Safety rules for working on social networking sites

Views:
 
Category: Entertainment
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

Safety rules for working on social networking sites.:

Safety rules for working on social networking sites. WEB Rangers

Slide 2:

What is Internet Safety? Internet safety means protecting your personal interests over the web . Hackers can access your sensitive details such as: Address Your Full Name Telephone Number Bank Account Credentials Data Stored In Device

Slide 3:

Personal Protection From… Internet Predators Coffee-Shop-Data-Collectors “Script-Kiddies” (what you might think of as “hackers”) Viruses / Trojans / Ad-Ware Those who take advantage of children & teens Use of “Social Engineering” Sexual Intentions

Slide 4:

Coffee-Shop-Data-Collectors While you ’re sipping coffee and surfing on free W iFi , hackers could be gorging on your sensitive data Most public wireless connections are NOT secure Don’t log into websites that reveal your sensitive credentials (email, bank account, etc.) Use an encrypted VPN ( Virtual Private Network )

Slide 5:

Coffee Shop Scenario Typical unsecured wireless connection. This is what you think that you are logging into…

Slide 6:

Man In The Middle Attack …But The Man-In-The-Middle grabs and/or modifies data that is sent/received. Hello I am the BAD GUY

Slide 7:

Desired Outcomes Of This Presentation Virtual Safety- freedom and safety on the web Psychological Safety – freedom from cruelty, harassment, and exposure to potentially disturbing material Reputational and Legal Safety – freedom from unwanted social, academic, professional, and legal consequences that could affect users for a lifetime Identity, Property, and Community Safety – freedom from theft of identity & property.

Slide 8:

Statistics 75% of children and teens report sharing personal information about them and their families to complete strangers in chat rooms. 75% of American teens own cell phones 4% of American teens have sent sexually suggestive images or videos of themselves via cell phone. 43% of teens have been victims of cyber bullying.

Slide 9:

Avenues for Online Communication Avenues for online child communication: blogs, chat rooms, irc , IM, Facebook , Facebook chat, MySpace, Orkut , email, Skype, Twitter, Identica , Craigslist, forums, text messages, etc….

Slide 10:

Protection Methods for Youth (& you!) Educate you child about safe Internet practices Use strong passwords (including numbers, special characters, and combination of upper/lower case) Never give password to anyone Don't communicate online with people you don't know Enable & elevate privacy settings in Facebook Do not allow Skype calls from anyone who is not on your contact list Teach kids about responsible communication

Slide 11:

Cyberbullying What is it? Cyber Bullying occurs when people send or post mean or threatening text or pictures on the Internet. Examples: A kid could post stories about another kid online. They could show the website to all of their friends. When the victim goes back to school, he/she gets teased about something they don’t know about. If a friend had your password, and you got into a fight, they could send mean emails to everyone in your address book. When your friends or family open the email, they would think that it came from you! They could feel very hurt and upset.

Slide 12:

Cyber bullying Possible warning signs of children being bullied or bullying other children Complaining that other children or a group of children do not like them. Preoccupation with friendship concerns. Poor self-esteem. Feeling they are not as good as others. Not wanting to go to school or other activities. Spending a great deal of time on the computer. Being secretive about online activities.

Slide 13:

Cyberbullying Dealing with Cyberbullying Preserve evidence – this is crucial for identifying the bully and making a case. Attempt to enlist assistance from the service provider. If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, email and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)

Slide 14:

“ Sexting ” - Consequences Photos sent to boy/girlfriend could potentially be distributed over school, especially after a breakup One could suffer legal consequences after distributing nude photos of an underage minor criminal charges listed as registered sex offender Criminal charges could result in... permanent expulsion from school loss of job opportunities (due to lack of education and/or sex-offender job regulations & limitations)

Slide 15:

Viruses / Trojans / Ad-Ware Internet Explorer uses Active-X controls for easy software installation – not safe Use Web Browser Alternatives: Firefox, Opera, Safari Use Virus Software: Symantec, McAffee , ClamWin , etc Regular Windows Updates (weekly) Don’t open email attachments unless you know for certain what they are.

authorStream Live Help