Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Internet SaFety

No description
by

Samantha Mackie

on 15 November 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet SaFety

INTERNET SAFETY We are going to present about:
Cyber-bulling,phishing and Safety on social networks. INTRODUCTION Everyone has some sort of social network and everyone uses it.
You of course would have your safety settings on to keep safe but is it really safe?
We will show how safe it is Safety on social networks Cyberbulling is the negative usage of technology to harass, embarass and threatan other people in intention to harm them. Cyberbullying involves communication in order to manipulate, put down and control the victim. Cyberbullying A destructive program that hides itself as a harmless application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Trojan Horse Billy Bowden


What Do Viruses Do?

Viruses have many purposes. Some are designed to play annoying tricks, whereas others have destructive intent. Some viruses present themselves as jokes while performing secret destructive functions. There two major types of viruses are compiled viruses, which are executed by the operating system, and interpreted viruses, which are executed by an application. Computer Viruses Social networks are not safe. Even if you have the highest possible security. There are ways through so you have to becareful of what you post. Everyone has done that thing of who has the most friends so people go adding random people to get more friends. NEVER DO THIS as you do not know who is behind the picture it may not be who they say.
Even if you have 200 mutual friends you should stillnot add them. To keep safe and to make sure you are safe there is certain informations that you do not put out onto the internet.
Do not put your:
email addresse
addresse
phone number
school
any place you go regulary
any photos should have no easy to spot land marks such as eiffel tower or the statue of liberty. On chatting sites NEVER:
give out personal information
say you will meet the person alone. Even better don't meet up.
Pictures:
When posting pictures keep in mind that everyone can see it and it can be there forever. Also make sure your pictures are ones that you would not mind if your mom saw it. Cyberbullying is delivered through text messages, emails, social networks, embarassing photos and videos.
Cyberbullying photos and messages can be posted anonomously and distributed rapidly which in most cases makes it difficult to find the source.
Deleting inapropriate messages and photos are almost impossible after they have been sent or posted Cyberbullying has a negative effect upon the victims including:
Usage of drugs and alcohol, skipping school or even dropping out, being unwilling to attend school and getting poor grades. This affects their self esteem and health majorly, and may also lead to experience of personal bullying. What to do when you experience cyberbulling?
First of all, you should NOT answer the messages sent or comment in any kind of way. By commenting, this proves to the cyberbullyer that what he has done had hurt you or got you worried in a sort of way. This is exactly what cyberbullies want, to insert fear and to control you. Don't give them the pleasure that what had been done had hurt you. Go to an adult. Keep in mind that you are not alone and that you don't deserve this, you haven't done anything wrong. Do not delete messages or photographs from the cybebully, you do not have to look at them but keep them as your evidence. If your cyberbullying problem continues, it is recommended that you delete your email account, social network profile or phone account and change it to a new one. Nearly 43% of kids have been bullied online.
90% of victims will not inform a parent or trusted adult of their abuse. when on social networks you need to make sure you have a strong password. Make it long and complicated(not too complicated that you dont remember). never tell your password to someone only to your parents Computer viruses are programs written by people that intend to harm you. These virus programs are placed into a commonly used program so that program will run the attached virus program as it boots, therefore, the virus "infects" the file or program. How do computer viruses spread?
For a computer virus to spread through a computer system, or network, it must be activated. This means that the file that contains the virus must be opened, or executed in order for the virus to come to life. After it gets activated, these viruses look for certain programs to infect. The main and the important that you must note is that, all viruses seem to do well is duplicate themselves within the programs they find, and this is the main reason as to how they spread well. Billy Bowden is considered the father of internet safety, his hard and fundemental contributions to safety is considered to the greatest ever. He won the nobel prize in technology for his pioneering work within technology. His father died of alcohloism and his mother of abuse. He won a noble prize for being awesome.
Full transcript