Upload
emory-kennedy
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
Cyber Safety
Protect Your Identity
Choose screen names/logins that do not give you away
Choose password that cannot be easily guessed
Do not give away any personal information: name, birth date, social security number, address, etc.
Separate your personal identity from your internet identity
Think before you put anything on the internet… Just like a tattoo,
your digital reputation is an expression of yourself.
Highly visible, and hard to remove
ESPECIALLY IF YOUR PROFILE IS PUBLIC!!!!!!!
Risks
Enemies Predators Accountability for your statements Result in legal or school discipline “Instant background checks” Really can’t know what’s true No reasonable expectation of privacy
Making Impressions
It is reported that predators call social networking sites their
“Virtual Shopping Catalog”
Refer their ‘friends’ to that profile
A Powerful tool for recruiters, employers, or schools… They can see: Your use of language.
(status/comments) What you do in your spare time.
(pictures) What your interests are. (about me) Who you associate with. (friends)
THEY CAN MAKE A JUDGEMENT OF YOUR CHARACTER!
What should you do…
Use intelligent design
Use Intelligent Design
Eliminate all identifying information Anything that allows you to be located Anything that pairs the profile to your
name Delete inappropriate information Read your information to determine
what impression it gives Your site may appeal to someone you
didn’t intend for it to impress
What should you do…
Choose appropriate photos Un-tag inappropriate photos Use appropriate language. Don’t “like” inappropriate things. Set good privacy settings!
Social Networking Tips
Set your site so that people can only be added as your friend if you approve it
Set your profile as private Check the additional setting, i.e.,
photos Know the sites privacy policy Use strong passwords Use anti virus protection
Predator Simulation
What can be found on a Facebook profile?
What can be found on an Instagram?
What we know so far… His name His girlfriend’s name His birth date He is from Moreland, Georgia His email addresses His AIM screen name His cell phone number His personal web page address The music he likes The movies and TV shows he likes to watch
Time: 2 minutes
We now know his student number We know what he drinks We know his favorite holidays We know his favorite sports teams We know his major We have learned even more
information about where he is from
Time: 1 minute Total Time: 3 minutes
What we know so far…
Parents’ names Their address Home phone number Parents’ ages
Time: 2 minutes Total Time: 5 minutes
What we know so far…
Map to their house Satellite image Local theaters
Time: 2 minutes Total Time: 7 minutes
What we know so far…
What should you do…
Protect your personal information Be cautious of people online that you
do not REALLY f2f know Realize the criminal risks of some
internet actions Remember people online are still
people…
Spread the Word…
Create a Flyer in Word that either tells your peers A. Protect your Identity B. Protect yourself from Predators