SlideShare una empresa de Scribd logo
1 de 21
A Quick Online Safety Guide
         Grades 3-5
Why?
         The Internet represents
     s
         –   Great Opportunities
         –   Greater Responsibilities
         –   Greatest Chances for Dangerous Situations
         19% of teens feel safer online than in the real world*
     s
         39% of students trust people that they chat with
     s
         online*
         24% of students say they see nothing with chatting
     s
         with a stranger*
         10% of students have been asked to keep their
     s
         Internet relationship a secret*

*iSAFE America Student Assessment, 2004
Access
        Children between 8-18 use the
      s
        computer for more than an hour a day
      s 74% have a computer with Internet
        access*
      s 31% have high speed access (that
        number grows each year)*



*The George Lucas Foundation, “Synching Up With The iKid”, Edutopia, October 2005.
Types of People Who
       Use the Internet
  Responsible and Ethical
s
s Numbuts
s Hotheads
s Follow-You-Fionas
s Oogles
s Spamazoids
Responsible and
          Ethical
    They know the
s
    difference between
    right and wrong
    Wary of others
s
    Never shares
s
    personal information
    Has a good
s
    password
    Has a life beyond
s
    the computer
Numbuts
              Doesn’t have any
          s
              friends
              Stays in their room
          s
              all day
              Lacks social skills
          s
              Talks in code
          s
Hotheads
        They have a temper
    s
        They can lose
    s
        control of their
        temperature
        They say mean
    s
        things




Photo courtesy of Netsmartzkids.org
Follow-You-Fionas
                                          People who want to
                                      s
                                          be more than online
                                          friends
                                          Try to get personal
                                      s
                                          information
                                          May not be who
                                      s
                                          they say they are
                                          Trying to meet you
                                      s
                                          in person


Photo courtesy of Netsmartzkids.org
Oogles
                                          Trying to collect your
                                      s
                                          personal information
                                          Want to sell that
                                      s
                                          information to others
                                          Follow you around the
                                      s
                                          Internet
                                          They are sneaky may
                                      s
                                          want to give you “free”
                                          stuff




Photo courtesy of Netsmartzkids.org
Spamazoids
        They send out annoying
    s
        message that clog email
        accounts
        You didn’t ask for these
    s
        messages
        May contain things that do
    s
        bad things to your computer
        Watch out for phishing
    s
        (looking for personal
        information through email,
        usually updating accounts
        that you may or may not
        have with legit companies)
Photo courtesy of Netsmartzkids.org
Your Personal
          Information
    Phone Number, Address, Age, Name, Parents’
s
    Name, School, Grade, Work Information,
    Passwords, Usernames, etc.
    Once you give it away you can never take it
s
    back completely
    The only people you should trust with it are
s
    your parents (not even your best friend)
    Avoid putting personal pictures of yourself
s
    and friends online
Usernames and
       Profiles
  Make them unique and generic
s
s Only provide the required information
s Resist the temptation to revel personal
  information through usernames and
  profiles
Passwords
  Your key to safety
s
s Make it strong
    – Use a mix of capital and lower case letters,
      numbers, and special characters
    – Make it at least 8 characters long
    – Don’t use words or names
    Change it on a regular basis
s
Online Friends
  Let them be just that
s
s Don’t meet people you only know from
  being online with them
s You have no idea who the person is on
  the other computer
s Online only friends are still strangers
Cyber-bullying
         More likely to occur online than in person
     s
         (42% of students have been bullied)
         Follows you around easier than in person
     s
         Avoid situations by
     s
         –   Being kind to others
         –   Don’t use ALL CAPS
         –   Don’t send messages when you are angry
         Let adults know when it happens (58% of
     s
         students have not told an adult when they’ve
         been bullied online)

*iSAFE America Student Assessment, 2004
Don’t be afraid to talk
  Your parents care
s
s Involve them with your “online” life
s Let them know if you run into things
  that make you feel scared and
  comfortable
s Always get permission first
Putting up your guards
  Free Stuff
s
s Attachments
s Online Protection
“Free Stuff”
  Nothing is free on the Internet
s
s Your personal information is usually at
  risk
s Could be hidden costs that follow you
  for a long time
Attachments
    Added parts to the email
s
    May be legit stuff
s
    Could be a way for others to affect your
s
    computer with a virus or spyware
    Can be tricky and use people that you know
s
    (check in with them before you open
    attachments)
    Never open .exe attachments
s
    Watch out for links as well
s
Online Protection
    Get yourself Anti-Virus software
s
    –   AVG (free for home use)
    –   ClamAV (free for home use)
    –   Norton’s, McAfee ($)
    Get Adware and Spyware protection too
s
    –   Microsoft Defender
    –   Lavasoft
    –   Spybot
    Check with your ISP to see if they offer any
s
    online protection
    Update your software regularly and have it
s
    set to scan automatically
A Quick Online Safety Presentation

Más contenido relacionado

La actualidad más candente

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Cyberbullying
CyberbullyingCyberbullying
CyberbullyingMarc Kuhn
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 

La actualidad más candente (20)

Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
What is Cyberbullying?
What is Cyberbullying?What is Cyberbullying?
What is Cyberbullying?
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Internet safety
Internet safety Internet safety
Internet safety
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 

Similar a A Quick Online Safety Presentation

The World Wide Web
The World Wide WebThe World Wide Web
The World Wide WebTony L
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social mediaChas Stephens
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangersrangashree
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 

Similar a A Quick Online Safety Presentation (20)

The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social media
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
E-safety leaflet
E-safety leaflet E-safety leaflet
E-safety leaflet
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

A Quick Online Safety Presentation

  • 1. A Quick Online Safety Guide Grades 3-5
  • 2. Why? The Internet represents s – Great Opportunities – Greater Responsibilities – Greatest Chances for Dangerous Situations 19% of teens feel safer online than in the real world* s 39% of students trust people that they chat with s online* 24% of students say they see nothing with chatting s with a stranger* 10% of students have been asked to keep their s Internet relationship a secret* *iSAFE America Student Assessment, 2004
  • 3. Access Children between 8-18 use the s computer for more than an hour a day s 74% have a computer with Internet access* s 31% have high speed access (that number grows each year)* *The George Lucas Foundation, “Synching Up With The iKid”, Edutopia, October 2005.
  • 4. Types of People Who Use the Internet Responsible and Ethical s s Numbuts s Hotheads s Follow-You-Fionas s Oogles s Spamazoids
  • 5. Responsible and Ethical They know the s difference between right and wrong Wary of others s Never shares s personal information Has a good s password Has a life beyond s the computer
  • 6. Numbuts Doesn’t have any s friends Stays in their room s all day Lacks social skills s Talks in code s
  • 7. Hotheads They have a temper s They can lose s control of their temperature They say mean s things Photo courtesy of Netsmartzkids.org
  • 8. Follow-You-Fionas People who want to s be more than online friends Try to get personal s information May not be who s they say they are Trying to meet you s in person Photo courtesy of Netsmartzkids.org
  • 9. Oogles Trying to collect your s personal information Want to sell that s information to others Follow you around the s Internet They are sneaky may s want to give you “free” stuff Photo courtesy of Netsmartzkids.org
  • 10. Spamazoids They send out annoying s message that clog email accounts You didn’t ask for these s messages May contain things that do s bad things to your computer Watch out for phishing s (looking for personal information through email, usually updating accounts that you may or may not have with legit companies) Photo courtesy of Netsmartzkids.org
  • 11. Your Personal Information Phone Number, Address, Age, Name, Parents’ s Name, School, Grade, Work Information, Passwords, Usernames, etc. Once you give it away you can never take it s back completely The only people you should trust with it are s your parents (not even your best friend) Avoid putting personal pictures of yourself s and friends online
  • 12. Usernames and Profiles Make them unique and generic s s Only provide the required information s Resist the temptation to revel personal information through usernames and profiles
  • 13. Passwords Your key to safety s s Make it strong – Use a mix of capital and lower case letters, numbers, and special characters – Make it at least 8 characters long – Don’t use words or names Change it on a regular basis s
  • 14. Online Friends Let them be just that s s Don’t meet people you only know from being online with them s You have no idea who the person is on the other computer s Online only friends are still strangers
  • 15. Cyber-bullying More likely to occur online than in person s (42% of students have been bullied) Follows you around easier than in person s Avoid situations by s – Being kind to others – Don’t use ALL CAPS – Don’t send messages when you are angry Let adults know when it happens (58% of s students have not told an adult when they’ve been bullied online) *iSAFE America Student Assessment, 2004
  • 16. Don’t be afraid to talk Your parents care s s Involve them with your “online” life s Let them know if you run into things that make you feel scared and comfortable s Always get permission first
  • 17. Putting up your guards Free Stuff s s Attachments s Online Protection
  • 18. “Free Stuff” Nothing is free on the Internet s s Your personal information is usually at risk s Could be hidden costs that follow you for a long time
  • 19. Attachments Added parts to the email s May be legit stuff s Could be a way for others to affect your s computer with a virus or spyware Can be tricky and use people that you know s (check in with them before you open attachments) Never open .exe attachments s Watch out for links as well s
  • 20. Online Protection Get yourself Anti-Virus software s – AVG (free for home use) – ClamAV (free for home use) – Norton’s, McAfee ($) Get Adware and Spyware protection too s – Microsoft Defender – Lavasoft – Spybot Check with your ISP to see if they offer any s online protection Update your software regularly and have it s set to scan automatically