+ All Categories
Home > Documents > Staying Safe in Cyberspace

Staying Safe in Cyberspace

Date post: 18-Jan-2016
Category:
Upload: bedros
View: 26 times
Download: 1 times
Share this document with a friend
Description:
Staying Safe in Cyberspace. Jessica Kohler ITC 525. Table of Contents. Safety Rules Cyber Bullying Netiquette Email Safety Standards Credits Cybersmart Video License to Surf the Web. Safety Rules. - PowerPoint PPT Presentation
Popular Tags:
27
Staying Safe in Cyberspace Jessica Kohler ITC 525 QuickTime™ and a decompressor are needed to see this picture.
Transcript
Page 1: Staying Safe in Cyberspace

Staying Safe in Cyberspace

Staying Safe in Cyberspace

Jessica KohlerITC 525

Jessica KohlerITC 525

QuickTime™ and a decompressor

are needed to see this picture.

Page 2: Staying Safe in Cyberspace

Table of ContentsTable of Contents Safety Rules

Cyber Bullying Netiquette

Email Safety

Standards CreditsCybersmart Video

License to Surf the Web

Safety Rules

Cyber Bullying Netiquette

Email Safety

Standards CreditsCybersmart Video

License to Surf the Web

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

Page 3: Staying Safe in Cyberspace

Safety RulesSafety Rules

HOME

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

More Info.

*Only use the Internet when there is an adult home. *Don’t answer email from strangers. *Tell an adult when you feel unsafe. *Keep passwords private. *Don’t meet someone in person whom you met

online. *Don’t send your picture to anyone online.

Even More Info.

QuickTime™ and a decompressor

are needed to see this picture.

Page 4: Staying Safe in Cyberspace

Are you safety savvy?Are you safety savvy?

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

BACK

What are some ways you can stay safe on the Internet?

a. Share your password with others. b. Don’t send your picture to anyone online. c. Use the Internet when no one is home.

Page 5: Staying Safe in Cyberspace

Let’s try again!Let’s try again!

QuickTime™ and a decompressor

are needed to see this picture.

HOME

Keep your password private. Others can hack into your accounts using your password.

QuickTime™ and a decompressor

are needed to see this picture.

Page 6: Staying Safe in Cyberspace

Let’s try again!Let’s try again!

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Make sure there is an adult at home when using the Internet. Who else will you tell if something goes wrong?

Page 7: Staying Safe in Cyberspace

Correct! Correct!QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

HOME

Make sure you don’t send pictures to people over the Internet (even if you know them.)

Page 8: Staying Safe in Cyberspace

Cyber BullyingCyber Bullying

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

What is it? *When a child is tormented,

threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones.

How it Works: *Direct attacks *Using others as accomplicesTake Action!

Keep personal information private. Stop, Block, and Tell. Take 5!

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

VIDEO

Page 9: Staying Safe in Cyberspace

Are you safety savvy?Are you safety savvy?

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

BACK

What actions can you take to stop Cyper Bullying?

a. Keep personal information private.

b. Help spread the rumors.

c. Text harmful information about

another person.

True or False?

Cyber bullying is talking with a friend over the Internet.

Page 10: Staying Safe in Cyberspace

Let’s look at that again!

Let’s look at that again!

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Simply talking with a friend over the Internet is not Cyber Bullying.

Page 11: Staying Safe in Cyberspace

Let’s look at that again!

Let’s look at that again!

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Helping to spread rumors is being an accomplice to the bullying.

Page 12: Staying Safe in Cyberspace

Let’s look at that again!

Let’s look at that again!

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Texting harmful information about another person is Cyber Bullying.

Page 13: Staying Safe in Cyberspace

Great Thinking!

Great Thinking!

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

HOME

Cyber Bullying is when a child is tormented, threatened, harassed, humiliated, embarrassed, or targeted by another child using the Internet or cell phones.

Bullies could be a friend or just an acquaintance.

Page 14: Staying Safe in Cyberspace

Great Thinking!

Great Thinking!

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

HOME

Make sure you keep your personalinformation private.

Bullies could be a friend or just an acquaintance.

Page 15: Staying Safe in Cyberspace

Email SafetyEmail Safety

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Email Dangers: *Chain Letters *Hoaxes, rumors and urban

legends *Phishing *Scams and fraud *Spam *Spoofing *Viruses

What are these?

Safety Tips: *Change password often *Keep password private *Log off when done *Don’t reply to spam, harassing, or offensive email. *Don’t forward chain letters *Delete emails, UNREAD,

from people you don’t know

*Use anti-virus programs before opening attachments.

Even more Information!

QuickTime™ and a decompressor

are needed to see this picture.

Page 16: Staying Safe in Cyberspace

Are you safety savvy?Are you safety savvy?

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

BACK

What are some email dangers? a. Chain Letters b. Phishing c. Spam d. All of the above

Page 17: Staying Safe in Cyberspace

Not Quite!Not Quite!

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Take another look at that list.

Page 18: Staying Safe in Cyberspace

Way To Go! Way To Go!QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

HOME

Spam, Phishing, and Chain Letters can be dangerous.

Watch Out for these too: *Hoaxes, rumors and urban legends *Scams and fraud *Spoofing *Viruses

Page 19: Staying Safe in Cyberspace

NetiquetteNetiquette

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Respect all other users!

Be patient with newcomers.

Be careful to not use rude or bad language online.

Make a good impression.

Do not TYPE IN ALL CAPITAL LETTERS.

Don’t break any laws.

Do to others as you would have them do to you.

More Info.

Even More Info.

What is it? Internet etiquette or guidelines for proper behavior on the Internet.

QuickTime™ and a decompressorare needed to see this picture.

Page 20: Staying Safe in Cyberspace

Are you safety savvy?Are you safety savvy?

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

BACK

What is an example of good Internet behavior?

a. TYPE IN ALL CAPITAL LETTERS b. Use rude or bad language c. Do to others as you would have them do to you.

Page 21: Staying Safe in Cyberspace

Do you need a redo?Do you need a redo?

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Typing in all capital letters makes people think you are yelling at them. This is not good Internet behavior.

Page 22: Staying Safe in Cyberspace

Do you need a redo?Do you need a redo?

QuickTime™ and a decompressor

are needed to see this picture.

HOME

QuickTime™ and a decompressor

are needed to see this picture.

Using rude or bad language anywhere, whether on the Internet or not is inappropriate behavior. Many Internet providers will terminate your account if you use this type of language.

Page 23: Staying Safe in Cyberspace

Absolutely! Absolutely!QuickTime™ and a

decompressorare needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

HOME

Doing to others as you would like them to do to you is a rule you should use throughout your life. This is wonderful Internet behavior to have.

Page 24: Staying Safe in Cyberspace

Get Cybersmart with Phineas and Ferb

Get Cybersmart with Phineas and Ferb

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

HOME

Page 25: Staying Safe in Cyberspace

Earn Your License to Surf the Web

Earn Your License to Surf the Web

QuickTime™ and a decompressor

are needed to see this picture.

QuickTime™ and a decompressor

are needed to see this picture.

HOME

“Rules of the Road”

Page 26: Staying Safe in Cyberspace

PA State StandardsPA State Standards

QuickTime™ and a decompressor

are needed to see this picture.

HOME

Science and Technology and Engineering Education 3.4.B: Technology and Society

3.4.5.B1: Explain how the use of technology can have unintended consequences.

3.4.D: Abilities for a Technological World 3.4.5.D3: Determine if the human use of a product or system creates

positive or negative results.

National Educational Technology Standards

National Educational Technology Standards

5. Digital Citizenship Students understand human, cultural, and societal issues related to technology and practice legal and ethical behavior.

Students: a. advocate and practice safe, legal, and responsible use of

information and technology. c. demonstrate personal responsibility for lifelong learning. d. exhibit leadership for digital citizenship.

Page 27: Staying Safe in Cyberspace

CreditsCreditsSites

http://www.protectkids.com/youthsafety/safteytipskids.htmhttp://www.ccmostwanted.com/kids/iguide.htmhttp://www.stopcyberbullying.org/index2.htmlhttp://www.youtube.com/watch?v=o0W_tEUMzuk

http://www.wiredsafety.org/safety/email_safety/http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb#

http://www.ccmostwanted.com/kids/inetiquette.htmhttp://www.kidsdomain.com/brain/computer/surfing/netiquette_kids.html

http://pbskids.org/license/

Imageshttp://dynasium.files.wordpress.com/2008/12/6a00d8341c7bc453ef00e5505e03c48833-800wi.jpg

http://www.clker.com/clipart-13158.htmlhttp://reallessons4reallearning.wikispaces.com/file/view/computer-clipart.gif/131750119/computer-clipart.gif

http://cdnet.myxer.com/tn/c/1943197/big/?t=20090522165142http://www.chairvilleschool.org/webquests/internet_safety1_check.gifhttp://www.villageofworth.com/Police/email/envelope-circle-clipart.gif

http://www.graphicsfactory.com/clip-art/image_files/tn_image/0/755640-tn_BIB0101.gifhttp://www.urenco.com/uploads/images/safety%20sign.JPG

http://glma.files.wordpress.com/2007/12/cyberbullying.jpghttp://scorpion1333.files.wordpress.com/2009/06/phineas-and-ferb-300a071708.jpg

http://www.gpl.lib.me.us/movie.gif

Siteshttp://www.protectkids.com/youthsafety/safteytipskids.htm

http://www.ccmostwanted.com/kids/iguide.htmhttp://www.stopcyberbullying.org/index2.htmlhttp://www.youtube.com/watch?v=o0W_tEUMzuk

http://www.wiredsafety.org/safety/email_safety/http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb#

http://www.ccmostwanted.com/kids/inetiquette.htmhttp://www.kidsdomain.com/brain/computer/surfing/netiquette_kids.html

http://pbskids.org/license/

Imageshttp://dynasium.files.wordpress.com/2008/12/6a00d8341c7bc453ef00e5505e03c48833-800wi.jpg

http://www.clker.com/clipart-13158.htmlhttp://reallessons4reallearning.wikispaces.com/file/view/computer-clipart.gif/131750119/computer-clipart.gif

http://cdnet.myxer.com/tn/c/1943197/big/?t=20090522165142http://www.chairvilleschool.org/webquests/internet_safety1_check.gifhttp://www.villageofworth.com/Police/email/envelope-circle-clipart.gif

http://www.graphicsfactory.com/clip-art/image_files/tn_image/0/755640-tn_BIB0101.gifhttp://www.urenco.com/uploads/images/safety%20sign.JPG

http://glma.files.wordpress.com/2007/12/cyberbullying.jpghttp://scorpion1333.files.wordpress.com/2009/06/phineas-and-ferb-300a071708.jpg

http://www.gpl.lib.me.us/movie.gif

QuickTime™ and a decompressor

are needed to see this picture.

HOME


Recommended