SlideShare una empresa de Scribd logo
1 de 15
Graham Holmes Internet Safety for Middle School Students Cisco Systems, Inc. has compiled  this third party information solely for ease of the reader’s reference. Cisco  Systems, Inc. is not responsible for and makes no representation regarding the  accuracy, viability or timeliness of this information. Cisco Systems, Inc.  does not guarantee that adhering to or implementing the processes described  will assure the safety of children, computer system(s), personal  information/data or network(s). Recommendations regarding products or  processes contained in these materials are solely those of the identified  content owner.
A few terms first Malware Spam Botnets Vulnerability Social Networking
Zombies Are Used to Make Money  Medicine Gambling Porn Fraud
Zombie Masters ,[object Object],[object Object],[object Object],[object Object],[object Object]
How to help a Zombie Master ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
One of the Zombie Masters ,[object Object],[object Object],[object Object],[object Object],[object Object]
What’s at risk?
Protect Personal Info “ Choc4cat” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Beware of Strange things ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Practice Safe Behavior Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],*Reverse Google address lookup
Practice Safe Behavior Online ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Practice Safe Behavior Online  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Practice Safe Behavior Online  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who Can You Trust? ,[object Object],[object Object]
 

Más contenido relacionado

La actualidad más candente

Internet Safety
Internet SafetyInternet Safety
Internet SafetyTsenn13
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammerguest80ad5c
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayMolly Immendorf
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetydpl
 
Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009Susan Lyon-Hintze
 
Int Safety
Int SafetyInt Safety
Int SafetyMrsMac9
 
Teens Presentation
Teens PresentationTeens Presentation
Teens Presentationsharon7111
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Guide to internet safety
Guide to internet safetyGuide to internet safety
Guide to internet safetyindycolt18pm
 

La actualidad más candente (19)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Heads up!
Heads up!Heads up!
Heads up!
 
Slick The Spammer
Slick The SpammerSlick The Spammer
Slick The Spammer
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesday
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009
 
Int Safety
Int SafetyInt Safety
Int Safety
 
Cyber saftey
Cyber safteyCyber saftey
Cyber saftey
 
Teens Presentation
Teens PresentationTeens Presentation
Teens Presentation
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Guide to internet safety
Guide to internet safetyGuide to internet safety
Guide to internet safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Similar a Internet safety for middles school

Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: Imlegan31
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Finalguest5000f0a
 

Similar a Internet safety for middles school (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety: I
Internet Safety: IInternet Safety: I
Internet Safety: I
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Online Safety
Online Safety Online Safety
Online Safety
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Internet Safety Final
Internet Safety FinalInternet Safety Final
Internet Safety Final
 

Más de esksaints

Emperor penguin
Emperor penguinEmperor penguin
Emperor penguinesksaints
 
Parent tech coffee
Parent tech coffeeParent tech coffee
Parent tech coffeeesksaints
 
Tetc 2010 preso
Tetc 2010 presoTetc 2010 preso
Tetc 2010 presoesksaints
 
Tect presentation classroom_based_technology_v2010-12-1
Tect presentation classroom_based_technology_v2010-12-1Tect presentation classroom_based_technology_v2010-12-1
Tect presentation classroom_based_technology_v2010-12-1esksaints
 
Tyler penguins
Tyler penguinsTyler penguins
Tyler penguinsesksaints
 

Más de esksaints (6)

Tais 2013
Tais 2013Tais 2013
Tais 2013
 
Emperor penguin
Emperor penguinEmperor penguin
Emperor penguin
 
Parent tech coffee
Parent tech coffeeParent tech coffee
Parent tech coffee
 
Tetc 2010 preso
Tetc 2010 presoTetc 2010 preso
Tetc 2010 preso
 
Tect presentation classroom_based_technology_v2010-12-1
Tect presentation classroom_based_technology_v2010-12-1Tect presentation classroom_based_technology_v2010-12-1
Tect presentation classroom_based_technology_v2010-12-1
 
Tyler penguins
Tyler penguinsTyler penguins
Tyler penguins
 

Internet safety for middles school

  • 1. Graham Holmes Internet Safety for Middle School Students Cisco Systems, Inc. has compiled this third party information solely for ease of the reader’s reference. Cisco Systems, Inc. is not responsible for and makes no representation regarding the accuracy, viability or timeliness of this information. Cisco Systems, Inc. does not guarantee that adhering to or implementing the processes described will assure the safety of children, computer system(s), personal information/data or network(s). Recommendations regarding products or processes contained in these materials are solely those of the identified content owner.
  • 2. A few terms first Malware Spam Botnets Vulnerability Social Networking
  • 3. Zombies Are Used to Make Money Medicine Gambling Porn Fraud
  • 4.
  • 5.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.  

Notas del editor

  1. *Explain reverse addressing using google