SlideShare une entreprise Scribd logo
1  sur  21
A Quick Online Safety Guide
         Grades 3-5
Why?
         The Internet represents
     s
         –   Great Opportunities
         –   Greater Responsibilities
         –   Greatest Chances for Dangerous Situations
         19% of teens feel safer online than in the real world*
     s
         39% of students trust people that they chat with
     s
         online*
         24% of students say they see nothing with chatting
     s
         with a stranger*
         10% of students have been asked to keep their
     s
         Internet relationship a secret*

*iSAFE America Student Assessment, 2004
Access
        Children between 8-18 use the
      s
        computer for more than an hour a day
      s 74% have a computer with Internet
        access*
      s 31% have high speed access (that
        number grows each year)*



*The George Lucas Foundation, “Synching Up With The iKid”, Edutopia, October 2005.
Types of People Who
       Use the Internet
  Responsible and Ethical
s
s Numbuts
s Hotheads
s Follow-You-Fionas
s Oogles
s Spamazoids
Responsible and
          Ethical
    They know the
s
    difference between
    right and wrong
    Wary of others
s
    Never shares
s
    personal information
    Has a good
s
    password
    Has a life beyond
s
    the computer
Numbuts
              Doesn’t have any
          s
              friends
              Stays in their room
          s
              all day
              Lacks social skills
          s
              Talks in code
          s
Hotheads
        They have a temper
    s
        They can lose
    s
        control of their
        temperature
        They say mean
    s
        things




Photo courtesy of Netsmartzkids.org
Follow-You-Fionas
                                          People who want to
                                      s
                                          be more than online
                                          friends
                                          Try to get personal
                                      s
                                          information
                                          May not be who
                                      s
                                          they say they are
                                          Trying to meet you
                                      s
                                          in person


Photo courtesy of Netsmartzkids.org
Oogles
                                          Trying to collect your
                                      s
                                          personal information
                                          Want to sell that
                                      s
                                          information to others
                                          Follow you around the
                                      s
                                          Internet
                                          They are sneaky may
                                      s
                                          want to give you “free”
                                          stuff




Photo courtesy of Netsmartzkids.org
Spamazoids
        They send out annoying
    s
        message that clog email
        accounts
        You didn’t ask for these
    s
        messages
        May contain things that do
    s
        bad things to your computer
        Watch out for phishing
    s
        (looking for personal
        information through email,
        usually updating accounts
        that you may or may not
        have with legit companies)
Photo courtesy of Netsmartzkids.org
Your Personal
          Information
    Phone Number, Address, Age, Name, Parents’
s
    Name, School, Grade, Work Information,
    Passwords, Usernames, etc.
    Once you give it away you can never take it
s
    back completely
    The only people you should trust with it are
s
    your parents (not even your best friend)
    Avoid putting personal pictures of yourself
s
    and friends online
Usernames and
       Profiles
  Make them unique and generic
s
s Only provide the required information
s Resist the temptation to revel personal
  information through usernames and
  profiles
Passwords
  Your key to safety
s
s Make it strong
    – Use a mix of capital and lower case letters,
      numbers, and special characters
    – Make it at least 8 characters long
    – Don’t use words or names
    Change it on a regular basis
s
Online Friends
  Let them be just that
s
s Don’t meet people you only know from
  being online with them
s You have no idea who the person is on
  the other computer
s Online only friends are still strangers
Cyber-bullying
         More likely to occur online than in person
     s
         (42% of students have been bullied)
         Follows you around easier than in person
     s
         Avoid situations by
     s
         –   Being kind to others
         –   Don’t use ALL CAPS
         –   Don’t send messages when you are angry
         Let adults know when it happens (58% of
     s
         students have not told an adult when they’ve
         been bullied online)

*iSAFE America Student Assessment, 2004
Don’t be afraid to talk
  Your parents care
s
s Involve them with your “online” life
s Let them know if you run into things
  that make you feel scared and
  comfortable
s Always get permission first
Putting up your guards
  Free Stuff
s
s Attachments
s Online Protection
“Free Stuff”
  Nothing is free on the Internet
s
s Your personal information is usually at
  risk
s Could be hidden costs that follow you
  for a long time
Attachments
    Added parts to the email
s
    May be legit stuff
s
    Could be a way for others to affect your
s
    computer with a virus or spyware
    Can be tricky and use people that you know
s
    (check in with them before you open
    attachments)
    Never open .exe attachments
s
    Watch out for links as well
s
Online Protection
    Get yourself Anti-Virus software
s
    –   AVG (free for home use)
    –   ClamAV (free for home use)
    –   Norton’s, McAfee ($)
    Get Adware and Spyware protection too
s
    –   Microsoft Defender
    –   Lavasoft
    –   Spybot
    Check with your ISP to see if they offer any
s
    online protection
    Update your software regularly and have it
s
    set to scan automatically
A Quick Online Safety Presentation

Contenu connexe

Tendances

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th gradePamela Taylor
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 

Tendances (20)

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Cyber safety training for 6th grade
Cyber safety training for 6th gradeCyber safety training for 6th grade
Cyber safety training for 6th grade
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Teens and social media
Teens and social mediaTeens and social media
Teens and social media
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Similaire à A Quick Online Safety Presentation

The World Wide Web
The World Wide WebThe World Wide Web
The World Wide WebTony L
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social mediaChas Stephens
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangersrangashree
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 

Similaire à A Quick Online Safety Presentation (20)

The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social media
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
E-safety leaflet
E-safety leaflet E-safety leaflet
E-safety leaflet
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

A Quick Online Safety Presentation

  • 1. A Quick Online Safety Guide Grades 3-5
  • 2. Why? The Internet represents s – Great Opportunities – Greater Responsibilities – Greatest Chances for Dangerous Situations 19% of teens feel safer online than in the real world* s 39% of students trust people that they chat with s online* 24% of students say they see nothing with chatting s with a stranger* 10% of students have been asked to keep their s Internet relationship a secret* *iSAFE America Student Assessment, 2004
  • 3. Access Children between 8-18 use the s computer for more than an hour a day s 74% have a computer with Internet access* s 31% have high speed access (that number grows each year)* *The George Lucas Foundation, “Synching Up With The iKid”, Edutopia, October 2005.
  • 4. Types of People Who Use the Internet Responsible and Ethical s s Numbuts s Hotheads s Follow-You-Fionas s Oogles s Spamazoids
  • 5. Responsible and Ethical They know the s difference between right and wrong Wary of others s Never shares s personal information Has a good s password Has a life beyond s the computer
  • 6. Numbuts Doesn’t have any s friends Stays in their room s all day Lacks social skills s Talks in code s
  • 7. Hotheads They have a temper s They can lose s control of their temperature They say mean s things Photo courtesy of Netsmartzkids.org
  • 8. Follow-You-Fionas People who want to s be more than online friends Try to get personal s information May not be who s they say they are Trying to meet you s in person Photo courtesy of Netsmartzkids.org
  • 9. Oogles Trying to collect your s personal information Want to sell that s information to others Follow you around the s Internet They are sneaky may s want to give you “free” stuff Photo courtesy of Netsmartzkids.org
  • 10. Spamazoids They send out annoying s message that clog email accounts You didn’t ask for these s messages May contain things that do s bad things to your computer Watch out for phishing s (looking for personal information through email, usually updating accounts that you may or may not have with legit companies) Photo courtesy of Netsmartzkids.org
  • 11. Your Personal Information Phone Number, Address, Age, Name, Parents’ s Name, School, Grade, Work Information, Passwords, Usernames, etc. Once you give it away you can never take it s back completely The only people you should trust with it are s your parents (not even your best friend) Avoid putting personal pictures of yourself s and friends online
  • 12. Usernames and Profiles Make them unique and generic s s Only provide the required information s Resist the temptation to revel personal information through usernames and profiles
  • 13. Passwords Your key to safety s s Make it strong – Use a mix of capital and lower case letters, numbers, and special characters – Make it at least 8 characters long – Don’t use words or names Change it on a regular basis s
  • 14. Online Friends Let them be just that s s Don’t meet people you only know from being online with them s You have no idea who the person is on the other computer s Online only friends are still strangers
  • 15. Cyber-bullying More likely to occur online than in person s (42% of students have been bullied) Follows you around easier than in person s Avoid situations by s – Being kind to others – Don’t use ALL CAPS – Don’t send messages when you are angry Let adults know when it happens (58% of s students have not told an adult when they’ve been bullied online) *iSAFE America Student Assessment, 2004
  • 16. Don’t be afraid to talk Your parents care s s Involve them with your “online” life s Let them know if you run into things that make you feel scared and comfortable s Always get permission first
  • 17. Putting up your guards Free Stuff s s Attachments s Online Protection
  • 18. “Free Stuff” Nothing is free on the Internet s s Your personal information is usually at risk s Could be hidden costs that follow you for a long time
  • 19. Attachments Added parts to the email s May be legit stuff s Could be a way for others to affect your s computer with a virus or spyware Can be tricky and use people that you know s (check in with them before you open attachments) Never open .exe attachments s Watch out for links as well s
  • 20. Online Protection Get yourself Anti-Virus software s – AVG (free for home use) – ClamAV (free for home use) – Norton’s, McAfee ($) Get Adware and Spyware protection too s – Microsoft Defender – Lavasoft – Spybot Check with your ISP to see if they offer any s online protection Update your software regularly and have it s set to scan automatically