from it without your consent or knowledge and gives that information to a third party. Spyware is an intelligence gathering tool—it is used to spy on people on the internet and collect personal information about them such as banking and credit card details or other sensitive, commercial or private information.
  24. Firewall A firewall monitors information going in and out of your computer. It can be in the form of a software program or a piece of hardware. It is designed to let through the websites and files you want to view on the Internet and block those that you don't.
  25. Pop Up Blockers These can be activated in your internet browser or can be downloaded free from the internet. Pop up blockers are designed to stop new windows from popping up on your screen. It does not guarantee that unwanted material won’t come through and on occasions pop ups you require may be blocked. You should have the option to temporarily allow popups on a site or always allow popups on that site.
  26. Reducing Spam You can reduce spam by activating any spam filter options that your internet service provider offers or your can activate any spam filtering function provided by the email program you use. Check if your email provider has options for reporting spam. Once again this does not always guarantee that you won’t receive spam email. At minimum you should consider installing anti virus software and a firewall on your computer. You may also like to consider content filters.
  27. As the name suggests internet filters can be used to help you only view the type of content that you wish to see. These are a good idea for managing internet access of children and young people. Most internet content filters have adjustable settings so you can create individual user profiles and choose the amount and types of content you want each user to avoid. Content filters can be restrictive for example if you wish to research breast cancer you may be blocked as the word breast is considered inappropriate.
  28. You can talk to your internet service provider about what services they can provide and recommend. Australian ISPs bearing the Ladybird Seal have committed to comply with the IIA Codes of Practice. Under the Codes, ISPs are required to provide users with the option of obtaining an IIA Family Friendly internet content filter, either for free or on a cost-recovery basis.
  29. The Australian Internet Industry Association (IIA) maintains a list of Family Friendly internet content filters (www.iia.net.au). To qualify for IIA Family Friendly status, a filter must block internet content that has been found to be prohibited by the Australian Communications and Media Authority (ACMA), be easy to install and use and include technical support. At the State Library we do not have content filters on our computers.
  30. It is important to look at wireless internet as households are increasingly using wireless as a form of internet connection. Whether this is because they have more than one computer in their household with all users wanting internet access or due to your location the choice is dial up or wireless and wireless offers the best speed. Wireless connects via radio waves as opposed to cable connection. Information relating to the protection of your wireless internet can be found at the Government’s website stay smart on line. The following information came from this site.
  31. If you choose to have a wireless connection you must ensure that it is able to be protected from unauthorized users. Ensure you set a strong password for your wireless hardware and software. You may like to restrict how many people can see your wireless network by: turning off the feature that automatically and constantly broadcasts your wireless network's name (this is called the SSID) beyond your premises into the local area; and reducing the power of the transmission (if your wireless equipment allows it) so it reduces the distance that the signal carries. Make sure you have encryption turned 'on' in your wireless software settings. Turn off any feature your wireless hardware may have that allows you to give administration access to someone off-site, e.g. an administrator who might be anywhere on the Internet, such as the person who looks after your computers. Turn off your wireless connection when you are not using it. Source (http://www.staysmartonline.gov.au/)
  32. A report by the Australian Bureau of Statistics shows that over 5 percent of Australians over 15 were victims of personal fraud in 2007. The most common fraud attack was ID fraud, with around 500,000 successful attacks. The most popular forms of ID fraud were credit and bank card fraud at over 380,000 and the remaining 124,000 was identity theft. The average financial loss was $450 per person. Identity fraud is more likely to occur to those who earn a higher income. Around 20% of ID fraud occurred via email or the internet. Did anyone hear about the Beijing Olympic ticket scam? A number of people purchased tickets for the Beijing Olympics from sites that appeared legitimate. The sites looked official one was called beijingticketing.com and the other Beijing-tickets2008.com. 45 people registered as being victims of this scam and had claimed to have lost almost $120,000. In November 2008 a number of people were arrested in relation to this crime.
  33. A website that you may like to view is SCAMwatch this is a site owned and maintained by the Australian Competition and Consumer Commission. It was set up to help consumers to recognise, report and protect themselves from scams. www.scamwatch.gov.au
  34. Scams: We often hear tales of people falling victim to scams. Scams target all types of people as mentioned the average financial loss relating to personal fraud was $450. Not all scammers are after money some are after your personal details to steal your identity. Examples include the well known Nigerian Bank scam, fake lotteries, employment and dating scams Follow the rule, if it appears too good to be true, it probably is. Be wary, don’t be pressured into providing credit card details or personal details.
  35. Here are some examples of scams Dating
  36. Here are some examples of scams Nigerian Bank
  37. Phishing is the practice of luring people to a fake website by using emails that seem to come from legitimate businesses. SHOW VIDEO - http://www.youtube.com/watch?v=sqRZGhiHGxg&feature=fvw They often use the organisation’s logo. Expired passwords, accounts that need to be updated and asking for user names and passwords often appear in these emails. Commonly impersonated are EBay, Banks, Pay Pal, Email providers and often at tax time the ATO. The aim is to steal your personal data. Then the information maybe used to steal your money sometimes information is gained and then sold to a third party.
  38. Here are some great examples of phishing. These have all been contributed by staff here at the library Examples Pay Pal
  39. Here are some great examples of phishing. These have all been contributed by staff here at the library Examples Credit union of australia
  40. Let’s take a closer look at email and protection yourself.
  41. it appears too good to be true it probably is! Personal Information Any e-mail asking for your name, birth date, email username, email password or any other type of person information, no matter who it appear to be from is almost certainly a scam. Banks, email providers do not ask for personal details and user names and passwords via email. If you believe an email is a scam do not reply to the email or click on any links. Don’t hesitate to contact the company to confirm the email is legitimate. Check the accuracy of the email. Is the company brand or logo correct? Are there spelling mistakes or poor grammar. Are there phrases such as “this is not a joke”, “forward to your friends”, Change your email password on a regular basis Have a strong password which includes a letters and numbers and is at least 8 characters long.
  42. Some email accounts have automatic junk account where you can report back to the account provider that the email is not from an authorized source. If you suspect someone has gained access to your email account contact the account provider immediately to get help as what to do. Be careful not to sign up for something that you do not wish to receive. Do not send credit card information via email, this method of communication is not usually secure. e-mails stating they are from Microsoft or similar organisation about the worst virus every to be found are normally untrue. viruses are not only spread by email they can be in products available to download from the web
  43. Protect your privacy and reduce the risk of your identity being stolen Don’t provide information to someone you meet on the internet, just as you would not give out information to someone you met on the street. Don’t display your personal address, email address or other contact details on blogs, websites or social networking sites Have strong passwords – eight or more characters which include numbers Do not store your account numbers and personal identification numbers and/or passwords together Delete emails that ask for your personal details Make sure your online banking is secure. It is advisable to change your password regularly and make sure you log off when finished. Only shop at online places your have heard about or know are reputable Investigate secure purchase options such as pay pal.
  44. Ensure there is a lock icon in the browser and/or https in the address line.
  45. Social Networking is an increasingly popular way of connecting with others. Well known and popular sites include FACEBOOK AND TWITTER Social networking web sites are where people create profiles about themselves and then link with others who are members of the same network. They are free to join, all that is needed is a valid email address.
  46. You can display as little or as much information in your profile as you like. Once a member of a social networking site you can participate in a range of activities. These can include:- Online chat Share photos Share videos Commenting on other peoples profile and content Participating in blogs and discussions What you choose to use, or not, is personal and will be dependent on your needs
  47. The Risks associated with Social networking web sites. No verification of personal details : the majority of social networking sites do not verify person details. Most social networking sites will restrict membership to those who are over 14. It is extremely easy for people to set up a false profile. Personal Information : Personal information can be posted onto profiles, mistakenly be given out in chat rooms or on blogs. internet addiction : People can spend many hours on line communicating with others, updating their profile, looking at other peoples profiles and much more. Other tasks may suffer. Cyber Bullying and Flaming : Many social networking sites encourage commenting on other peoples profile and in some cases rating of content. This opens up the opportunity for nasty comments to be made. This can be particular upsetting for young people, particularly if comments are posted in group discussions or blogs. Opening links to sites that have viruses or inappropriate content
  48. Protecting Yourself Before you become a member of a social networking site ensure you read their privacy policy and or terms of use. Do not display your full date of birth on your profile page to protect yourself from identity theft Check if the site will allow you to remove your profile if you no longer wish to be a member Do not display your personal email address or contact details. If you are using the site for business purposes ensure you only display your business contact details. Only accept requests for friends from people you know. Check if the site will allow you to block people you no longer wish to be in contact with. Don’t post photos or videos that you wouldn’t be happy for your boss or children to see. Educate and supervise young people using social networking sites. Make the computer safe. Talk about this later
  49. Cyber bullying is bullying which is carried out through an internet service. This could be through email, instant messaging, social networking sites, discussion group or chat room. It can be also through sms on mobile phones. It is a bit like bullying in the workplace or school yard except bully’s will often say things online that they wouldn’t say in person. Cyber bullying can be teasing and being made fun of or spreading rumours on-line. People can be bullied by one person or by groups. An online safety survey conducted by NetAlert and ninemsn in February 2007 found that: 16% of young people said they had been bullied online, while 14% were bullied through their mobile, with boys and girls experiencing similar levels. 56% thought it was easy to get bullied online If you are being cyber bullied it is possible that you're feeling powerless and isolated. Children may verbalise that they have been a victim of cyber bullying.
  50. Stopping the problem. Keep a record (including time and date). This may help you (or the police) to find out who is sending the messages. 2. Tell someone. Talk to someone you trust, a parent, friend, work colleague. 3. Contact your phone or Internet service provider and report what is happening. They may be able to help you block messages or calls from certain senders. 4. If messages are threatening or serious get in touch with the police. Cyber-bullying, if it's threatening, is illegal. You don't need to put up with that!
  51. 5. Don't reply to bullying messages. It'll only get worse if you do. By replying the bully gets what he or she wants. Often if you don't reply the bully will leave you alone. 6. Change your contact details. Get a new user name for the Internet, a new e-mail account, a new mobile phone number and only give them out to your closest friends. 7. Keep your username and passwords secret. Keep your personal information private so it doesn't fall into the hands of someone who'll mis-use it. Under certain circumstances (such as harassment and making threats) cyber bullying is a criminal activity and is illegal. If you feel your safety is at risk, contact your local police. Police around Australia work together to reduce this type of crime and there are serious consequences if people participate in such activities. Remember If you wouldn’t say it in person don’t say it on line!
  52. The ABS Patterns of internet access in Australia, 2006 notes that Families (both couple and single parent) with children under 15 and dependent students are more likely to be connected to the internet than households without children or dependent students. (p 2)
  53. Young people are also likely to be exposed to the internet at school, friends’ places and libraries. Young people are likely to be participating in activities such as web browsing, using social networking sites, emailing, downloading music or movies, and iming. Young people are often doing more than one activity at a time and are good multi-taskers when it comes to utilising the internet. Young people love social networking. After all making friends is an important part of childhood.
  54. Young people can be exposed to a range of risks, including those that adults are exposed to. Some of these dangers have been transferred from the real world into the virtual world. Risks include Accessing inappropriate content Exposure to unwanted advertising and marketing financial risks (not necessarily theirs) Example about Angus the E-Bay user harassment and bullying
  55. Exploitation Spam Unreliable information viruses Online predators Unmoderated chat rooms. These are easy to access through social networking and other internet sites. Even chat rooms that are specifically designed for young people may have adults in them.
  56. Protecting yourself and your family. Choose an internet service provider that has been given a ‘ladybird seal’ by the Internet Industry Association. The seal is awarded to providers who demonstrate best practice standards.
  57. Talk as a family about why it is important to stay safe online and have an internet safety contract which is signed by all members of the family. An example of an internet safety contract can be found at http://www.cybersmart.gov.au/cyberquoll/resources/parents/cyberquoll_familysafetycontract.pdf
  58. Educate your children how to use the internet safely. Things that you could include are Don’t meet people in person you met on line Don’t believe everything you read, hear or see Ask permission before providing personal information Report to an adult any offensive or inappropriate content and emails Think about what you post online, once posted it can be difficult to remove Never give out passwords even if the site says you have too Don’t open emails from people you don’t know Have the computer set up in a public area of the home. Resist the temptation to put computers in bedrooms where supervision becomes difficult. Consider having filters and other security software installed on your computer. Use a family friendly search engine such as yahookids. Alternatively ask your local public library or here at the state library for databases and other resources that are recommended for finding appropriate material for young people. Encourage children to report any problems they have. Supervise young children whilst they use the internet.
  59. Encourage all members of the family to use the internet and make good decisions. As children get older give then increased responsibility and access. Along with reduced supervision. Teach young people to identify advertising material As children get older they become extremely net savvy and will more than likely attempt to access material that they have been denied access to in the past. You may wish to use some of the Australian governments internet safety programs that are available for both parent’s and young children.
  60. Free Internet safety kit a parent’s guide to internet safety is available for downloading from www.netalert.gov.au or you may prefer to email net alter at [email_address] to order your free kit.
  61. Hector’s world is designed for young children starting out on the internet. It has games that reinforce the internet safety message. www.hectorsworld.com
  62. CyberSafe Schools is an educational program for school but parents can use as well. There are three programs and these can be accessed at www.netalert.gov.au
  63. Cyberquoll is an internet safety interactive educational program for primary school children ages 8 to 12 This can be accessed at http://www.cybersmart.gov.au/cyberquoll/index.html
  64. Don’t be afraid it’s not all bad
  65. Stay enthusiastic the internet is not all bad it can be a great place to Learn improve skills meet new friends connect with old ones.
  66. Educate yourself find a course, talk to library staff, chat with family and friends use NetAlert and other Government sites Protect your computer. Ensure that at a minimum you have anti virus software and a firewall installed on all of your computers. Talk with your family about safe internet usage. Install content filters to protect your children from access offensive or inappropriate material.
  67. Remember if it appears too good to be true……. it probably is. Questions??? Evaluation Thanks