Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Cyber Safety

No description

de lightfoot

on 15 December 2017

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Cyber Safety

Identity Theft
What is it?
when someone uses your private info
and pretends they are you to get money
or buy stuff for themselves.
they steal money out of bank accounts,
purchase goods on credit cards, and may even borrow money from a bank by
pretending to be you.
Why should I care?
I have nothing to steal??
Teens are targets for identity theft
because they have no credit history.
A thief uses your name and gets credit
cards and bank loans...history begins.
A credit history.
Not just their bad credit...but yours too.
How do I know my identity
has been stolen?
Not being able to get a driver's
license is a clear signal.
So is getting pre-approved
credit cards in the mail
when you don't have a bank
What info do identity
thieves want?
Your full name, address, DOB
social security number or driver's
license. Passwords & credit card numbers
and cell phone numbers.
How do identity thieves
get my info?
They find info online or offline.
Offline...they steal mail to get your
bank account number or call and
pretend to be from your bank.
Online...they use phishing. You or your family receive an
email that looks like its from your bank. It will tell you someone is trying to get info about you. They will tell you that the bank needs you to verify your info. They then give you a link to a phony site that will ask you to verify your private info.
Another kind of scam is called pharming. You might accidentally download a bit of malicious code that directs IE to phony websites.

Also using P2P(peer to peer) file sharing software... Limewire...you may be putting private identity information at risk.
What about online shopping?
it's convenvient and everyone does it ...here are some good tips to follow:

1. type address in browser ... don't follow a link
2. never heard of the seller? look for number & call to
check if it is a real business
3. read store's privacy policy...make sure they will handle
your info with care.
4. make sure the info page is secure. will have https:// in
your browser.
Internet/Cyber Safety
Phillip Albert, now 20, has faced other consequences. When he was 17, his 16-year-old girlfriend sent him naked pictures. A month after he turned 18, he and his girlfriend got into a fight and after getting a nasty phone message from her in the middle of the night, he opened up the message with her photo and pressed the “little select all button” followed by the send button.

Phillip Albert was put on sex offender registry for sending a nude picture.
posing for, taking, distributing, or forwarding nude pictures by cell phone or computer.
What is it?
As a result, the girl’s picture was sent to over 70 people including “friends, teachers, parents, and grandparents.” Phillip was arrested for distribution of child pornography, put on five years probation, and required to register on the public sex offender list. He was kicked out of college, can’t find a job, and can’t live with his father because his dad lives too close to a high school. As a registered sex offender, Phillip isn’t allowed to live near a school, playground, or a church. Unless his lawyer is successful in getting to court to take him off the list, he could remain on the registered sex offender list until he’s in his 40s.
In a recent study, 1 in 10 youth said they shared a naked image of themselves. “4 percent of cell-owning teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images or videos of themselves to someone else via text messaging.” “15 percent say they have received such images of someone they know via text message.”
It's illegal: Don't take or send nude or sexually suggestive photos of yourself or anyone else. If you do, even if they're of you or you pass along someone else's - you could be charged with producing or distributing child pornography. If you keep them on your phone or computer you could be charged with possession. If they go to someone in another state (and that happens really easily), it's a federal felony.
Not just on phones. Sexting can be done on any media-sharing device or technology - including email and the Web. Teens have been convicted for child porn distribution for emailing sexually explicit photos to each other.
Why? Many causes. In some cases, kids are responding to peer pressure in a form of cyberbullying or pressure from a boyfriend or girlfriend (they break up, and sometimes those photos get sent around out of revenge). Sometimes it's impulsive behavior, flirting, or even blackmail. It's always a bad idea.
If a sexting photo arrives on your phone, first, do not send it to anyone else (that could be considered distribution of child pornography). Second: Talk to a parent or trusted adult. Tell them the full story so they know how to support you. And don't freak out if that adult decides to talk with the parents of others involved - that could be the best way to keep all of you from getting into serious trouble.
How do I protect myself
from Sexting?
If the picture is from a friend or someone you know, then someone needs to talk to that friend so he or she knows sexting is against the law. You're actually doing the friend a big favor because of the serious trouble that can happen if the police get involved.
Always delete photos and messages right away. Do not keep them on your phone or computer.

There is always a record of sent texts and emails.
Are you a cyberbully?
"Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones. It has to have a minor on both sides, or at least have been instigated by a minor against another minor.
What's the law on Cyberbullying?
If the communication is only a flame (name calling/heckling), you may not be able to do much about it. (Sometimes ISPs will consider this a term of service violation.) But the closer it comes to real life threats the more likely you have to get law enforcement involved.
The more repeated the communications are, the greater the threats (or enlarging this to include third-parties) and the more dangerous the methods, the more likely law enforcement or legal process needs to be used. If personal contact information is being shared online, this must be treated very seriously.

Law enforcement will treat each bullying case according to state law outlined by state penal code.
Victims of cyberbullying are twice as likely to attempt suicide
Cyberbullying has led to at least 4 cases of suicide in the United States and many more abroad. Suicide related to cyberbullying is called “cyberbullycide”
Your Online Image
Deciding how to present yourself online is complicated. For one thing, you cannot always know who your audience is.
Social networking sites may feel as private as hanging out with your friends. In reality, they are vast public spaces where privacy settings may or may not provide the kind of privacy you expected.
The content you post on profiles and blogs
sticks around the Internet forever...even after
you decide to take it down.
Do you know that…
The information, photos, and videos you post about yourself can be found easily by searching, sometimes even if you thought you
marked them private.
The content you create photos, drawings, videos, writings, can be copied by anyone and used for any purpose without your permission.
Even if you use privacy controls offered by social networking sites, there are always invisible audiences, that is, audiences you didn’t intend to see your stuff. Sometimes you might not care, but other times you might.
You apply for a job at Old Navy ... The job requires you to fill out an application and give at least one reference.

You complete the application in perfect handwriting and give your favorite high school teacher as your reference.

Hands down...you feel you'll get the job...easy
What if the hiring manager
decides to do a little checking
on her own? The manager searches
your name on facebook.

What might she find?
Employers want to know if applicants are honest and reliable.

Does the applicant engage in any illegal activity?

Underage drinking, theft, foul language, questionable photos?
It may not matter to you now,
but what about the future?

Getting into college?
Dating as you get older?
Getting an interview for that
3 figure job you always wanted?
Both girls & guys think about how to make themselves more attractive to potential partners. This is why it is natural for flirting and sexual talk to go on in high schools.
It can become offensive sometimes, but most kids can handle it because the students are all about the same age, maturity and experience level.
What about online?
You might think it's just having fun to test out your power to be sexy online. You might also think about talking about sex to online acquantainces and posting sexy photos of yourself for strangers to see.

This is very risky!!
Let's see what you know...
Most Internet child molesters
look for young children and preteens.
True or False
Most online child molesters are
not looking for children below the age
of puberty. They are looking for relationships
with teenage boys & girls.
Internet child molesters are often violent
and abduct their victims.
While this could happen, it is actually extremely
rare. People who resort to violence often do so because
they cannot relate well to other people.
Adults who express feelings of love
for the teens they meet online want
sex, not romance.
Most online child molesters patiently develop
romantic relationships and trust with their victims
before moving the relationships offline for sex. The
process may involve expressions of understanding
about the teen's problems, sending gifts or money
and offering job opportunities.
Predators don't tell teens they are
interested in sex until they get them
into a face-to-face meeting.
Actually, most teens who decide to
meet face to face know that the encounter
will include sex. So if teens are willing partners,
what's the problem?

The problem is that sex between and adult and
a teen below the age of consent (usually 16) is
a crime.
Teens who post sexy photos online
are more likely to receive sexual invitations
from strangers.
If you post sexually provocative photos
of yourself online, you are probably going to get more
contacts from strangers. And, some of those contacts
may be aggressive and scary. Some will be from adults
and some will be from other teens.
Cyber Safety
Consider your invisible audience
when you post or chat online.

There is no guarantee of honesty
There is no guarantee of privacy.

Monitor what others are posting about you in comments, photos, videos, and blogs.
Never post, text, email or forward sexually suggestive pictures of yourself or someone else.

If you recieve an image...delete it immediately.

Never torment, threaten or harass another student using the internet, cell phone, interactive technology or any other means.

Do not be tolerant of others that do.

Don't be afraid to do the right thing!
Full transcript