SlideShare una empresa de Scribd logo
1 de 30
ahmedm@ictp.edu.eg
272010
Think before you post!
facebook
Block (Windows Live Messenger(Ignore (Yahoo!
Messenger(
108.
108
University.
Internet in English?!
El net bel franco-arab?!!
Most of Internet is in English!
Keeping a balance
Playing games online and using consoles or games on a
computer is great fun, but you to need to be careful about
how much you play and who you play with. Too much gaming
can affect your school or social life. It is important that if you
chat with other gamers, you protect your privacy and don’t
share personal or private information.
Keeping a balance - Tips
If another player is behaving badly or making you
uncomfortable, block them from your players list. You may
also be able to report them to the game site operator.
Limit your game play time so you can still do other things
like homework, jobs around the house and other activities.
Keep personal details private.
Respect others in the game and only say to them what you’d
want said to you—we were all n00bs once.
Remember to make time offline for your friends, your
favorite sports and other activities.
Check classifications and game reviews to see if they are
right for you.
P2P file sharing
Peer-to-peer (P2P) services can be a great
way to share music, software and movies,
but if the owner of that media does not want
them to be shared, you could be breaching
copyright laws, and liable for a large fine.
Also, many files available from file-sharing
sites are deliberately mislabeled, so you
could end up getting more than you
bargained for, like viruses, Trojans or
offensive and illegal material.
P2P file sharing - Tips
Check that the content is legally available. Some
content is licensed to be available for free, but
much of what is available on P2P networks is not.
Try the legal file-sharing/download sites—you’ll
get better quality files this way, even if they aren’t
free.
Check your settings. You may be sharing
everything on your hard drive, including personal
files!
Be worry. Many files on P2P networks are infected
with viruses or are mislabeled, and they can
contain offensive or illegal material.
Offensive or Illegal Content
When you’re surfing the web you may come across
websites and other material that is offensive,
obscene or illegal. There are some easy ways to
handle these situations.
Offensive or Illegal Content -
Tips
Report the content to a trusted adult. Try your mum,
dad or an older brother or sister. Use the report
button on this site to report this content or contact
the Kids Helpline on 1800 55 1800.
Know how to ‘escape’ from a website if an internet
search takes you to an unpleasant, offensive,
obscene or illegal website. Hit control-alt-delete if the
site will not allow you to exit.
Surf on. If a website looks suspicious or has a
warning page for people under 18 years, leave
immediately.
Set your search engine to block ‘offensive’ or adult
material.
Online Financial Stuff
Online shops are increasingly popular as they provide an easy,
fun and convenient way to buy the things you want or need.
To avoid any issues when you're shopping online, aim to use
the websites of well-established, recognized retailers. These
sites rely on people feeling safe, so they manage their site to
ensure that transactions are secure.
Auction sites, like eBay, are also popular. To keep safe, use a
reputable auction site and read the privacy policy to make sure
you are comfortable with how the business works. Also check
that you can make a complaint or cancel an order. If you need a
hand going through the details, ask a trusted adult. Many
parents enjoy using these sites too.
Online Financial Stuff - Tips
Check out the site before you buy. It’s important to know
who you’re buying from, the site’s security features, their
privacy policy and their returns or refund procedure. Safe
shopping or auction sites use strong encryption and show
the padlock symbol in the browser during the transaction
process. It’s important to check the URL as well to make
sure you’re not shopping at a fake site.
Know the cost. Reading the terms and conditions so that
you know delivery options, charges and warranty conditions
is important. Also check for any additional costs to cover
postage and handling. Most reputable sites will provide a
clear indication of the total cost before the final payment
stage.
Understand the service. Some products involve ongoing
contracts rather than a one-off payment, so check the terms and
conditions and know if you are signing up for just a one-off or
ongoing service. Find out how to stop the service and, in some
cases, how much it costs to break the contract if you do decide
to stop.
Know when it’s coming. Some sellers save money by sending
goods the cheapest and slowest way possible. If you’re
purchasing a product from overseas, that can mean months of
waiting.
Know what you’re getting. Auction sites usually let you contact
the seller directly, so if you have any doubts about an item, ask
questions. It’s better to find out the details early on rather than
when you’ve already bought it. It’s also a good idea to check out
reviews of the item and check its details, since you can’t see or
hold the item before you buy it.
Identity Theft
Identity theft is when your personal information is used
without your knowledge or permission. This can take a variety
of forms, and, in the worst case, it can involve criminals using
your information to steal money from you or to open bank
accounts or credit cards in your name. While this may not
seem a problem if you don’t yet have a credit card, it might
damage your chances of getting one when you’re older.
Personal information can be accessed from your computer or
at a public computer terminal. With sufficient information,
criminals can make credit card purchases, apply for loans or
transfer money directly from your bank, while pretending to be
you.
Identity Theft
Criminals use many methods to gather personal information,
including sending viruses and spam, and setting up fake
websites. You can also have your identity ‘stolen’ if someone
uses your personal information to impersonate you online.
They might pretend to be you on MSN, make a fake profile of
you or hack into your actual profile!
Identity Theft - Tips
Watch your blog/profile. If your profile has been hacked shut it
down ASAP.
Use secure websites for online shopping and banking. Make sure
the website is secure. More secure website addresses start with
‘https’ rather than the less secure ‘http’. Alternatively, a padlock
image should appear in the browser.
Protect passwords. Passwords should be eight or more
characters in length. Change them regularly and don’t write them
down or store them where they are openly available. Never share
your passwords, even with your friends—it could be misused to
access your MSN, email or profile.
Identity Theft - Tips
It’s not just your passwords. Don’t post personally identifiable
information online. Each little bit of information can be put together
by identity thieves to build a total picture and steal your identity.
Set profiles to private and don’t blog or tweet personal information.
Watch your bank account. Respond immediately to any unexpected
withdrawals or spending. Look out for small amounts of money
being withdrawn unexpectedly. This may be a criminal testing your
account details prior to withdrawing a larger amount.
Don’t get phished. Don’t respond to calls or emails from any bank
asking for passwords or other details. Banks never send emails
asking you to click through to their site—if the email asks you to
click on a link, chances are it’s a scam. If you receive a call from
someone saying they’re from the bank, hang up and call back at
the publicly listed number to see if it’s real.
My Mobile
Mobile phones are great for keeping in touch—you can call or
text your family and friends, surf the net, take and send photos,
record sound and track where you are.
While you can do all sorts of things with your mobile, there are
some risks and points you should keep in mind.
My Mobile - Tips
Only give out your mobile number to people you know and trust.
Respect your friends’ privacy by not giving away their details
without permission.
Keep your personal information private. Don’t share personal
details like your name, address or school with people you don’t
already know in real life.
If you plan to send private information to anyone using your mobile
phone, talk to a trusted adult before you send. Being cautious is
the best plan.
Think before you send. The person who you send information,
pictures or videos to may not be the only one who will see them—
so if you don’t want them to go public, don’t send them.
When you’re looking to buy a phone, check details of service
plans or contracts, the type of phone and what it offers. Buy the
one that suits your needs and use—and won’t cost the earth.
Don’t accept offers that sound too good to be true. They probably
are, and it could lead to really high bills. Check with your parents
before accepting any offers.
If your phone is lost or is stolen, notify your network carrier and
the police immediately. Tell them your IMEI number (generally found
inside the battery compartment of your phone or by pressing *#06#)
and any other identifying features of the phone. Your carrier can
use this number to block your phone from all networks in Australia
once you report the phone lost or stolen, making it useless to any
thief. Importantly, this also ensures you’re not paying for any calls
made by the thief. Visit www.amta.org.au for more information.
If you use Bluetooth, change the settings so that the phone is not
‘discoverable’. This means that it can’t be found or discovered by
other Bluetooth-enabled devices searching for another one.
Keeping your phone undiscoverable is a good protection against
potential attack.
Don't respond.
Save the message and the date, time and number of
the can.
Let a trusted adult know, like your parents or
brother/sister.
My Mobile – Tips for Dealing with
Unwanted SMS and Voice Messages
‫صصصصص‬ ‫صصصصصص‬ ‫صصصصصصصصصص‬ ‫صصصصصص‬
‫صصصصصصصصص‬
www.smwipm.cyberpeaceinitiative.org
www.ictp.org.eg

Más contenido relacionado

La actualidad más candente

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineDizeo
 
The Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedThe Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedJakub Kałużny
 
Social engineers
Social engineersSocial engineers
Social engineerssimsvir
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safelysam31
 
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsAre You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsScamchargeback
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineKristi Valentini
 
Internet safety
Internet safetyInternet safety
Internet safetyjld1018
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 

La actualidad más candente (20)

Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Test
TestTest
Test
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
The Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting HackedThe Hacker's Guide to NOT Getting Hacked
The Hacker's Guide to NOT Getting Hacked
 
Social engineers
Social engineersSocial engineers
Social engineers
 
Maintaining Online Privacy
Maintaining Online PrivacyMaintaining Online Privacy
Maintaining Online Privacy
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online safety
Online safetyOnline safety
Online safety
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Phishing
PhishingPhishing
Phishing
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
How to Use the Internet Safely
How to Use the Internet SafelyHow to Use the Internet Safely
How to Use the Internet Safely
 
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive StepsAre You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
Are You Vulnerable to Credit Card Fraud? Follow These 6 Preventive Steps
 
Identity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazineIdentity Theft article_Good Neighbor magazine
Identity Theft article_Good Neighbor magazine
 
Internet safety
Internet safetyInternet safety
Internet safety
 
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
WISE KIDS Leaflet: Smart Phones, Social Networks, Messenger, Chat and Locatio...
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 

Similar a Keeping Safe Online

Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxTCPSM
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 
Internet Crime Prevention Tips
Internet Crime Prevention TipsInternet Crime Prevention Tips
Internet Crime Prevention TipsGoose & Gander
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 

Similar a Keeping Safe Online (20)

Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Slideshare
SlideshareSlideshare
Slideshare
 
Cyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptxCyber crime alert - Copy.pptx
Cyber crime alert - Copy.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Internet Crime Prevention Tips
Internet Crime Prevention TipsInternet Crime Prevention Tips
Internet Crime Prevention Tips
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 

Último

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Último (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 

Keeping Safe Online

  • 3.
  • 5.
  • 6. Block (Windows Live Messenger(Ignore (Yahoo! Messenger( 108.
  • 7.
  • 8. 108
  • 9.
  • 11. Internet in English?! El net bel franco-arab?!! Most of Internet is in English!
  • 12. Keeping a balance Playing games online and using consoles or games on a computer is great fun, but you to need to be careful about how much you play and who you play with. Too much gaming can affect your school or social life. It is important that if you chat with other gamers, you protect your privacy and don’t share personal or private information.
  • 13. Keeping a balance - Tips If another player is behaving badly or making you uncomfortable, block them from your players list. You may also be able to report them to the game site operator. Limit your game play time so you can still do other things like homework, jobs around the house and other activities. Keep personal details private. Respect others in the game and only say to them what you’d want said to you—we were all n00bs once. Remember to make time offline for your friends, your favorite sports and other activities. Check classifications and game reviews to see if they are right for you.
  • 14. P2P file sharing Peer-to-peer (P2P) services can be a great way to share music, software and movies, but if the owner of that media does not want them to be shared, you could be breaching copyright laws, and liable for a large fine. Also, many files available from file-sharing sites are deliberately mislabeled, so you could end up getting more than you bargained for, like viruses, Trojans or offensive and illegal material.
  • 15. P2P file sharing - Tips Check that the content is legally available. Some content is licensed to be available for free, but much of what is available on P2P networks is not. Try the legal file-sharing/download sites—you’ll get better quality files this way, even if they aren’t free. Check your settings. You may be sharing everything on your hard drive, including personal files! Be worry. Many files on P2P networks are infected with viruses or are mislabeled, and they can contain offensive or illegal material.
  • 16. Offensive or Illegal Content When you’re surfing the web you may come across websites and other material that is offensive, obscene or illegal. There are some easy ways to handle these situations.
  • 17. Offensive or Illegal Content - Tips Report the content to a trusted adult. Try your mum, dad or an older brother or sister. Use the report button on this site to report this content or contact the Kids Helpline on 1800 55 1800. Know how to ‘escape’ from a website if an internet search takes you to an unpleasant, offensive, obscene or illegal website. Hit control-alt-delete if the site will not allow you to exit. Surf on. If a website looks suspicious or has a warning page for people under 18 years, leave immediately. Set your search engine to block ‘offensive’ or adult material.
  • 18. Online Financial Stuff Online shops are increasingly popular as they provide an easy, fun and convenient way to buy the things you want or need. To avoid any issues when you're shopping online, aim to use the websites of well-established, recognized retailers. These sites rely on people feeling safe, so they manage their site to ensure that transactions are secure. Auction sites, like eBay, are also popular. To keep safe, use a reputable auction site and read the privacy policy to make sure you are comfortable with how the business works. Also check that you can make a complaint or cancel an order. If you need a hand going through the details, ask a trusted adult. Many parents enjoy using these sites too.
  • 19. Online Financial Stuff - Tips Check out the site before you buy. It’s important to know who you’re buying from, the site’s security features, their privacy policy and their returns or refund procedure. Safe shopping or auction sites use strong encryption and show the padlock symbol in the browser during the transaction process. It’s important to check the URL as well to make sure you’re not shopping at a fake site. Know the cost. Reading the terms and conditions so that you know delivery options, charges and warranty conditions is important. Also check for any additional costs to cover postage and handling. Most reputable sites will provide a clear indication of the total cost before the final payment stage.
  • 20. Understand the service. Some products involve ongoing contracts rather than a one-off payment, so check the terms and conditions and know if you are signing up for just a one-off or ongoing service. Find out how to stop the service and, in some cases, how much it costs to break the contract if you do decide to stop. Know when it’s coming. Some sellers save money by sending goods the cheapest and slowest way possible. If you’re purchasing a product from overseas, that can mean months of waiting. Know what you’re getting. Auction sites usually let you contact the seller directly, so if you have any doubts about an item, ask questions. It’s better to find out the details early on rather than when you’ve already bought it. It’s also a good idea to check out reviews of the item and check its details, since you can’t see or hold the item before you buy it.
  • 21. Identity Theft Identity theft is when your personal information is used without your knowledge or permission. This can take a variety of forms, and, in the worst case, it can involve criminals using your information to steal money from you or to open bank accounts or credit cards in your name. While this may not seem a problem if you don’t yet have a credit card, it might damage your chances of getting one when you’re older. Personal information can be accessed from your computer or at a public computer terminal. With sufficient information, criminals can make credit card purchases, apply for loans or transfer money directly from your bank, while pretending to be you.
  • 22. Identity Theft Criminals use many methods to gather personal information, including sending viruses and spam, and setting up fake websites. You can also have your identity ‘stolen’ if someone uses your personal information to impersonate you online. They might pretend to be you on MSN, make a fake profile of you or hack into your actual profile!
  • 23. Identity Theft - Tips Watch your blog/profile. If your profile has been hacked shut it down ASAP. Use secure websites for online shopping and banking. Make sure the website is secure. More secure website addresses start with ‘https’ rather than the less secure ‘http’. Alternatively, a padlock image should appear in the browser. Protect passwords. Passwords should be eight or more characters in length. Change them regularly and don’t write them down or store them where they are openly available. Never share your passwords, even with your friends—it could be misused to access your MSN, email or profile.
  • 24. Identity Theft - Tips It’s not just your passwords. Don’t post personally identifiable information online. Each little bit of information can be put together by identity thieves to build a total picture and steal your identity. Set profiles to private and don’t blog or tweet personal information. Watch your bank account. Respond immediately to any unexpected withdrawals or spending. Look out for small amounts of money being withdrawn unexpectedly. This may be a criminal testing your account details prior to withdrawing a larger amount. Don’t get phished. Don’t respond to calls or emails from any bank asking for passwords or other details. Banks never send emails asking you to click through to their site—if the email asks you to click on a link, chances are it’s a scam. If you receive a call from someone saying they’re from the bank, hang up and call back at the publicly listed number to see if it’s real.
  • 25. My Mobile Mobile phones are great for keeping in touch—you can call or text your family and friends, surf the net, take and send photos, record sound and track where you are. While you can do all sorts of things with your mobile, there are some risks and points you should keep in mind.
  • 26. My Mobile - Tips Only give out your mobile number to people you know and trust. Respect your friends’ privacy by not giving away their details without permission. Keep your personal information private. Don’t share personal details like your name, address or school with people you don’t already know in real life. If you plan to send private information to anyone using your mobile phone, talk to a trusted adult before you send. Being cautious is the best plan. Think before you send. The person who you send information, pictures or videos to may not be the only one who will see them— so if you don’t want them to go public, don’t send them. When you’re looking to buy a phone, check details of service plans or contracts, the type of phone and what it offers. Buy the one that suits your needs and use—and won’t cost the earth.
  • 27. Don’t accept offers that sound too good to be true. They probably are, and it could lead to really high bills. Check with your parents before accepting any offers. If your phone is lost or is stolen, notify your network carrier and the police immediately. Tell them your IMEI number (generally found inside the battery compartment of your phone or by pressing *#06#) and any other identifying features of the phone. Your carrier can use this number to block your phone from all networks in Australia once you report the phone lost or stolen, making it useless to any thief. Importantly, this also ensures you’re not paying for any calls made by the thief. Visit www.amta.org.au for more information. If you use Bluetooth, change the settings so that the phone is not ‘discoverable’. This means that it can’t be found or discovered by other Bluetooth-enabled devices searching for another one. Keeping your phone undiscoverable is a good protection against potential attack.
  • 28. Don't respond. Save the message and the date, time and number of the can. Let a trusted adult know, like your parents or brother/sister. My Mobile – Tips for Dealing with Unwanted SMS and Voice Messages
  • 29. ‫صصصصص‬ ‫صصصصصص‬ ‫صصصصصصصصصص‬ ‫صصصصصص‬ ‫صصصصصصصصص‬ www.smwipm.cyberpeaceinitiative.org