You are on page 1of 77

Internet Safety

Mr Eric Castro
Tell a neighbor: What do you remember
from your grammar school internet
safety presentations?
Create a Positive Digital Footprint

Protect Your Privacy

Protect Yourself from Identity Theft

Protect Yourself from Bullies

Protect Yourself from Predators

Protect Yourself from Yourself


Create a Positive
Digital Footprint

1
Tell a neighbor: What are you most
proud of having produced or created
that’s online?
Our digital footprint
is the evidence of our
online activities.
You want to
leave positive
digital footprints.

Lost by Stephen Nicholas


The New Yorker,
3/22/2010
Protect Your Privacy

2
1) Do not inadvertently reveal
personal information online
Block cookies
2) Keep a “clean” email
account
3) Realize that you may be
monitored
4) Do not reply to spammers,
ever
5) Be conscious of web
security
Passwords
Use a different secure password for
each site
• Make sure your password is as long as possible

• Use as many different characters as possible

• Do not use personal information

• Do not use common words

• Do not use passwords that are easy to spot while


you are typing them in
Come up with a sentence that is easy to remember

Use the first letter of each word,


including the punctuation
Come up with a sentence that is easy to remember

Tron was a complete waste of money!

Use the first letter of each word,


including the punctuation

Twacwom!
Encryption
http://

https://
6) Be conscious of security on
shared computers
7) Be conscious of home
computer security
Protect Yourself from
Identity Theft

3
Raise your hand: Has anyone that you
know had their identity stolen?
IMG_4511 by John R Southern
To
o M
uc
hC
re d
it b
yA
nd
re
sR
ue
da
It’s not about
cash ...

To
o M
uc

it’s about
hC
re d
it b
yA
nd

debt
re
sR
ue
da
• Destroy private records and statements

• Secure your snail mail

• Safeguard your Social Security number

• Don’t leave a paper trail

• Monitor your credit report

• Review credit card statements carefully


Protect Yourself from
Bullies

4
First ...
First ...

Change Begins Here by Trista Emlet


What exactly is
cyberbullying?
• IM/ Text • Interactive gaming
harassment
• Malicious code
• Stealing passwords
• Sending porn or
• Blogs junk email

• Web sites • Impersonation

• Sending pictures • Cyberbullying by


through email & proxy
cell phones

• Internet polling
Why cyberbully?
What to do
• Don’t bully

• Don’t reciprocate

• Save evidence

• Tell a trusted adult


King on the march to Montgomery by Eliel Johnson
“In the end, we will remember not the words of
our enemies, but the silence of our friends.”
King on the march to Montgomery by Eliel Johnson
Protect Yourself from
Predators

5
http://i.imgur.com/cbRmA.jpg
Emotionally vulnerable

Seeking attention

Seeking affection

Seeking validation
Chatroulette
Protect Yourself from
Yourself

6
Tell a neighbor: What is the least
intelligent thing that you’ve seen
someone put online?
http://failbook.failblog.org
http://failbook.failblog.org
http://failbook.failblog.org
a l l e g e d a t t a c k e r
m e s s ag e t o h i s
t e d a
Rocque pos e ' .
e y a r e ' d o n
saying th q u i c k l y .
g e s c a n e s c a l a t e
s a y s u c h m e s s a
Police a n d t h e y a r e
o n t h e I n t e r n e t
y o u n g p e r s o n i s i n n a t u re ,
"If a a r e t h re a t e n i n g
c o m m e n t s t h a t k i n g a t
mak i n g c o u l d b e l o o
t o r e a l i z e w e a u s e
th e y n e e d r e t a l i a t io n b e c
e s , u n w a r r a n t e d n
crim i n a l c h a r g h a m p e r i n g a
t s a s w e l l a s
t h e i r c o m m e n S g t . K e l l y
of s t i g a t i o n , " s a i d
o l i c e i n v e
ongoing p u r c e o f f i c e r .
a u , s c h o o l r e s o
Rosn
What to do?
• Remain alert

• Keep a low profile

• Trust your instincts


Control your information
Control your information
Be smart

You might also like