Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.



No description

Sandra Yescas

on 12 June 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of CyberSafety

CyberBullying Definition: Cyberbully is when a child is tormented, threatented, harassed, embarrassed or targeted by another child using the internet, phone or some sort of technology. types: Cyberstalking, Flameing, Exclusion, Outing, Masquerading. strategies: Tell someone, Don't replay to bully messages, Block to cyberbully, Report the problem, Keep the evidence keep your password a secret. Social Media Forms of electronic communication through which users create online communities to share information, ideas, personal messages, and other content. Definition: Types of site: Blogs, social networking, social news, social measuring, microblogging, social bookmarking, video sharing, photo sharing, social email. Guidelines To Follow: Maintain confidentiality, Maintain privacy,
Do no harm, Be aware of Liability,
Maintain transparency,
Correct mistakes, Respect others, Think be for you post. Personal Information Definition: Is used information security, refers to information that can be used to uniquely, contract , or locate a single person or can be used with other sources to uniquely identify a single individual. Examples : Your first name, last name, user name or password,age, ID number or social security number, email address, your phone number your home address, what city you live in, what neighborhood you live in, parents names, what school you go to, credit card numbers, places near your house, like parks, stores, places you visit regularly, if your home alone, when your going to be home alone. Rules to follow: 1- Never input your personal information online like real names, address, phone number or anything that you can be identified with. 2- Never put online any information of your family members. 3- Never upload photos and videos online as they can easily be misused online by online predators. 4- Never download anything without first letting your parents know, as these might contain harmful stuffs and jeopardize your familys safety. 5-Do not get friendly with strangers online no matter how friendly they appear. Online predators assume the best of online identities. 6- Any information which you feel uncomfortable with, should be brought to the notice of your parents immediately. 7- Protect your user name and password at all times. never let it out to anyone. 8- Never agree to meet someone you meet onlline without consulting your parents first, as your parents if at all they agree will ensure security like arranging for a public meeting place. User Name Definition: It is a unique sequence of character used to identify a user and allow access to a computer system, computer network, or online account. Rules to follow: 1- It must be unique. If the username you entered already exists, you will need to try a different one. 2- It must consist of maximum of six characters. 3- It cannot be the same as your password. 4- It cannot be the same as your security answer. 5- Its permanent. Once registration has been submitted, username cannot be changed. Why should you be aware? If someone brakes into the login though, the perpetrator has access to all the confidential information contained within the users file. And the user more-than -likely will never know. Password Definition: A secret word that must be used to gain admission to something. DO'S DO: pick a password you will remember.
DO: change your password regularly
DO: use a mix of uppercase and lowercase characters.
DO: use punctuation marks and special characters such as #,$,%.
DO: choose a line or two from a song or poem and use the first letter of each word, perceded of followed by a digit.
DO:use a password that you can type quickly without having to look at your at your keyboard. this makes it harder for someone to notice your password if they happen to watching over your shoulder.
DO: use a password with 8 characters
DO: create different passwords for different accounts and applications. DON'T: write your password down.
DON'T: make obvious choices like your last name, pet name,nickname, birthdate, spouse name, make/model of car, or favorite expression.
DON'T: choose your username as your password.
DON'T: share your password with anyone once it is out of your control, so is your security.
DON'T: use a word contained in English of foreign language dictionaries.
DON'T: use an alphabet sequence (lmnopqrst), a number sequence (12345678) or a keyboard sequence (qwertyuop).
DON'T: use a password shorter than six (6) characters
DON'T: use a word spelled backwards.
DON'T: use a password of all digits, or all the same letters.
DON'T: use the same password for more than one system or web site. DONT'S
Full transcript