SlideShare a Scribd company logo
1 of 19
Internet Safety Tips to Keep Students safe while  Exploring the ‘net Robin Nappi EdTech 541 Fall 2011
Internet Safety <embed src=&quot;http://www.teachertube.com/embed/player.swf&quot;  width=&quot;470&quot;  height=&quot;275&quot;  bgcolor=&quot;undefined&quot;  allowscriptaccess=&quot;always&quot;  allowfullscreen=&quot;true&quot;  flashvars=&quot;file=http://www.teachertube.com/embedFLV.php?pg=video_165953&menu=false&frontcolor=ffffff&lightcolor=FF0000&logo=http://www.teachertube.com/www3/images/greylogo.swf&skin=http://www.teachertube.com/embed/overlay.swf&volume=80&controlbar=over&displayclick=link&viral.link=http://www.teachertube.com/viewVideo.php?video_id=165953&stretching=exactfit&plugins=viral-2&viral.callout=none&viral.onpause=false&quot; />
With Social Networking, Your Safety’s at Sake… ,[object Object],[object Object],Image source morguefile:http://mrg.bz/oBLbEM
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile:   http://mrg.bz/0F6fg8
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/byySzY
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/qjMfce
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/GJc118
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/zfSgLy
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/xxyNdo
With Social Networking, Your Safety’s at Sake… ,[object Object],Image source morguefile: http://mrg.bz/0B6o9J
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/dJwALA
Safety Concerns in General… ,[object Object],Image source: screenshot: rnappi
Safety Concerns in General… ,[object Object],Image source:screenshot, rnappi
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/nIkQsz
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/miTt5T
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/w2JBND
Safety Concerns in General… ,[object Object],Image source morguefile: http://mrg.bz/Xateje
The Case of the Cyber Criminal  ,[object Object],[object Object]
Where Do I Find More Information? ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

OpenID Security
OpenID SecurityOpenID Security
OpenID Security
eugenet
 
Briget kavanaghs english preentation
Briget kavanaghs english preentation Briget kavanaghs english preentation
Briget kavanaghs english preentation
Bee255
 
20090529 Phpstudy
20090529 Phpstudy20090529 Phpstudy
20090529 Phpstudy
Yusuke Ando
 
My Learning Style Presentation
My Learning Style PresentationMy Learning Style Presentation
My Learning Style Presentation
guest16e403
 

What's hot (11)

Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
Usable security
Usable securityUsable security
Usable security
 
Ideology
IdeologyIdeology
Ideology
 
King louis xvi
King louis xviKing louis xvi
King louis xvi
 
OpenID Security
OpenID SecurityOpenID Security
OpenID Security
 
Χρήσιμα URLs
Χρήσιμα URLsΧρήσιμα URLs
Χρήσιμα URLs
 
Practica 3 manejo de repertorio
Practica 3 manejo de repertorioPractica 3 manejo de repertorio
Practica 3 manejo de repertorio
 
Briget kavanaghs english preentation
Briget kavanaghs english preentation Briget kavanaghs english preentation
Briget kavanaghs english preentation
 
Blogs trucos
Blogs trucosBlogs trucos
Blogs trucos
 
20090529 Phpstudy
20090529 Phpstudy20090529 Phpstudy
20090529 Phpstudy
 
My Learning Style Presentation
My Learning Style PresentationMy Learning Style Presentation
My Learning Style Presentation
 

Viewers also liked (6)

Licitação
LicitaçãoLicitação
Licitação
 
Anorexia
AnorexiaAnorexia
Anorexia
 
56365695 programacao-semic
56365695 programacao-semic56365695 programacao-semic
56365695 programacao-semic
 
Tendencia ambientales
Tendencia ambientalesTendencia ambientales
Tendencia ambientales
 
La responsabilidad
La responsabilidadLa responsabilidad
La responsabilidad
 
Calendario Layout 1
Calendario Layout 1Calendario Layout 1
Calendario Layout 1
 

Similar to Internet safety

Community presentation
Community presentation Community presentation
Community presentation
ozesteph1992
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
oscon2007
 
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - WhitepaperAn analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
n|u - The Open Security Community
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepat
Nie Andini
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
safetyseminar
 
Georgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityGeorgia Tech hacking Accessibility
Georgia Tech hacking Accessibility
Christian Heilmann
 

Similar to Internet safety (20)

Community presentation
Community presentation Community presentation
Community presentation
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Things that go bump on the web - Web Application Security
Things that go bump on the web - Web Application SecurityThings that go bump on the web - Web Application Security
Things that go bump on the web - Web Application Security
 
Os Nightingale
Os NightingaleOs Nightingale
Os Nightingale
 
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - WhitepaperAn analysis of a facebook spam exploited through browser add-ons - Whitepaper
An analysis of a facebook spam exploited through browser add-ons - Whitepaper
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
 
Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan Unity3D Basic Concepts by: shamal aryan
Unity3D Basic Concepts by: shamal aryan
 
Setting modem smartfren supaya cepat
Setting modem smartfren supaya cepatSetting modem smartfren supaya cepat
Setting modem smartfren supaya cepat
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017I just hacked your app! - Marcos Placona - Codemotion Rome 2017
I just hacked your app! - Marcos Placona - Codemotion Rome 2017
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
Pixlr and small apps in the classroom
Pixlr and small apps in the classroomPixlr and small apps in the classroom
Pixlr and small apps in the classroom
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Georgia Tech hacking Accessibility
Georgia Tech hacking AccessibilityGeorgia Tech hacking Accessibility
Georgia Tech hacking Accessibility
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
 
Fmp proposal 2020 1
Fmp proposal 2020 1Fmp proposal 2020 1
Fmp proposal 2020 1
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 

Recently uploaded

Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
Elizabeth Walsh
 

Recently uploaded (20)

21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptxMichaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
Michaelis Menten Equation and Estimation Of Vmax and Tmax.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Internet safety

  • 1. Internet Safety Tips to Keep Students safe while Exploring the ‘net Robin Nappi EdTech 541 Fall 2011
  • 2. Internet Safety <embed src=&quot;http://www.teachertube.com/embed/player.swf&quot; width=&quot;470&quot; height=&quot;275&quot; bgcolor=&quot;undefined&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; flashvars=&quot;file=http://www.teachertube.com/embedFLV.php?pg=video_165953&menu=false&frontcolor=ffffff&lightcolor=FF0000&logo=http://www.teachertube.com/www3/images/greylogo.swf&skin=http://www.teachertube.com/embed/overlay.swf&volume=80&controlbar=over&displayclick=link&viral.link=http://www.teachertube.com/viewVideo.php?video_id=165953&stretching=exactfit&plugins=viral-2&viral.callout=none&viral.onpause=false&quot; />
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Editor's Notes

  1. Think about how different sites work before deciding to join a site. Some sites will allow only a defined community of users to access posted content; others allow anyone and everyone to view postings.
  2. Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people, for example, your friends from school, your club, your team, your community groups, or your family.
  3. Keep your information to yourself. Don’t post your full name, Social Security number, address, phone number, or bank and credit card account numbers — and don’t post other people’s information, either. Be cautious about posting information that could be used to identify you or locate you offline. This could include the name of your school, sports team, clubs, and where you work or hang out.
  4. Make sure your screen name doesn’t say too much about you. Don’t use your name, your age, or your hometown. Even if you think your screen name makes you anonymous, it doesn’t take a genius to combine clues to figure out who you are and where you can be found.
  5. Post only information that you are comfortable with others seeing — and knowing — about you. Many people can see your page, including your parents, your teachers, the police, the college you might want to apply to next year, or the job you might want to apply for in five years.
  6. Remember that once you post information online, you can’t take it back. Even if you delete the information from a site, older versions exist on other people’s computers.
  7. Flirting with strangers online could have serious consequences. Because some people lie about who they really are, you never really know who you’re dealing with
  8. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust and report it to the police and the social networking site. You could end up preventing someone else from becoming a victim.
  9. Viruses are harmful computer programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause havoc. Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers. A good virus protection software program can protect you, but you must keep it up to date.
  10. The terms &amp;quot;spyware&amp;quot; and &amp;quot;adware&amp;quot; apply to several different technologies. The two important things to know about them is that 1) they can download themselves onto your computer without your permission (typically when you visit an unsafe Web site or via an attachment) and 2) they can make your computer do things you don&apos;t want it to do. That might be as simple as opening an advertisement you didn&apos;t want to see. In the worst cases, spyware can track your online movements, steal your passwords and compromise your accounts.
  11. Although they sound like something out of a bad science fiction movie, botnets have become a very real danger on the Internet. Botnets are made up of large numbers of computers that have been infected by criminals (using some of the tools mentioned before). Often, the people whose computers are controlled by a botnet don&apos;t even know that they&apos;ve been infected. Criminals use these armies of infected computers to attack Web sites by flooding them with massive amounts of traffic or as engines for sending spam. These attacks can devastate companies, and even entire countries in some cases. Victims caught in botnets can also be subject to identity theft as their personal information is compromised.
  12. Three protections that every computer connected to the Internet should have installed are:Anti-Virus Software, a Firewall, and Anti-Spyware Software. This software suite, which sometimes can be purchased as a package, is your frontline defense against cyber criminals and intrusions. Installing these software packages is the first step. Equally important is keeping them up to date.
  13. Anti-virus software protects your computer from viruses by scanning your computer and your incoming email and deleting anything that is infected. Viruses can destroy your data, slow your computer&apos;s performance, cause a crash, or allow spammers to send email through your account.
  14. Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don&apos;t permit. Some operating systems come with a built-in firewall that may be set on the &amp;quot;off&amp;quot; mode. Make sure you turn it on and keep it updated. Check your online &amp;quot;Help&amp;quot; feature for specific instructions.
  15. Spyware is a form of malicious software that monitors your online activities and can potentially collect your personal information. Anti-spyware software helps protect your computer from spyware. It periodically scans your computer for spyware programs, and then gives you the opportunity to remove any harmful surveillance software found. Some anti-virus software also contains anti-spyware capability. Given the increasing sophistication of spyware programs, consider using two different anti-spyware programs. Each one looks for slightly different sets of threats, and together they may offer increased protection.