520 likes | 628 Views
Staying Incognito. Talk to Me. Let’s Get Together. If you can’t say something nice…. Miscellaneous. 100. 100. 100. 100. 100. 200. 200. 200. 200. 200. 300. 300. 300. 300. 300. 400. 400. 400. 400. 400. 500. 500. 500. 500. 500.
E N D
Staying Incognito Talk to Me Let’s Get Together If you can’t say something nice… Miscellaneous 100 100 100 100 100 200 200 200 200 200 300 300 300 300 300 400 400 400 400 400 500 500 500 500 500
This should be at least eight characters long; contain a combination of letters, numbers, and special characters; and should not contain your login name, your first or last name, or any other information that is easy to find out about you.
What is a strong, secure password? Source: http://www.microsoft.com/athome/security/privacy/password.mspx
To do this, choose a favorite quote, phrase, saying, song, then use the first letter or syllable from each word of the quote.
Before doing this, make sure the Web site address starts with "https" and that your browser's status bar displays the "lock" icon.
What is submit financial information through a Web site? Remember: never in an e-mail
These products allow adults to closely and specifically control what their children access.
Examples of this category are: pictures, names and addresses, schools you attend, cell or phone numbers and many other things, such as the name of your school team.
What is Personal Information? Source: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec13.htm
What is Chat lingo, cyber talk, etc? Source: http://www.missingkids.com/adcouncil/lingo.html
What you should do if you receive unsolicited emails with attachments from unknown senders.
What is do not open them and/or delete them? Source: http://dispatch.mcafee.com/virus_tips.asp
This Internet technology notifies a user when a friend is online and allows them to "converse" by exchanging text messages.
ICQ, an instant messaging computer program, owned by Time Warner's AOL subsidiary, got its name from this phrase.
What is “I Seek You”? Source: http://www.answers.com/topic/icq
A Web site to which one or more people post their personal observations on particular subjects.
Blurring, morphing or changing photos you post on your site makes them interesting, but also does this.
What helps protect your identity? Sources: http://www.wiredsafety.org/resources/pdf/socialnetworktips.pdf
What is something you should never do? Source: http://www.wiredsafety.org/safety/chat_safety/index.html
You are practicing this when you are courteous, honest and polite when using the Internet.
What is Netiquette? Source: http://www.answers.com/netiquette&r=67
These should be set so that :1. people can only be added as your friend if you approve them2. people can only view your profile if you have approved them as a friend
What are the Privacy Settings? Source: http://tcs.cybertipline.com/knowthedangers7.htm
Posting or sending a deliberately confrontational message via newsgroup, e-mail, etc., usually in response to a previous message.
What is flaming? Source: http://www.netsmartz.org/safety/definitions.htm
In this type of cyberbullying, the cyberbully doesn’t see themselves as a bully at all. They see themselves as righting wrongs, or protecting themselves or others from the “bad guy” they are now victimizing.
What is “The Vengeful Angel”? Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html
These cyberbullies want to exert their authority, show that they are powerful enough to make others do what they want and control others with fear.
What are The “Power-Hungry” (and/or) “Revenge of the Nerds”? Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html
This cyberbullying is usually done or planned in a group, either virtually or together - and is done for entertainment.
What is “Mean Girls”? Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html
These cyberbullies usually don’t think they are cyberbullies at all. They tend to respond in anger or frustration.
What is “Inadvertent” or “Because I Can”? Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html
An online scam where users think they are going to a legitimate web site, when in fact they are unknowingly redirected to an illegitimate site that steals their personal information.
What is Pharming? Source: http://www.netsmartz.org/safety/definitions.htm
Emails or web sites are used to solicit personal and financial information for purposes of gaining access to those accounts.
What is Phishing? Source: http://www.netsmartz.org/safety/definitions.htm
This Internet behavior is almost always characterized by the individual relentlessly pursuing his\her victim online and is very likely to include some form of offline attack, as well.
What is Cyberstalking? Source: http://www.netsmartz.org/safety/definitions.htm
If mis-configured, these programs may expose the contents of your entire hard drive to all other users of the program.
What is file-sharing? Source: http://security.getnetwise.org/tips/filesharing/
This group of 13-18 year-old volunteers has been specially trained in all aspects of online safety, privacy, and security. They run unique programs in schools to spread the word about responsible and safe surfing.