SlideShare una empresa de Scribd logo
1 de 37
8th Grade Presentation


                                        Marian Merritt,
                         Norton Internet Safety Advocate
When the Internet began (early 90’s)
• Information was centralized or had little user created content
  – Government information
  – University research
  – Usenet group, special interests
  – Not visual, text based
• Browsers like Mosaic made internet “visual”
• Big companies made websites, sometimes too graphic heavy,
  lots of design
• Most of world was on dial-up, slow connections
• AOL was king (sent out millions of free startup disks)
Internet Matured in early 2000’s
• Broadband became widely available
• Websites sprang up for everyone
  – Online storage, photo sharing, blogging, social networking , dating, job,
    auction and shopping sites
• Today, internet moving to mobile devices and app based
  – Even OS can be cloud based
  – Wifi widely available in public places
  – More smartphones
So what’s up next?
• Mobile and apps continue
• Cloud based storage becomes simpler
  – Your phone, camera, tablet, home network become autosynced
  – You are never “away” from the photo or document you need
  – Security like passwords become more important
  – Data permanence
    • Potential for less data loss from computer failure, stolen devices, out of date technology,
      corruption from malware
    • More risk from hackers, opportunistic and malicious efforts to view, use and copy your
      work
How You Use Technology Keeps Changing
• You’ve got to stay smart
  – Read articles about internet safety and technology
• You’ve got to keep up
  – Be open to trying new apps or programs or services
  – If you see someone with a new device ask about it
  – Visit technology sites like CNET, Wired, Mashable
• Help parents understand what’s going on
Today’s Digital Native (born in 1990’s or later)
• You have never stood to change a TV channel
• Internet has always existed
• You don’t go “online”; you are always connected
• Your definition of privacy is different from your parents
• You expect devices to just turn on, connect and work
• You are more collaborative, get help from networks, not just a web
  search or in a book
• By age 21, will have sent an average of 250,000 emails, instant
  messages and texts
• By age 21, more than 10,000 hours on your cell phone
• By age 21, more than 14,500 hours online, mostly in social networks
What Your Parents Worry About   What You Worry About (Maybe)
•Online Strangers               •Online “drama”
•Cyber bullying                 •Will my friends embarrass me?
•Internet Addictions            •Will my secret stuff get out?
•Reputation problems            •Who are my real friends?
                                •Will I be judged by my:
                                    •Facebook,
                                    •Tumblr,
                                    •YouTube stuff
The Internet Is Fun




        Multi-tasking generation: 8-18 year olds consume
        10 hours, 45 minutes of media in 7 hours, 38 min
        PER DAY!
        i.e. TV, internet, music, chatting while studying
What we all can worry about


•Who can we trust online?
•How search works for us and against us
•Online privacy, what impacts it and what you can do
•Managing your online reputation
•Where to report spam and online crime
•Viruses, Trojans and malware
•Cyberbullying
Online Literacy
• Are wiki sites true?
  – Feb. 2009 Colbert changed information about elephant’s extinction status
• Can search be manipulated?
  – Ex: one of top search results for Martin Luther King goes to a disguised
    racist site
• Are review sites ok?
  – Restaurant and hotel owners can post favorable (anonymous) reviews
• Do people lie online?
  – On dating sites, they increase height , income and use old photos
• Learn how to find accurate source material online, be wary of
  information only found online, develop critical thinking
Search - What happens?
• Logged in or not?
• Are “cookies” on or off?
• What is SEO? (or what are tags or meta-data?)
  – Search Engine Optimization (SEO) is a method used to help websites rank
    well with search engines
  – Sometimes, shady types may embed data in a webpage to trick the search
    engine, so you visit a site that has nothing to do with what you were
    looking for
  – When done to give you malware, we call it “search engine poisoning”
  – Be careful when search results you choose, use browser tools like Norton
    Safe Web
What does Privacy mean?
• Why be anonymous online:
  – Great for comments on media websites
  – Have parts of your life separate from work/home
  – Hide some activities from work/home
  – Freedom of speech and protest groups
Privacy IRL
• Others are posting, tagging about you
• Hard to have total control
  – ISPs can trace you for law enforcement
  – Your browser keeps information to make your web experience better
  – Apps retain your information and your friends’ information
• Kids better at using privacy settings than adults
• Set up automatic search on your name
• Be prepared to “clean up” before job or college
Pew study of Facebook Users and Privacy Settings
Pew Study: Teens versus Adults
Getting to Security and Privacy
Lying Online, Sharing Passwords




                                  Source: Pew Center
Everything can be more secure and more private
• Social networks
  – Visit your account security and privacy settings to learn more
• Don’t share your user name and password with others
• Logout
• Protect mobile devices with passwords
• Protect laptops and mobile devices with anti-theft software
  – Track , Wipe, Help Law Enforcement
Passwords
• Unique, complex, try a code that can be customized
  – “I Went to Spain in 2010” > Iw2Si10
  – For Amazon, add an “a” and an “n”> aiw2Si10n
  – For ESPN, add an “e” and an “n”>eiw2Si10n


• Not a dictionary word or name
• Not a phrase
• Nothing a good friend might guess (like an address, pet’s name,
  birthday, nickname)
• Most important passwords are for email and social network


• NEVER SHARE A PASSWORD! Not with a sibling, BFF, or from one
  website to another. You can tell your parent.

                                                                    19
Online Reputation and Privacy



                                20
Other Private information
• Social network posts




• More common, posting information about ourselves we later
  regret:
  – “Bored at work” – your boss won’t like it
  – Posting photos of underage drinking – school/law enforcement issues
  – “Great party last night at Kim’s house!” – someone’s feelings hurt because
    they weren’t invited
Real story of Alison Chang of Dallas, TX

                               http://www.nytimes.com/2007/10/01/technology




taken at church BBQ          Posted to up on Australian bus ad
                                  Ends
Real story of Smith family of St. Louis, MO

 They take a lovely Christmas card       That turns up as a Czech grocery
 photo                                   ad!




                     http://www.npr.org/templates/story/story.php?storyId=10531845


                                                                            23
Recognizing and Stopping Spam
What is Spam?


•Unwanted emails
•Up to 80% of world’s email is spam
•Some is dangerous:
   •links to websites with malware
   •attachments that have viruses in them
   •Phishing emails – offers that are dangerous or
   fake
Avoiding Spam and Staying Safe
• Don’t click or reply to spam
• Look at web/email address part that is “.com” or “.gov”.
  Whatever is just to the left is the website.
• i.e. onlinefamily.norton.com = a norton website
  – Norton.onlinefamily.com is not.
• If it sounds urgent or “an emergency” it probably isn’t
• Avoid posting your email address on public sites
• Just because it looks legit, or has the right logos doesn’t mean it
  is
Avoiding Viruses and Malware
⅔ OF ADULTS
GLOBALLY HAVE BEEN
VICTIMS OF CYBERCRIME
Only 1 in 10 people feel “very safe” online


                                              28
29
How Do Computers Get Infected

Dangerous downloads
Clicking on ads, links
Visiting infected websites
Buying into “security” alerts
    & scare tactics by
    unknown companies
Peer-to-peer file sharing
    networks
Through “holes” left by web
      browser vulnerabilities
                                30
Spotting Virus or Malware Infection
• Computer runs slowly or trouble starting
• Programs might not start, esp. security software
• Flickering hard drive light
• Strange programs listed in task manager
• OFTEN YOU CAN’T EVEN TELL!!!
• Best bet: run security software at all times, regularly scan the
  computer and let your parents know if something weird
  happens when you are online.
YOU, YOUR FRIENDS AND
CYBERBULLYING.


                        32
Cyberbullying is serious and mean
•Electronic harassment, teasing, cruelty,
usually repetitive
•About 20% of kids experience it
•Peaks in middle school
•Email, texts, social network messages
•Only 10% of kids report
•Many who report to school staff say it made
matters worse
•Bystanders are powerful, can reach out to
targets



                                               33
Tips for Dealing with Cyberbullying
Talk about it       Ask your friends       Don’t reply,        Bystanders Can
before              and parents for help   Keep copies         Help!
it happens




Most kids don’t cyberbully!
•Work together as a community
•If you see cyberbullying, don’t be a silent bystander. Do something!
•Talk to your classmates if they are being teased online, be a friend!
•Involve your parents, teachers and other adults.
•If there’s too much “drama”, turn it off. Get off the computer,
mobile phone and find something else to do.



                                                                                34
Review and Wrapping up
• Online Literacy – learning how to be savvy about online content
  and information
• Passwords – why they matter, how to create good ones
• Privacy and reputation – what can happen when you aren’t
  careful
• Spam – recognizing it, avoiding it
• Viruses – keep the computer clean
• Cyberbullying – make your school “drama free”
Bottom Line
• Embrace tech
  – Computers, smartphones, mobile devices and apps can make life BETTER
• Teach each other
  – Ex: Show your parents how to use privacy settings
• Homework:
  – Set passwords and don’t share them
  – Increase privacy settings
  – Make sure you have security and antitheft software
  – Be kind online, don’t tolerate cyberbullying
Thanks!

Questions?
marian@norton.com

Más contenido relacionado

La actualidad más candente

Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Internet safetypresentationghs
Internet safetypresentationghsInternet safetypresentationghs
Internet safetypresentationghsfkompar
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011Bitbuzz
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentationfkompar
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jayjstaker
 

La actualidad más candente (20)

Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet safetypresentationghs
Internet safetypresentationghsInternet safetypresentationghs
Internet safetypresentationghs
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Willow pk 2011
Willow pk 2011Willow pk 2011
Willow pk 2011
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Its Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet JayIts Not Your Parents’ Internet Jay
Its Not Your Parents’ Internet Jay
 

Destacado

Trust in the Digital World 2014 - eIdentity thread
Trust in the Digital World 2014 - eIdentity threadTrust in the Digital World 2014 - eIdentity thread
Trust in the Digital World 2014 - eIdentity threadJames Varga
 
Building trust across the digital landscape
Building trust across the digital landscapeBuilding trust across the digital landscape
Building trust across the digital landscapeJonathon Hensley
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Proporcionalidade direta
Proporcionalidade diretaProporcionalidade direta
Proporcionalidade diretaHelena Borralho
 
Escultura e pintura românica
Escultura e pintura românicaEscultura e pintura românica
Escultura e pintura românicaAna Barreiros
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 

Destacado (9)

Trust in the Digital World 2014 - eIdentity thread
Trust in the Digital World 2014 - eIdentity threadTrust in the Digital World 2014 - eIdentity thread
Trust in the Digital World 2014 - eIdentity thread
 
Building trust across the digital landscape
Building trust across the digital landscapeBuilding trust across the digital landscape
Building trust across the digital landscape
 
Pedofilia
PedofiliaPedofilia
Pedofilia
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Pedofilia
PedofiliaPedofilia
Pedofilia
 
Proporcionalidade direta
Proporcionalidade diretaProporcionalidade direta
Proporcionalidade direta
 
Escultura e pintura românica
Escultura e pintura românicaEscultura e pintura românica
Escultura e pintura românica
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 

Similar a 8th grade presentation for slideshare

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart ParentBarry Caplin
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Velma
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetejNishaTariq1
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttwNishaTariq1
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_pointAmit Pal Singh
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 

Similar a 8th grade presentation for slideshare (20)

Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart Parent
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Riverview
RiverviewRiverview
Riverview
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej7881096.pptetststdydsttshsthsstshhstetej
7881096.pptetststdydsttshsthsstshhstetej
 
7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw7881096.pptsssysgssssttstststststssstttw
7881096.pptsssysgssssttstststststssstttw
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Internet safety power_point
Internet safety power_pointInternet safety power_point
Internet safety power_point
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 

Más de Marian Merritt

Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesMarian Merritt
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceMarian Merritt
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime reportMarian Merritt
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsMarian Merritt
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kidsMarian Merritt
 

Más de Marian Merritt (9)

Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Internet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the WorkplaceInternet Security: Protect the Personal; Defend the Workplace
Internet Security: Protect the Personal; Defend the Workplace
 
2012 norton cybercrime report
2012 norton cybercrime report2012 norton cybercrime report
2012 norton cybercrime report
 
Let me in! 10 tips to better passwords
Let me in! 10 tips to better passwordsLet me in! 10 tips to better passwords
Let me in! 10 tips to better passwords
 
12 tips for cell phone safety for kids
12 tips for cell phone safety for kids12 tips for cell phone safety for kids
12 tips for cell phone safety for kids
 
School presentation
School presentationSchool presentation
School presentation
 

Último

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

8th grade presentation for slideshare

  • 1. 8th Grade Presentation Marian Merritt, Norton Internet Safety Advocate
  • 2. When the Internet began (early 90’s) • Information was centralized or had little user created content – Government information – University research – Usenet group, special interests – Not visual, text based • Browsers like Mosaic made internet “visual” • Big companies made websites, sometimes too graphic heavy, lots of design • Most of world was on dial-up, slow connections • AOL was king (sent out millions of free startup disks)
  • 3. Internet Matured in early 2000’s • Broadband became widely available • Websites sprang up for everyone – Online storage, photo sharing, blogging, social networking , dating, job, auction and shopping sites • Today, internet moving to mobile devices and app based – Even OS can be cloud based – Wifi widely available in public places – More smartphones
  • 4. So what’s up next? • Mobile and apps continue • Cloud based storage becomes simpler – Your phone, camera, tablet, home network become autosynced – You are never “away” from the photo or document you need – Security like passwords become more important – Data permanence • Potential for less data loss from computer failure, stolen devices, out of date technology, corruption from malware • More risk from hackers, opportunistic and malicious efforts to view, use and copy your work
  • 5. How You Use Technology Keeps Changing • You’ve got to stay smart – Read articles about internet safety and technology • You’ve got to keep up – Be open to trying new apps or programs or services – If you see someone with a new device ask about it – Visit technology sites like CNET, Wired, Mashable • Help parents understand what’s going on
  • 6. Today’s Digital Native (born in 1990’s or later) • You have never stood to change a TV channel • Internet has always existed • You don’t go “online”; you are always connected • Your definition of privacy is different from your parents • You expect devices to just turn on, connect and work • You are more collaborative, get help from networks, not just a web search or in a book • By age 21, will have sent an average of 250,000 emails, instant messages and texts • By age 21, more than 10,000 hours on your cell phone • By age 21, more than 14,500 hours online, mostly in social networks
  • 7. What Your Parents Worry About What You Worry About (Maybe) •Online Strangers •Online “drama” •Cyber bullying •Will my friends embarrass me? •Internet Addictions •Will my secret stuff get out? •Reputation problems •Who are my real friends? •Will I be judged by my: •Facebook, •Tumblr, •YouTube stuff
  • 8. The Internet Is Fun Multi-tasking generation: 8-18 year olds consume 10 hours, 45 minutes of media in 7 hours, 38 min PER DAY! i.e. TV, internet, music, chatting while studying
  • 9. What we all can worry about •Who can we trust online? •How search works for us and against us •Online privacy, what impacts it and what you can do •Managing your online reputation •Where to report spam and online crime •Viruses, Trojans and malware •Cyberbullying
  • 10. Online Literacy • Are wiki sites true? – Feb. 2009 Colbert changed information about elephant’s extinction status • Can search be manipulated? – Ex: one of top search results for Martin Luther King goes to a disguised racist site • Are review sites ok? – Restaurant and hotel owners can post favorable (anonymous) reviews • Do people lie online? – On dating sites, they increase height , income and use old photos • Learn how to find accurate source material online, be wary of information only found online, develop critical thinking
  • 11. Search - What happens? • Logged in or not? • Are “cookies” on or off? • What is SEO? (or what are tags or meta-data?) – Search Engine Optimization (SEO) is a method used to help websites rank well with search engines – Sometimes, shady types may embed data in a webpage to trick the search engine, so you visit a site that has nothing to do with what you were looking for – When done to give you malware, we call it “search engine poisoning” – Be careful when search results you choose, use browser tools like Norton Safe Web
  • 12. What does Privacy mean? • Why be anonymous online: – Great for comments on media websites – Have parts of your life separate from work/home – Hide some activities from work/home – Freedom of speech and protest groups
  • 13. Privacy IRL • Others are posting, tagging about you • Hard to have total control – ISPs can trace you for law enforcement – Your browser keeps information to make your web experience better – Apps retain your information and your friends’ information • Kids better at using privacy settings than adults • Set up automatic search on your name • Be prepared to “clean up” before job or college
  • 14. Pew study of Facebook Users and Privacy Settings
  • 15. Pew Study: Teens versus Adults
  • 16. Getting to Security and Privacy
  • 17. Lying Online, Sharing Passwords Source: Pew Center
  • 18. Everything can be more secure and more private • Social networks – Visit your account security and privacy settings to learn more • Don’t share your user name and password with others • Logout • Protect mobile devices with passwords • Protect laptops and mobile devices with anti-theft software – Track , Wipe, Help Law Enforcement
  • 19. Passwords • Unique, complex, try a code that can be customized – “I Went to Spain in 2010” > Iw2Si10 – For Amazon, add an “a” and an “n”> aiw2Si10n – For ESPN, add an “e” and an “n”>eiw2Si10n • Not a dictionary word or name • Not a phrase • Nothing a good friend might guess (like an address, pet’s name, birthday, nickname) • Most important passwords are for email and social network • NEVER SHARE A PASSWORD! Not with a sibling, BFF, or from one website to another. You can tell your parent. 19
  • 20. Online Reputation and Privacy 20
  • 21. Other Private information • Social network posts • More common, posting information about ourselves we later regret: – “Bored at work” – your boss won’t like it – Posting photos of underage drinking – school/law enforcement issues – “Great party last night at Kim’s house!” – someone’s feelings hurt because they weren’t invited
  • 22. Real story of Alison Chang of Dallas, TX http://www.nytimes.com/2007/10/01/technology taken at church BBQ Posted to up on Australian bus ad Ends
  • 23. Real story of Smith family of St. Louis, MO They take a lovely Christmas card That turns up as a Czech grocery photo ad! http://www.npr.org/templates/story/story.php?storyId=10531845 23
  • 25. What is Spam? •Unwanted emails •Up to 80% of world’s email is spam •Some is dangerous: •links to websites with malware •attachments that have viruses in them •Phishing emails – offers that are dangerous or fake
  • 26. Avoiding Spam and Staying Safe • Don’t click or reply to spam • Look at web/email address part that is “.com” or “.gov”. Whatever is just to the left is the website. • i.e. onlinefamily.norton.com = a norton website – Norton.onlinefamily.com is not. • If it sounds urgent or “an emergency” it probably isn’t • Avoid posting your email address on public sites • Just because it looks legit, or has the right logos doesn’t mean it is
  • 28. ⅔ OF ADULTS GLOBALLY HAVE BEEN VICTIMS OF CYBERCRIME Only 1 in 10 people feel “very safe” online 28
  • 29. 29
  • 30. How Do Computers Get Infected Dangerous downloads Clicking on ads, links Visiting infected websites Buying into “security” alerts & scare tactics by unknown companies Peer-to-peer file sharing networks Through “holes” left by web browser vulnerabilities 30
  • 31. Spotting Virus or Malware Infection • Computer runs slowly or trouble starting • Programs might not start, esp. security software • Flickering hard drive light • Strange programs listed in task manager • OFTEN YOU CAN’T EVEN TELL!!! • Best bet: run security software at all times, regularly scan the computer and let your parents know if something weird happens when you are online.
  • 32. YOU, YOUR FRIENDS AND CYBERBULLYING. 32
  • 33. Cyberbullying is serious and mean •Electronic harassment, teasing, cruelty, usually repetitive •About 20% of kids experience it •Peaks in middle school •Email, texts, social network messages •Only 10% of kids report •Many who report to school staff say it made matters worse •Bystanders are powerful, can reach out to targets 33
  • 34. Tips for Dealing with Cyberbullying Talk about it Ask your friends Don’t reply, Bystanders Can before and parents for help Keep copies Help! it happens Most kids don’t cyberbully! •Work together as a community •If you see cyberbullying, don’t be a silent bystander. Do something! •Talk to your classmates if they are being teased online, be a friend! •Involve your parents, teachers and other adults. •If there’s too much “drama”, turn it off. Get off the computer, mobile phone and find something else to do. 34
  • 35. Review and Wrapping up • Online Literacy – learning how to be savvy about online content and information • Passwords – why they matter, how to create good ones • Privacy and reputation – what can happen when you aren’t careful • Spam – recognizing it, avoiding it • Viruses – keep the computer clean • Cyberbullying – make your school “drama free”
  • 36. Bottom Line • Embrace tech – Computers, smartphones, mobile devices and apps can make life BETTER • Teach each other – Ex: Show your parents how to use privacy settings • Homework: – Set passwords and don’t share them – Increase privacy settings – Make sure you have security and antitheft software – Be kind online, don’t tolerate cyberbullying

Notas del editor

  1. From Gawker hack; 13 most common passwords used (of millions of accounts): 123456 Password 12345678 Lifehack Qwerty abc123 111111 Monkey Consumer 12345 0 Letmein Trustno1 Most common Iphone passwords: 0000, 1234, 2580 (straight shot down keypad) Most important two passwords are your email and social network? Because with email I can hit “forgotmy password” at almost any account and get the code to reset yours. With your social network I can spread a scam to all your friends and make money or spread malware. Or just embarrass you by using your account and posting silly or embarassing stuff. Sharing – lots of girls will test their friendships by saying you’re not “BFF” until you share a FB password. Or boyfriend/girlfriends will post for each other or share an account, then whenthey break up it’s a disaster.
  2. So what about the dumb stuff we do to hurt ourselves online? Those are things that can damage our online reputation and privacy.
  3. Norton did it’s own global study and found that 2/3 of adults have already been a victim. So it’s a huge problem and almost never reported. That’s why we have a disconnect (1 in 5 or 2 of 3). Cybercrime is a huge problem, driven by an underground economy of people buying and selling our private information for financial gain. Cybercrime includes: More recent data Viruses/malware 51% Online scams 10% Phishing 9% Social network hacking 7% Online credit card fraud 7% Sexual predation 7%
  4. Who is this kid? He represents the old school virus writer. Well, it used to be someone who looked a lot like this: a computer geek squirreled away in a basement somewhere spreading viruses as a prank to prove how smart he was. And his work looked like this….a virus that was more of a nuisance – maybe just a silly graphic of running across your screen. Some of you may recall the Ambulance Virus, which was popular in the late ’80’s. The good old days of computer viruses, no one lost money and it was just a big annoyance.
  5. This is where kids get into trouble. We think they are safe because we installed security software but we let our kids use the Admin account (where they can install and uninstall things on the family computer) or they don’t know not to ignore security software warnings. Also if you give a kid an iPod but not a way to get music legally, you’ve created a pirate. That brings us to peer to peer software. Some of it is legal but most isn’t and downloading free music is usually stealing. Kids who don’t know what they are doing are inviting the criminals directly into your computer. There’s nothing the software can do to stop them since by definition when you install peer to peer, you are opening a port on your computer where traffic is allowed. Crooks know this and regularly scan the networks of connected music sharing computers, looking for financial records. The Today show recently did a story on a family whose tax refund was stolen by a crook who found their tax return’s digital image (from their online filing), registered a change of address for them at the IRS and received (and cashed) the family’s refund check.
  6. Cyberbullying is such a common issue, it’s one parents need to prepare for, the way we prepare to teach our kids to drive. Even if your child is never a target or a bully, they’ll probably see it and be effected by that exposure alone. Make sure they know you get it and can be a help.
  7. The images on the right are possibly familiar to you. They are children who committed suicide due to ongoing cyberbullying and other forms of cruelty. Phoebe Prince of Massachusetts, Tyler Clementi of New Jersey, Megan Meier of Missouri. Cyberbullying is a huge problem. We need to be mostly concerned, not with the one off mean message of a kid being “a kid” but with repetition or ongoing cruelty. It can take so many different forms, it might be anonymous but your child will likely know who is involved if asked. Few kids tell their parents or a trusted adult. So while schools now have policies about cyberbullying and 43 of 50 states have laws about it, and school counselors now have an ethical obligation to address cyberbullying in their charter, many who reported it in the past to school staff say it made matters worse. Schools are not perfect when it comes to delaing with it, even though it impacts the students ability to learn, it can create a hostile environment and it can contribute to a child developing depression. We have to educate our children about being the same in person as you are online, also about the permanency of digital communication. Teach kids not to respond to cyberbullying , to keep a copy (cut and paste into word processing), tell school (especially if they know their bully and their school has a cyberbullying policy) if threats or violence is implied, immediately report it to local law enforcement. , etc. Most kids are trying to the right thing online and off but we do need more schools to teach the importance of character and appropriate behavior.
  8. Parents must be aware of cyberbullying and teach their kids to recognize and report it. Talk to your child about how you could work together if it happened. If it does, make sure you don’t respond to the bully. Keep a copy of any on screen message, no matter how embarassing. And if you are a bystander (meaning you were sent a link to a mean website, copied on an email, etc) make sure you reach out to the victim/target to express friendship, sympathy, offer a diversion together (like ‘let’s get together after school and work on math’) If the bullying is serious enough, get police involved. If it’s impacting the school environment, (child is afraid to go to school, feels like everyone is laughing at them, etc) then report to the school, the teacher or principal, counselor or resource officer. But parents need to drive process, leave a paper trail, review the school policy, ask for an action plan in writing. Stay on top of things and demand a respones. (from Allison Trachthill) theAmerican School Counselor Association has updated its ethical standards. Now, confronting cyberbullying is an ethical obligation for school counselors. Section A.10.e of the Ethical Standards for School Counselors states that school counselors should, "Consider the extent to which cyberbullying is interfering with students’ educational process and base guidance curriculum and intervention programming for this pervasive and potentially dangerous problem on research-based and best practices."