SlideShare a Scribd company logo
1 of 81
Internet Safety
    Mr Eric Castro
Tell a neighbor: What do you remember
  from your grammar school internet
           safety presentations?
Create a Positive Digital Footprint

       Protect Your Privacy

Protect Yourself from Identity Theft

   Protect Yourself from Bullies

 Protect Yourself from Predators

  Protect Yourself from Yourself
Create a Positive
Digital Footprint


                    1
Tell a neighbor: What are you most
proud of having produced or created
             that’s online?
Our digital footprint
is the evidence of our
online activities.
You want to
  leave positive
digital footprints.



          Lost by Stephen Nicholas
The New Yorker,
  3/22/2010
Protect Your Privacy


                       2
1) Do not inadvertently reveal
 personal information online
Block cookies
2) Keep a “clean” email
       account
3) Realize that you may be
        monitored
4) Do not reply to spammers,
            ever
5) Be conscious of web
       security
Passwords
Use a different secure passphrase for
              each site
• Passphrases are more secure than passwords

• Passphrases are easier to remember than passwords

• Use as many different characters as possible

• Do not use personal information
Come up with a short sentence that is easy to
                remember




           Add one extra variable
Come up with a short sentence that is easy to
                remember

        Puss in Boots was a bad movie


           Add one extra variable

            Puss in Boots sux0rs
            Hated Puss in Boots!
           Refund 4 Puss in Boots?
Encryption
http://




https://
6) Be conscious of security on
      shared computers
7) Be conscious of home
   computer security
Protect Yourself from
    Identity Theft


                        3
Raise your hand: Has anyone that you
  know had their identity stolen?
IS FROM OUR       TECHNICAL
T HIS MESSAGE
SU  PPORT TEAM
                              tomatically by t he computer.
This me    ssage is sent au
                            is message it m eans that your
If you  are receiving th                        ctivation; this
            dress has been     queued for dea
 email ad                                     script (code:
          a result of a co   ntinuous error
 was as                                    ess. Click here
        receiving from     this email addr
 505)                                        lve this problem
         l out the requir    ed field to reso
  and fil                                   y ignoring this
  Not  e: Failure to res  et your email b
                             wrong informa   tion will result
  messa   ge or inputting
                     tivation of this email address
   to instant deac
To
   o   M
        uc
          hC
            re d
                   it b
                       yA
                         nd
                           re
                             sR
                                  ue
                                       da
It’s not about
     cash ...




       To
          o   M
               uc

                                                   it’s about
                 hC
                   re d
                          it b
                              yA
                                nd

                                                      debt
                                  re
                                    sR
                                         ue
                                              da
• Destroy private records and statements

• Secure your snail mail

• Safeguard your Social Security number

• Don’t leave a paper trail

• Monitor your credit report

• Review credit card statements carefully
Protect Yourself from
       Bullies


                        4
First ...
First ...




Change Begins Here by Trista Emlet
What exactly is
cyberbullying?
• IM/ Text             • Interactive gaming
  harassment
                       • Malicious code
• Stealing passwords
                       • Sending porn or
• Blogs                  junk email

• Web sites            • Impersonation

• Sending pictures     • Cyberbullying by
  through email &        proxy
  cell phones

• Internet polling
Why cyberbully?
What to do
• Don’t bully

• Don’t reciprocate

• Save evidence

• Tell a trusted adult
King on the march to Montgomery by Eliel Johnson
“In the end, we will remember not the words of
  our enemies, but the silence of our friends.”
                               King on the march to Montgomery by Eliel Johnson
Protect Yourself from
     Predators


                        5
http://i.imgur.com/cbRmA.jpg
Emotionally vulnerable

   Seeking attention


   Seeking affection

   Seeking validation
Chatroulette
Protect Yourself from
      Yourself


                        6
Tell a neighbor: What is the least
intelligent thing that you’ve seen
     someone else put online?
http://failbook.failblog.org
http://failbook.failblog.org
http://failbook.failblog.org
e to his alleg ed attacker
Rocque pos    ted a messag
saying th  ey are 'done'.
                        ages can escal ate quickly.
Police   say such mess
                             the Internet  and they are
 "If a  young  person is on                 g in nature,
                ments that a  re threatenin
 mak   ing com                 e cou ld be    looking at
    ey need     to realize w               ation because
 th
              harges, unwa  rranted retali
  criminal c                    well as ha  mpering an
      their   comments as                      Sgt. Kelly
  of
               olice investig  ation," said
  ongoing p
         au, school res ource officer.
   Rosn
What to do?
• Remain alert

• Keep a low profile

• Trust your instincts
Control your information
Control your information
Be smart

More Related Content

Similar to Internet safety slides

Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Maintaining safety of data and personal information in [autosaved]
Maintaining safety of data and personal information in [autosaved]Maintaining safety of data and personal information in [autosaved]
Maintaining safety of data and personal information in [autosaved]tjwatt
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Computer Security
Computer SecurityComputer Security
Computer Securitytonik
 
Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Teddy Njoroge
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoTDirk Zittersteyn
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdfjessa451416
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security MotivationSuman Thapaliya
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity theftsweblinkindia1
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 

Similar to Internet safety slides (20)

Bose Essay
Bose EssayBose Essay
Bose Essay
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Maintaining safety of data and personal information in [autosaved]
Maintaining safety of data and personal information in [autosaved]Maintaining safety of data and personal information in [autosaved]
Maintaining safety of data and personal information in [autosaved]
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age. Protecting your devices and organization in this Cyber Age.
Protecting your devices and organization in this Cyber Age.
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoT
 
online safety, security and netiquette.pdf
online safety, security and netiquette.pdfonline safety, security and netiquette.pdf
online safety, security and netiquette.pdf
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity thefts
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 

More from Eric Castro

Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Eric Castro
 
21st century Parenting: A brave new world
21st century Parenting: A brave new world21st century Parenting: A brave new world
21st century Parenting: A brave new worldEric Castro
 
Building and Sustaining a PLN
Building and Sustaining a PLNBuilding and Sustaining a PLN
Building and Sustaining a PLNEric Castro
 
What's after going 1:1?
What's after going 1:1?What's after going 1:1?
What's after going 1:1?Eric Castro
 
Transformative Uses of the iPad
Transformative Uses of the iPadTransformative Uses of the iPad
Transformative Uses of the iPadEric Castro
 
Google apps introduction
Google apps introductionGoogle apps introduction
Google apps introductionEric Castro
 
Draw something 2012
Draw something 2012Draw something 2012
Draw something 2012Eric Castro
 
U16 social psych 2011
U16 social psych 2011U16 social psych 2011
U16 social psych 2011Eric Castro
 
Fall Final review
Fall Final reviewFall Final review
Fall Final reviewEric Castro
 
M31 intelligence slides
M31 intelligence slidesM31 intelligence slides
M31 intelligence slidesEric Castro
 
M30 language slides
M30 language slidesM30 language slides
M30 language slidesEric Castro
 
M29 thinking slides
M29 thinking slidesM29 thinking slides
M29 thinking slidesEric Castro
 
U08 memory slides
U08 memory slidesU08 memory slides
U08 memory slidesEric Castro
 
U07 learning slides 2011
U07 learning slides 2011U07 learning slides 2011
U07 learning slides 2011Eric Castro
 
U05 Sensation slides 2011
U05 Sensation slides 2011U05 Sensation slides 2011
U05 Sensation slides 2011Eric Castro
 
Ch 25 industrialization slides
Ch 25 industrialization slidesCh 25 industrialization slides
Ch 25 industrialization slidesEric Castro
 

More from Eric Castro (20)

Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023Neuroscience slides, Fall 2023
Neuroscience slides, Fall 2023
 
21st century Parenting: A brave new world
21st century Parenting: A brave new world21st century Parenting: A brave new world
21st century Parenting: A brave new world
 
Building and Sustaining a PLN
Building and Sustaining a PLNBuilding and Sustaining a PLN
Building and Sustaining a PLN
 
What's after going 1:1?
What's after going 1:1?What's after going 1:1?
What's after going 1:1?
 
Transformative Uses of the iPad
Transformative Uses of the iPadTransformative Uses of the iPad
Transformative Uses of the iPad
 
1600 iPads
1600 iPads1600 iPads
1600 iPads
 
Google apps introduction
Google apps introductionGoogle apps introduction
Google apps introduction
 
Draw something 2012
Draw something 2012Draw something 2012
Draw something 2012
 
U16 social psych 2011
U16 social psych 2011U16 social psych 2011
U16 social psych 2011
 
Fall Final review
Fall Final reviewFall Final review
Fall Final review
 
M31 intelligence slides
M31 intelligence slidesM31 intelligence slides
M31 intelligence slides
 
M30 language slides
M30 language slidesM30 language slides
M30 language slides
 
M29 thinking slides
M29 thinking slidesM29 thinking slides
M29 thinking slides
 
U08 memory slides
U08 memory slidesU08 memory slides
U08 memory slides
 
U07 learning slides 2011
U07 learning slides 2011U07 learning slides 2011
U07 learning slides 2011
 
M18 slides
M18 slidesM18 slides
M18 slides
 
m19 Hypnosis
m19 Hypnosism19 Hypnosis
m19 Hypnosis
 
M20 drugs
M20 drugsM20 drugs
M20 drugs
 
U05 Sensation slides 2011
U05 Sensation slides 2011U05 Sensation slides 2011
U05 Sensation slides 2011
 
Ch 25 industrialization slides
Ch 25 industrialization slidesCh 25 industrialization slides
Ch 25 industrialization slides
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Internet safety slides

Editor's Notes

  1. \n
  2. \n
  3. 6 things\n
  4. \n
  5. In an interview with the Harvard admissions committee, what could you show them online?\n
  6. Think of every web service you use, or are associated with.\nWhat is there?\nPictures? Video? Poetry? Stories? Reflections on life?\n
  7. \n
  8. For college and for jobs\n
  9. but given this need to be online today: BE CAREFUL\n
  10. 82% of 16—18 year-olds use FB daily\n
  11. There is NO privacy on the internet.\nWhat’s there is there forever\n
  12. NEVER your Social Security number\nBeware that cookies store information and share it automatically w/ websites you visit\n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. All email on campus is currently stored on a computer by the Learning Center, and could be pulled up if necessary\n
  19. \n
  20. \n
  21. \n
  22. \n
  23. and don’t SHARE passwords \ndon’t USE passWORDS\n
  24. \n
  25. \n
  26. \n
  27. Look how easy that is to remember?\ncapital letter, three special characters: spaces and ?\nOne word not even in a dictionary\n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. Bernal Heights Library\n
  34. \n
  35. Do NOT have your computer save passwords\n
  36. \n
  37. 70% of current computer users worldwide have been hacked or phished\n
  38. More likely to be hit by lightning, or affected by a computer security problem?\n70% of computer users have been hacked, phished, or the victim of a virus — compared to 0.000102% chance of being struck by lightning?\nSomeone on campus was phished in mid-October\n
  39. \n
  40. \n
  41. \n
  42. Most materials for identity theft are stolen from trash cans\n
  43. \n
  44. How do you protect yourself?\n
  45. FIRST: Don’t be a bully — Most bullies were victims\nLet’s talk about what bullying is before going further\n
  46. \n
  47. do not SHARE passwords either\n
  48. Anger, revenge, frustration\nEntertainment; bored, laughs, to get a reaction, \nBolster or remind ppl of their social standing \nSometimes by accident\n
  49. \n
  50. \n
  51. STICK UP FOR EACH OTHER — don’t tolerate bad behavior\n
  52. \n
  53. \n
  54. Not much harm that a predator can do to you like this\nit’s when you meet IRL …\nIt’s not all men ...\n
  55. who are predators looking for?\n
  56. Predators and trolls like to hang out in certain places\nIf you avoid those places, you reduce your exposure to bad guys\n
  57. \n
  58. Stick to Stumbleupon or Reddit\n
  59. \n
  60. In an interview with the Harvard admissions committee, what could you show them online?\n
  61. \n
  62. “Her offense: Posting on Facebook a photograph of herself posing with a human placenta in class.”\n
  63. \n
  64. Sent racist and violent (KKK-style) tweets to best player on opposing soccer team\n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n
  70. Scheduled for same day as Omaha, NB teen shot principal & assistant principal\n
  71. \n
  72. \n
  73. \n
  74. \n
  75. \n
  76. \n
  77. \n
  78. \n