1 / 13

What Would You Do?

What Would You Do?. The Risks of Behavior on the Internet. Internet Uses. Twitter. Yahoo! Messenger. Skype. Facebook. Instagram. Aol Instant Messaging. Social Networking Members. Employers. Pictures. Email. City. Hobbies. Gender. Age. Schools. Social Networking. Behavior

willa-dale
Download Presentation

What Would You Do?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What Would You Do? The Risks of Behavior on the Internet

  2. Internet Uses Twitter Yahoo! Messenger Skype Facebook Instagram Aol Instant Messaging

  3. Social Networking Members Employers Pictures Email City Hobbies Gender Age Schools

  4. Social Networking • Behavior • Would you do or say the same things in person? • Pictures • Once it’s out there you cannot get it back • Do you really know this person? • How many friends do you have? http://www.netsmartz.org/TeensTalkBack/OfflineConsequences

  5. The Results are In! http://www.youtube.com/watch?v=FQjJxJx8bms

  6. The Results are In! http://www.youtube.com/watch?v=DZ_f7yOAzPU&feature=rellist&playnext=1&list=PL491CCE4D1B59A5AD

  7. Predators • Use Social Networking to connect with people, usually children • Piece together information • Create profiles based on information that isn’t true (Dateline NBC)

  8. Beyond the Information • Phishing • An attempt to gain information by posing as a legitimate entity • Secure Connections • Should not connect to networks that you do not know • Passwords • Should be at least 8 characters, combination of upper/lower case, numbers, special characters • http://www.passwordmeter.com/ • http://howsecureismypassword.net/

  9. The Results are In!

  10. Protecting Yourself • Secure Networks • Use secure passwords • Set your accounts to private • Limit personal information • Don’t accept friend requests or request people you’ve never met • Don’t open email from strangers

  11. What does this all mean? • Careers • Friendships • Running for office • College entrance • Scholarship applications • Identity Theft http://www.msnbc.msn.com/id/11649424/ns/technology_and_science-security/#.UKRF2YbfSSp

  12. What Will You Do? Questions??

  13. References • 6th, 7th, and 8th grade class at The Montessori Middle School • Principles of Information Security by Michael E. Whitman, Herbert J. Mattord • http://www.msnbc.msn.com/id/11649424/ns/technology_and_science-security/#.UJb_uYbfSSo • http://ia.unm.edu/pdf/outreach/Handouts/Ten%20Internet%20Safety%20Tips%20for%20Kids.pdf • http://www.youtube.com/watch?v=FQjJxJx8bms • http://howsecureismypassword.net/ • http://www.passwordmeter.com/ • http://www.netsmartz.org/TeensTalkBack/OfflineConsequences • http://www.youtube.com/watch?v=DZ_f7yOAzPU&feature=rellist&playnext=1&list=PL491CCE4D1B59A5AD • http://ia.unm.edu/outreach.asp “Computers, Security, and You”, “Privacy Settings for Facebook”, “Danger Zones of the Internet”, “Ten Internet Safety Tips for Kids”

More Related