Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Internet Safety

No description
by

Justin Perkins

on 1 September 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet Safety

Obstacle 2:
Viruses

Obstacle 4:
Grooming

Obstacle 5:
Cyber Bullying

Goal
Obstacle 1:
Cyber Citizenship

Internet Safety
Rules, Etiquette, & Lessons to Keep You Safe and Responsible Online
Obstacle 3:
Copyright Laws

Definition - Responsible cyber social behavior
What people do online when no one is watching

Cyber Citizenship

Where are these places?
Email where you send electronic messages to people.
Social Networks like Facebook & Twitter.
People can feel invisible and capable of doing things they normally wouldn't do in person or in public...things that might be wrong or hurtful.
Online Identity - a social identity that an Internet user establishes in online communities.
NEVER give out your passwords to ANYONE (unless a parent/guardian requests it).
NEVER open emails from anyone you are unfamiliar with.
DO conduct yourself online as you should in person...with respect.
DO represent yourself in an appropriate manner in everything you do in cyber space.
Do's & Don'ts
Virus - a small piece of software that piggybacks on real programs.
Example - a virus might attach itself to a program such as word processing. Each time you run that program, the virus runs too...and has a chance to spread and wreak havoc!
Identifying Information

Your name
Home address
Phone number
School
Pictures
Who should you give this information to?
Types of Viruses
Email Viruses
Trojan Horses
Worms
Malicious Code/
Malware
Travel as an attachment to email messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's address book.
Email Viruses
Simply a computer program. The program claims to do one thing, but instead does damage when you run it. They do not replicate automatically.
Small pieces of software that uses computer networks and security holes to replicate itself.
What is a copyright?
Why are they important and why should you care?
What is plagiarism?
What can be a copyright? Literary work, music, dramas, choreography, pictures, movies/tv shows, sound recordings and architecture.
Copyright Terms
Copyright - a form of protection given to the authors or creators of “original works of authorship,” including literary, dramatic, musical, artistic and other intellectual works.
What that means is that, as the author of the work, you alone have the right to do any of the following or to let others do any of the following:
make copies of your work;
distribute copies of your work;
perform your work publicly
display your work publicly
make “derivative works”
Let’s talk about Facebook Friends
What is Grooming?
This is the process predators use to manipulate minors into inappropriate relationships or into meeting them in public. It often includes the giving of compliments or gifts.
Internet Predator -
An adult internet user who searches for vulnerable and naive children or teens, usually for inappropriate or other abusive purposes.
The ultimate goal of a groomer...is to arrange an in-person meeting that can lead to danger.
Prey on child or teen's desire for romance and adventure
Develop trust and secrecy; manipulate kids by listening to and sympathizing with their problems and insecurities
Affirms feelings and choices of the child
Exploit curiosities of the child
Predators will...
Flatter and compliment the child excessively, send gifts, and invests time, money, and energy to groom the child
Develop an online relationship that is romantic, controlling...making you dependent on them
Drive a wedge between you and your parents or friends
Makes promises of an exciting, stress-free life
Makes threats to blackmail it's victims
If someone asks for personal information online, ignore the request and tell a parent/guardian or teacher.
Don’t talk to strangers online.
General Safety Rules
Never meet someone in person you meet online.
Online predators lie about their age, interests, and other things just to gain a child’s trust.
What is Cyber Bullying?
The use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
Gossip
Exclusion
Impersonation
Harassment
Cyber Stalking
Flaming
Types of Cyber Bullying
My Experience with
Cyber Bullying...
Posting or sending cruel gossip to damage a person’s reputation and relationships with friends, family, and acquaintances.
Gossip
Deliberately excluding someone from an online group.
Exclusion
Breaking into someone’s e-mail or other online account and sending messages that will cause embarrassment or damage to the person’s reputation and affect his or her relationship with others.
Impersonation
Repeatedly posting or sending offensive, rude, and insulting messages.
Harassment
Posting or sending unwanted or intimidating messages, which may include threats
Cyber Stalking
Online fights where scornful and offensive messages are posted on websites, forums, or blogs.
Flaming
If you are cyber bullied...ignore the ignorant comments and tell a teacher, parent, or guardian
You are above negative comments.
Do not ignore cyber bullying if you witness it. Stand up against it!
Are you ready for the Internet Safety Exam???
Malware, or malicious code, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Full transcript