SlideShare una empresa de Scribd logo
1 de 23
How To Keep Safe On The Internet!

Ben Langley
Donatas Vysniauskas
Alex Clark
Melisa Aslan
Coming Up…
• Take appropriate precautions to ensure own
safety and privacy
• Protect personal information online
• Carry out checks on other’s identity
• Forms and features of cyber bullying.
Precautions to ensure
safety and privacy

Ben Langley
Safety and privacy the risks on the
internet
• Cyber bullying
• Scammers
• Hackers
• Fake websites
• Malware

• phishing
Ensuring Your Own Safety on the internet
•

Content Filtering: restricting the type of content which can be viewed.

•

Proxy Servers: using systems to hid your true location.

•

Monitoring and Reporting User Behaviour: keeping an eye on the behaviour of
other users and reporting anything inappropriate.

•

Withholding Personal Information: keeping the amount of information that can be
viewed online to a minimum.

•

Using Non-trivial Usernames and Passwords: avoiding the use of easily-guessed or
easily cracked passwords.
Always be cautious when using the Internet
• Always be cautious about any information you give when using the
Internet eg: if you join a chat room use a suitable nickname and never
give any personal information out such as where you live.
• Use throwaway e-mail addresses, eg: Gmail addresses that you can
simply discard if anyone starts harassing you in any way.
• Always assume that any information and pictures you put on the
Internet can be viewed by the entire world.
Always be cautious when using the Internet
• Beware of giving information about yourself out. The more information
you put on the internet the more there is for someone to put together
about you.
• Always be suspicious of what you are being offered on the Internet, eg:
gifts, prizes and money. There are many dangers. eg: hackers or
Scammers.
• Fake websites
Important to have a strong password
A password is an important element of Internet defence. It is a secret code, known
only to you, that will allow you to access certain resources. You should never tell
anyone your password.
•

It is important to have a strong password that other people cannot easily guess.

•

Try not to use details that could be guessed by people who know you

•

Use a combination of letters, numbers and symbols

•

Never tell your friends or family your password

•

Never email your password to anyone

•

Keep your username and passwords safe
Protect personal information
online

Donatas Vysniauskas
How to protect your personal
information online?
• Never give out identifying information such as,
name, address, school name or telephone
numbers in a public message such as a chat
room - Facebook. This is because they can use
that information against you or share it on
internet widely. Also, this could result in a
scam because someone could use your
information to find out your bank details.
Donatas Vysniauskas
How to make sure your personal
information stays safe?
• Learn how to use the site properly. Use the
privacy features to restrict strangers’ access to
your profile. Be guarded about who you let
join your network (Keep your profile closed
and allow only your friends to view
your profile).

Donatas Vysniauskas
Strong passwords
• The use of strong passwords is therefore
essential in order to protect your security
and identity.
• Make sure your passwords are long and
hard to guess. This will help your social
networking to stay private and
invulnerable to other people.
Donatas Vysniauskas
What is Phishing?
• Phishing is an act of attempting to acquire
information such as usernames, passwords and
credit card details.
• To prevent phishing don’t click on a malicious link or
open a malicious attachment, in which case your
financial information and passwords may then be
stolen.

Donatas Vysniauskas
Carry Out Checks On Other’s
Online Identity!

Alex Clark
Why Is It Important To Check Other’s
Identity?
• It is important to know who the people on the
internet because they may be fake identity’s.
• Also, they may find your information and details
on credit/debit card’s, but they may also be
sexual predators.
• You will have to be very careful when using social
networking, because you may not know the
people or they may be adults pretending to be
children, and you may meet up with them some
time.
Ways To Check Other’s Identity!
Profile Picture
• If you do not know who the person is that is
adding you as a friend on social networks, you
should first go on there profile and see there
pictures.
Mutual Friends
• If you do not know the person that is trying to
add you on social networks, you can always
look at there mutual friends. Then you can see
what friends he has got that you have also
got.
Webcam
• If you do not know the person that is adding
you on social networks, you can always add
them on Skype to see what they look like.
Some people say that they don’t want to do
webcam. They might be someone, that their
not.
Forms and Features
of Cyber Bullying.

Melisa Aslan
What is Cyber Bullying?
Cyber bullying is when a child or teen is
getting threatened, harassed, humiliated or
embarrassed by another child or teen using
the Internet, digital technologies or mobile
phones.

Melisa Aslan
Forms of Cyber Bullying
Cyber stalking: Repeatedly sending messages that include
threats of harm or are highly intimidating that might make a
person afraid for his or her safety.

Outing and Trickery: Sharing someone's secrets or
embarrassing information, or tricking someone into revealing
secrets or embarrassing information and forwarding it to others.

Melisa Aslan
Forms of Cyber Bullying
Impersonation: Breaking into an email or social networking
account and using that person's online identity to send or post
embarrassing material to/about others.

Cyber Stalking: Repeatedly sending messages that include
threats of harm or are highly intimidating, or engaging in other
online activities that make a person afraid for his or her safety.

Melisa Aslan
Features of Cyber Bullying
Cyber bullying can be used to carry out various different types of
bullying, including racist bullying or bullying related to
disabilities. Instead of carrying out bullying in person, cyber
bullies make use of technology, particularly the Internet and
mobile phones to bully others.

Melisa Aslan

Más contenido relacionado

La actualidad más candente

Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipPantegoChristian
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Floreslorrflores
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010Nancy Gross
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update14071828
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summaryicts-uct
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For EducatorsMaria Petropulos
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 

La actualidad más candente (19)

Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Internet safety presentation sv
Internet safety presentation svInternet safety presentation sv
Internet safety presentation sv
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety update
Internet safety updateInternet safety update
Internet safety update
 
Cyber Safety Month summary
 Cyber Safety Month summary Cyber Safety Month summary
Cyber Safety Month summary
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 

Destacado

Blogging for business
Blogging for businessBlogging for business
Blogging for businessDelia Rusu
 
Elevator pitch Reed Connelly
Elevator pitch Reed ConnellyElevator pitch Reed Connelly
Elevator pitch Reed Connellyrconnelly32
 
common online terminologies
   common online terminologies   common online terminologies
common online terminologiesiyanasayana
 
Hermosa Beach Community Dialogue: Phase II - Finance Subgroup
Hermosa Beach Community Dialogue: Phase II - Finance SubgroupHermosa Beach Community Dialogue: Phase II - Finance Subgroup
Hermosa Beach Community Dialogue: Phase II - Finance SubgroupStopHermosaBeachOil
 
Baxter's - Transition Pack Instructions
Baxter's - Transition Pack InstructionsBaxter's - Transition Pack Instructions
Baxter's - Transition Pack Instructionsbaxtersdelivers
 
Valentine day with Google, Seems another update is underway –Google Update
Valentine day with Google, Seems another update is underway –Google UpdateValentine day with Google, Seems another update is underway –Google Update
Valentine day with Google, Seems another update is underway –Google Updaterahulchoudhary88
 
Presidents in Alpha Industries
Presidents in Alpha IndustriesPresidents in Alpha Industries
Presidents in Alpha IndustriesJulia Pozdnyakova
 
Repechage records,Karate1 Premier League - Okinawa 2014
Repechage records,Karate1 Premier League - Okinawa 2014Repechage records,Karate1 Premier League - Okinawa 2014
Repechage records,Karate1 Premier League - Okinawa 2014Miguel Nacarino Karateyalgomas
 
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIRE&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIRStopHermosaBeachOil
 
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable Electronic Fu...
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable  Electronic Fu...Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable  Electronic Fu...
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable Electronic Fu...PSI Conversion
 
www.bookajourney.com
www.bookajourney.com www.bookajourney.com
www.bookajourney.com Kishore Verma
 
E marketing EyeRecommend Conference, Edmonton Alberta 2014
E marketing   EyeRecommend Conference, Edmonton Alberta 2014E marketing   EyeRecommend Conference, Edmonton Alberta 2014
E marketing EyeRecommend Conference, Edmonton Alberta 2014Alan Glazier
 
05 zittartz presentation_ph_v_day_2014
05 zittartz presentation_ph_v_day_201405 zittartz presentation_ph_v_day_2014
05 zittartz presentation_ph_v_day_2014pharmasol
 

Destacado (15)

Blogging for business
Blogging for businessBlogging for business
Blogging for business
 
Elevator pitch Reed Connelly
Elevator pitch Reed ConnellyElevator pitch Reed Connelly
Elevator pitch Reed Connelly
 
common online terminologies
   common online terminologies   common online terminologies
common online terminologies
 
Hermosa Beach Community Dialogue: Phase II - Finance Subgroup
Hermosa Beach Community Dialogue: Phase II - Finance SubgroupHermosa Beach Community Dialogue: Phase II - Finance Subgroup
Hermosa Beach Community Dialogue: Phase II - Finance Subgroup
 
Pass två appen
Pass två appenPass två appen
Pass två appen
 
Baxter's - Transition Pack Instructions
Baxter's - Transition Pack InstructionsBaxter's - Transition Pack Instructions
Baxter's - Transition Pack Instructions
 
Valentine day with Google, Seems another update is underway –Google Update
Valentine day with Google, Seems another update is underway –Google UpdateValentine day with Google, Seems another update is underway –Google Update
Valentine day with Google, Seems another update is underway –Google Update
 
Presidents in Alpha Industries
Presidents in Alpha IndustriesPresidents in Alpha Industries
Presidents in Alpha Industries
 
Repechage records,Karate1 Premier League - Okinawa 2014
Repechage records,Karate1 Premier League - Okinawa 2014Repechage records,Karate1 Premier League - Okinawa 2014
Repechage records,Karate1 Premier League - Okinawa 2014
 
Utbildning interaktiva moten
Utbildning interaktiva motenUtbildning interaktiva moten
Utbildning interaktiva moten
 
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIRE&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
E&B Oil Company's Legal Letter To The City Og Hermosa Beach About The FEIR
 
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable Electronic Fu...
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable  Electronic Fu...Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable  Electronic Fu...
Manual: Wiring Harness 1998 – 2002 GM LS1 / LS6 Drive by Cable Electronic Fu...
 
www.bookajourney.com
www.bookajourney.com www.bookajourney.com
www.bookajourney.com
 
E marketing EyeRecommend Conference, Edmonton Alberta 2014
E marketing   EyeRecommend Conference, Edmonton Alberta 2014E marketing   EyeRecommend Conference, Edmonton Alberta 2014
E marketing EyeRecommend Conference, Edmonton Alberta 2014
 
05 zittartz presentation_ph_v_day_2014
05 zittartz presentation_ph_v_day_201405 zittartz presentation_ph_v_day_2014
05 zittartz presentation_ph_v_day_2014
 

Similar a How To Keep Safe On The Internet!

Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safetybenlangley-efc
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentationQEwebAdmin
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Infooneill74
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingMelissa McDonald
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Digital safety and security for students
Digital safety and security for studentsDigital safety and security for students
Digital safety and security for studentsRose-Marie Shigas
 

Similar a How To Keep Safe On The Internet! (20)

Precautions to ensure safety
Precautions to ensure safetyPrecautions to ensure safety
Precautions to ensure safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Untitled Presentation.pdf
Untitled Presentation.pdfUntitled Presentation.pdf
Untitled Presentation.pdf
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
CH e-safety presentation
CH e-safety presentationCH e-safety presentation
CH e-safety presentation
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
E-Safety and Kite Info
E-Safety and Kite InfoE-Safety and Kite Info
E-Safety and Kite Info
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Geek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® CyberbullyingGeek Out @ Your Library® Cyberbullying
Geek Out @ Your Library® Cyberbullying
 
Phishing
PhishingPhishing
Phishing
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Digital safety and security for students
Digital safety and security for studentsDigital safety and security for students
Digital safety and security for students
 

Último

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Último (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

How To Keep Safe On The Internet!

  • 1. How To Keep Safe On The Internet! Ben Langley Donatas Vysniauskas Alex Clark Melisa Aslan
  • 2. Coming Up… • Take appropriate precautions to ensure own safety and privacy • Protect personal information online • Carry out checks on other’s identity • Forms and features of cyber bullying.
  • 3. Precautions to ensure safety and privacy Ben Langley
  • 4. Safety and privacy the risks on the internet • Cyber bullying • Scammers • Hackers • Fake websites • Malware • phishing
  • 5. Ensuring Your Own Safety on the internet • Content Filtering: restricting the type of content which can be viewed. • Proxy Servers: using systems to hid your true location. • Monitoring and Reporting User Behaviour: keeping an eye on the behaviour of other users and reporting anything inappropriate. • Withholding Personal Information: keeping the amount of information that can be viewed online to a minimum. • Using Non-trivial Usernames and Passwords: avoiding the use of easily-guessed or easily cracked passwords.
  • 6. Always be cautious when using the Internet • Always be cautious about any information you give when using the Internet eg: if you join a chat room use a suitable nickname and never give any personal information out such as where you live. • Use throwaway e-mail addresses, eg: Gmail addresses that you can simply discard if anyone starts harassing you in any way. • Always assume that any information and pictures you put on the Internet can be viewed by the entire world.
  • 7. Always be cautious when using the Internet • Beware of giving information about yourself out. The more information you put on the internet the more there is for someone to put together about you. • Always be suspicious of what you are being offered on the Internet, eg: gifts, prizes and money. There are many dangers. eg: hackers or Scammers. • Fake websites
  • 8. Important to have a strong password A password is an important element of Internet defence. It is a secret code, known only to you, that will allow you to access certain resources. You should never tell anyone your password. • It is important to have a strong password that other people cannot easily guess. • Try not to use details that could be guessed by people who know you • Use a combination of letters, numbers and symbols • Never tell your friends or family your password • Never email your password to anyone • Keep your username and passwords safe
  • 10. How to protect your personal information online? • Never give out identifying information such as, name, address, school name or telephone numbers in a public message such as a chat room - Facebook. This is because they can use that information against you or share it on internet widely. Also, this could result in a scam because someone could use your information to find out your bank details. Donatas Vysniauskas
  • 11. How to make sure your personal information stays safe? • Learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network (Keep your profile closed and allow only your friends to view your profile). Donatas Vysniauskas
  • 12. Strong passwords • The use of strong passwords is therefore essential in order to protect your security and identity. • Make sure your passwords are long and hard to guess. This will help your social networking to stay private and invulnerable to other people. Donatas Vysniauskas
  • 13. What is Phishing? • Phishing is an act of attempting to acquire information such as usernames, passwords and credit card details. • To prevent phishing don’t click on a malicious link or open a malicious attachment, in which case your financial information and passwords may then be stolen. Donatas Vysniauskas
  • 14. Carry Out Checks On Other’s Online Identity! Alex Clark
  • 15. Why Is It Important To Check Other’s Identity? • It is important to know who the people on the internet because they may be fake identity’s. • Also, they may find your information and details on credit/debit card’s, but they may also be sexual predators. • You will have to be very careful when using social networking, because you may not know the people or they may be adults pretending to be children, and you may meet up with them some time.
  • 16. Ways To Check Other’s Identity! Profile Picture • If you do not know who the person is that is adding you as a friend on social networks, you should first go on there profile and see there pictures.
  • 17. Mutual Friends • If you do not know the person that is trying to add you on social networks, you can always look at there mutual friends. Then you can see what friends he has got that you have also got.
  • 18. Webcam • If you do not know the person that is adding you on social networks, you can always add them on Skype to see what they look like. Some people say that they don’t want to do webcam. They might be someone, that their not.
  • 19. Forms and Features of Cyber Bullying. Melisa Aslan
  • 20. What is Cyber Bullying? Cyber bullying is when a child or teen is getting threatened, harassed, humiliated or embarrassed by another child or teen using the Internet, digital technologies or mobile phones. Melisa Aslan
  • 21. Forms of Cyber Bullying Cyber stalking: Repeatedly sending messages that include threats of harm or are highly intimidating that might make a person afraid for his or her safety. Outing and Trickery: Sharing someone's secrets or embarrassing information, or tricking someone into revealing secrets or embarrassing information and forwarding it to others. Melisa Aslan
  • 22. Forms of Cyber Bullying Impersonation: Breaking into an email or social networking account and using that person's online identity to send or post embarrassing material to/about others. Cyber Stalking: Repeatedly sending messages that include threats of harm or are highly intimidating, or engaging in other online activities that make a person afraid for his or her safety. Melisa Aslan
  • 23. Features of Cyber Bullying Cyber bullying can be used to carry out various different types of bullying, including racist bullying or bullying related to disabilities. Instead of carrying out bullying in person, cyber bullies make use of technology, particularly the Internet and mobile phones to bully others. Melisa Aslan