30
Cyber Safety

Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Embed Size (px)

Citation preview

Page 1: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Cyber Safety

Page 2: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Protect Your Identity

Choose screen names/logins that do not give you away

Choose password that cannot be easily guessed

Do not give away any personal information: name, birth date, social security number, address, etc.

Separate your personal identity from your internet identity

Page 3: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Think before you put anything on the internet… Just like a tattoo,

your digital reputation is an expression of yourself.

Highly visible, and hard to remove

ESPECIALLY IF YOUR PROFILE IS PUBLIC!!!!!!!

Page 4: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Risks

Enemies Predators Accountability for your statements Result in legal or school discipline “Instant background checks” Really can’t know what’s true No reasonable expectation of privacy

Page 5: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Making Impressions

It is reported that predators call social networking sites their

“Virtual Shopping Catalog”

Refer their ‘friends’ to that profile

Page 6: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

A Powerful tool for recruiters, employers, or schools… They can see: Your use of language.

(status/comments) What you do in your spare time.

(pictures) What your interests are. (about me) Who you associate with. (friends)

THEY CAN MAKE A JUDGEMENT OF YOUR CHARACTER!

Page 7: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

What should you do…

Use intelligent design

Page 8: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Use Intelligent Design

Eliminate all identifying information Anything that allows you to be located Anything that pairs the profile to your

name Delete inappropriate information Read your information to determine

what impression it gives Your site may appeal to someone you

didn’t intend for it to impress

Page 9: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

What should you do…

Choose appropriate photos Un-tag inappropriate photos Use appropriate language. Don’t “like” inappropriate things. Set good privacy settings!

Page 10: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 11: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 12: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Social Networking Tips

Set your site so that people can only be added as your friend if you approve it

Set your profile as private Check the additional setting, i.e.,

photos Know the sites privacy policy Use strong passwords Use anti virus protection

Page 13: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Predator Simulation

What can be found on a Facebook profile?

What can be found on an Instagram?

Page 14: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 15: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

What we know so far… His name His girlfriend’s name His birth date He is from Moreland, Georgia His email addresses His AIM screen name His cell phone number His personal web page address The music he likes The movies and TV shows he likes to watch

Time: 2 minutes

Page 16: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 17: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

We now know his student number We know what he drinks We know his favorite holidays We know his favorite sports teams We know his major We have learned even more

information about where he is from

Time: 1 minute Total Time: 3 minutes

What we know so far…

Page 18: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 19: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 20: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 21: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Parents’ names Their address Home phone number Parents’ ages

Time: 2 minutes Total Time: 5 minutes

What we know so far…

Page 22: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 23: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 24: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 25: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 26: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Map to their house Satellite image Local theaters

Time: 2 minutes Total Time: 7 minutes

What we know so far…

Page 27: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 28: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away
Page 29: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

What should you do…

Protect your personal information Be cautious of people online that you

do not REALLY f2f know Realize the criminal risks of some

internet actions Remember people online are still

people…

Page 30: Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away

Spread the Word…

Create a Flyer in Word that either tells your peers A. Protect your Identity B. Protect yourself from Predators