Upload
eric-e-castro
View
567
Download
0
Embed Size (px)
Citation preview
Internet SafetyMr Eric Castro
http://about.me/eecastro
Tell a neighbor: What do you remember from your grammar school internet
safety presentations?
Create a Positive Digital Footprint
Protect Your Privacy
Protect Yourself from Identity Theft
Protect Yourself from Bullies
Protect Yourself from Predators
Protect Yourself from Yourself
Create a Positive Digital Footprint
1
Tell a neighbor: What are you most proud of having produced or created
that’s online?
Our digital footprint is the evidence of our online activities.
You want to leave positive
digital footprints.
Lost by Stephen Nicholas
The New Yorker, 3/22/2010
Protect Your Privacy
2
1) Do not inadvertently reveal personal information online
Block cookies
2) Keep a “clean” email account
3) Realize that you may be monitored
4) Do not reply to spammers, ever
5) Be conscious of web security
Passwords
Use a different secure passphrase for each site
• PassPHRASES are more secure than passwords
• Passphrases are easier to remember than passwords
• Do not use personal information
Come up with a short sentence that is easy to remember
Add one extra variable
Come up with a short sentence that is easy to remember
Ted was a bad movie
Add one extra variable
Ted sux0rsH@ted Ted!
Refund 4 Ted?
Encryption
http://
https://
6) Be conscious of security on shared computers
7) Be conscious of home computer security
8) Be wary of unsecured wifi
Protect Yourself from Identity Theft
3
Raise your hand: Has anyone that you know had their identity stolen?
THIS MESSAGE IS FROM OUR TECHNICAL
SUPPORT TEAM
This message is sent automatically by the computer.
If you are receiving this message it means that your
email address has been queued for deactivation; this
was as a result of a continuous error script (code:
505) receiving from this email address. Click here
and fill out the required field to resolve this problem
Note: Failure to reset your email by ignoring this
message or inputting wrong information will result
to instant deactivation of this email address
Too Much Credit by Andres Rueda
It’s not about cash ...
it’s aboutdebt
Too Much Credit by Andres Rueda
• Destroy private records and statements
• Secure your snail mail
• Safeguard your Social Security number
• Don’t leave a paper trail
• Monitor your credit report
• Review credit card statements carefully
Protect Yourself from Bullies
4
First ...
First ...
Chan
ge B
egin
s H
ere
by Tr
ista
Emlet
What exactly is cyberbullying?
• IM/ Text harassment
• Stealing passwords
• Blogs
• Web sites
• Sending pictures through email & cell phones
• Internet polling
• Interactive gaming
• Malicious code
• Sending porn or junk email
• Impersonation
• Cyberbullying by proxy
Why cyberbully?
What to do
• Don’t bully
• Don’t reciprocate
• Save evidence
• Tell a trusted adult
King on the march to Montgomery by Eliel Johnson
King on the march to Montgomery by Eliel Johnson
“In the end, we will remember not the words of our enemies, but the silence of our friends.”
Protect Yourself from Predators
5
http://i.imgur.com/cbRmA.jpg
Emotionally vulnerable
Seeking attention
Seeking affection
Seeking validation
Chatroulette
Protect Yourself from Yourself
6
Tell a neighbor: What is the least intelligent thing that you’ve seen
someone else put online?
FIRED
http://failbook.failblog.org
http://failbook.failblog.org
http://failbook.failblog.org
Rocque posted a message to his alleged attacker
saying they are 'done'.
Police say such messages can escalate quickly.
"If a young person is on the Internet and they are
making comments that are threatening in nature,
they need to realize we could be looking at
criminal charges, unwarranted retaliation because
of their comments as well as hampering an
ongoing police investigation," said Sgt. Kelly
Rosnau, school resource officer.
What to do?
• Remain alert
• Keep a low profile
• Trust your instincts
Control your information
Control your information
Be smart