SlideShare una empresa de Scribd logo
1 de 17
For the Internet Naïve… Internet Safety
Potential Pitfall #1 	Accessing sites with inappropriate materials
You viewed what? 	The internet is full of easy to access information of all types… … and the bad. the good…
You viewed what? 	Only search using trusted search engines and make sure that a link scanner is installed to identify harmful links.  Learn how to use the AVG Link Scanner. 	View this internet safety lesson.
Potential Pitfall #2 	Safety and privacy issues for students
You told who what? Rule Number 1: Nothing online is private Never give out personal information online Never post personal pictures you want to keep private. Never say anything online that you don’t want to be made public
Potential Pitfall #3 	Fraud on the Internet
You gave you password to who? If it sounds too good to be true, then it probably is Only purchase things from a trusted source with proper site security 	Read more frominternetsafetyrules.org
Potential Pitfall #4 	Computer virus and hacking
You opened what? Always keep your antivirus software up-to-date Never open an e-mail attachment or hyperlink unless you are expecting it Only download programs from trusted sites, such as download.com
Potential Pitfall #5 	Copyright and plagiarism issues
You got this information from where? It is illegal to copy and use anything online unless you have permission from the copyright holder View copyrightkids.org for more information
You got this information from where? Plagiarism reaches all levels.  Read this recent news article about Germany’s defense minister. View this slide show for more information on plagiarism.
You got this information from where? 	To find images that you can freely use, visit either commons.wikimedia.org or flickr.com
References Roblyer, M. D., & Doering, A. H. (2009). Integrating educational technology into teaching (5th ed.). Allyn & Bacon.  
Image References Links Privacy Icon: http://commons.wikimedia.org/wiki/File:Privacy_caution.svg Embarrassing Face: http://commons.wikimedia.org/wiki/File:Caught_in_street_photography_small.png Jet Powered Outhouse: http://commons.wikimedia.org/wiki/File:Jet_Powered_Outhouse.jpg HTTP Image: http://commons.wikimedia.org/wiki/File:HTTP.png Password: http://commons.wikimedia.org/wiki/File:Crystal_password.png Virus: http://commons.wikimedia.org/wiki/File:Cartoonvirus.jpg Copyright Question mark: http://commons.wikimedia.org/wiki/File:Questionmark_copyright.svg Copyright Problem: http://commons.wikimedia.org/wiki/File:Copyright-problem.svg
Image References Links Commons Logo: http://en.wikipedia.org/wiki/File:Commons-logo-en.svg Flickr Logo: http://commons.wikimedia.org/wiki/File:Flickr_wordmark.svg

Más contenido relacionado

La actualidad más candente

Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
mjtheman
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
Quek Lilian
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Online privacy
Online privacyOnline privacy
Online privacy
jo-jo23
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
Lawrence Fine
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
Ty122987
 

La actualidad más candente (17)

Internet safety
Internet safetyInternet safety
Internet safety
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & SanjayLkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Dangers of social media
Dangers of social mediaDangers of social media
Dangers of social media
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Online privacy
Online privacyOnline privacy
Online privacy
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
SECURITY AWARENESS
SECURITY AWARENESSSECURITY AWARENESS
SECURITY AWARENESS
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 

Destacado (9)

5c Digital Citizenship
5c Digital Citizenship5c Digital Citizenship
5c Digital Citizenship
 
Mobile Safety Solutions Compliance Management Suite System Overview
Mobile Safety Solutions Compliance Management Suite   System OverviewMobile Safety Solutions Compliance Management Suite   System Overview
Mobile Safety Solutions Compliance Management Suite System Overview
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Protecting Yourself
Protecting  YourselfProtecting  Yourself
Protecting Yourself
 
Printek Mobile Public Safety - Why Mobile Printing?
Printek Mobile Public Safety - Why Mobile Printing?Printek Mobile Public Safety - Why Mobile Printing?
Printek Mobile Public Safety - Why Mobile Printing?
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar a Internet Safety

cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
sheenau
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 

Similar a Internet Safety (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
HECCTW11
HECCTW11HECCTW11
HECCTW11
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Lesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptxLesson 2.2 Online Safety And Security.pptx
Lesson 2.2 Online Safety And Security.pptx
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Users guide
Users guideUsers guide
Users guide
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
cyberbullying presentation by class 4 student
cyberbullying presentation by class 4 studentcyberbullying presentation by class 4 student
cyberbullying presentation by class 4 student
 
Cybersecurity Basics.pptx
Cybersecurity Basics.pptxCybersecurity Basics.pptx
Cybersecurity Basics.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Internet Safety

  • 1. For the Internet Naïve… Internet Safety
  • 2. Potential Pitfall #1 Accessing sites with inappropriate materials
  • 3. You viewed what? The internet is full of easy to access information of all types… … and the bad. the good…
  • 4. You viewed what? Only search using trusted search engines and make sure that a link scanner is installed to identify harmful links. Learn how to use the AVG Link Scanner. View this internet safety lesson.
  • 5. Potential Pitfall #2 Safety and privacy issues for students
  • 6. You told who what? Rule Number 1: Nothing online is private Never give out personal information online Never post personal pictures you want to keep private. Never say anything online that you don’t want to be made public
  • 7. Potential Pitfall #3 Fraud on the Internet
  • 8. You gave you password to who? If it sounds too good to be true, then it probably is Only purchase things from a trusted source with proper site security Read more frominternetsafetyrules.org
  • 9. Potential Pitfall #4 Computer virus and hacking
  • 10. You opened what? Always keep your antivirus software up-to-date Never open an e-mail attachment or hyperlink unless you are expecting it Only download programs from trusted sites, such as download.com
  • 11. Potential Pitfall #5 Copyright and plagiarism issues
  • 12. You got this information from where? It is illegal to copy and use anything online unless you have permission from the copyright holder View copyrightkids.org for more information
  • 13. You got this information from where? Plagiarism reaches all levels. Read this recent news article about Germany’s defense minister. View this slide show for more information on plagiarism.
  • 14. You got this information from where? To find images that you can freely use, visit either commons.wikimedia.org or flickr.com
  • 15. References Roblyer, M. D., & Doering, A. H. (2009). Integrating educational technology into teaching (5th ed.). Allyn & Bacon.  
  • 16. Image References Links Privacy Icon: http://commons.wikimedia.org/wiki/File:Privacy_caution.svg Embarrassing Face: http://commons.wikimedia.org/wiki/File:Caught_in_street_photography_small.png Jet Powered Outhouse: http://commons.wikimedia.org/wiki/File:Jet_Powered_Outhouse.jpg HTTP Image: http://commons.wikimedia.org/wiki/File:HTTP.png Password: http://commons.wikimedia.org/wiki/File:Crystal_password.png Virus: http://commons.wikimedia.org/wiki/File:Cartoonvirus.jpg Copyright Question mark: http://commons.wikimedia.org/wiki/File:Questionmark_copyright.svg Copyright Problem: http://commons.wikimedia.org/wiki/File:Copyright-problem.svg
  • 17. Image References Links Commons Logo: http://en.wikipedia.org/wiki/File:Commons-logo-en.svg Flickr Logo: http://commons.wikimedia.org/wiki/File:Flickr_wordmark.svg