SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Cyberwellness Hong Wen School Proudly brought to you by the ICT Committee
Cyberwellness ambassadors: LAK BOON JUN LOH CHANG YIP 5P We will be sharing with you more of Cyberwellness throughout the year.
What is Cyberwellness? Cyber Wellness refers to the positive well-being of Internet users. It involves an understanding of the risks of harmful online behaviours, an awareness of how to protect oneself and other Internet users from such behaviours.
Ruben, a ten-year-old boy, opened  an email  which wanted him to give  his name, address, contact number, saving bank account number and pin number.  By doing so, the email promised to enter him in a  lucky draw  whereby he stands a chance to win one million dollars.  Somewhere in Jurong West...
Ken, a handsome twelve-year-old boy, chanced upon a  website  that promised to send him a latest set of  Ben10 figurines  to him if he were to fill up an online form asking for  his name, address, email address, parents handphone numbers and his favourite hangouts.  Somewhere in Woodlands…
Jane, a gifted Hong Wen student, was  updating her personal blog and facebook account  and she thought it would be good to leave her  name, address, contact numbers and other information  so that her friends could contact her easily.  Somewhere in Boon Keng…
It is  unwise  to leave  confidential information online . The lucky draw could be a  scam . It is  dangerous  to leave information like your name, favourite hangouts online.  . Be a  smart  Hong Wen student who knows what  Cyberwellness  is and how  act wisely . Ruben Ken Jane Let's see what decisions did our 3 friends make and what happened to each of them a few days later.
What have we learned from  the skit? We do not reveal personal information online. We must practise Cyberwellness.
Can we trust  everything   we see or read  on the  internet?
NO.
But…can the Internet be useful? ,[object Object],[object Object],[object Object]
Hong Wen School Webpage
Class Blogs
Educational Games
Wow! The internet sounds like fun! ,[object Object]
Cyber Bullying ,[object Object],[object Object]
Cyber Bullying ,[object Object],[object Object]
Other Cyberwellness topics include:  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
So, who teach you all these? ,[object Object]
www.bullyfreecampaign.sg
www.mda.gov.sg
Cyberwellness Framework
The End

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKati W
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019KanelandSvihlik
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety PresentationMichael Richards
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
E safety assembly
E safety assemblyE safety assembly
E safety assemblyJEcomputing
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Queens Library
 
Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Saedah
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2Chu Yuan
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contractClaire Amos
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Allisonaustincatherine
AllisonaustincatherineAllisonaustincatherine
Allisonaustincatherinesmeech
 

Was ist angesagt? (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Safety - Judi Calhoun
Internet Safety - Judi CalhounInternet Safety - Judi Calhoun
Internet Safety - Judi Calhoun
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
E safety assembly
E safety assemblyE safety assembly
E safety assembly
 
Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet Internet do's and don'ts. Kids safety on the Internet
Internet do's and don'ts. Kids safety on the Internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211Cyberwellness talk by mdm saedah 2011 160211
Cyberwellness talk by mdm saedah 2011 160211
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber wellness 2
Cyber wellness 2Cyber wellness 2
Cyber wellness 2
 
Digital citizenship contract
Digital citizenship contractDigital citizenship contract
Digital citizenship contract
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Schools without manners
Schools without mannersSchools without manners
Schools without manners
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Allisonaustincatherine
AllisonaustincatherineAllisonaustincatherine
Allisonaustincatherine
 

Andere mochten auch

Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internetbeh yong hua
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
MATLAB : Numerical Differention and Integration
MATLAB : Numerical Differention and IntegrationMATLAB : Numerical Differention and Integration
MATLAB : Numerical Differention and IntegrationAinul Islam
 
Cyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan PresentationCyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan PresentationKai Sheng
 

Andere mochten auch (6)

Cyber-Wellness
Cyber-WellnessCyber-Wellness
Cyber-Wellness
 
Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Cyberwellness
CyberwellnessCyberwellness
Cyberwellness
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
MATLAB : Numerical Differention and Integration
MATLAB : Numerical Differention and IntegrationMATLAB : Numerical Differention and Integration
MATLAB : Numerical Differention and Integration
 
Cyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan PresentationCyber Wellness Lesson Plan Presentation
Cyber Wellness Lesson Plan Presentation
 

Ähnlich wie Cyberwellness 2011 hws

H:\Esafety\Esafety Staff Training 100609\E Safety Training
H:\Esafety\Esafety Staff Training 100609\E Safety TrainingH:\Esafety\Esafety Staff Training 100609\E Safety Training
H:\Esafety\Esafety Staff Training 100609\E Safety Trainingguestdd47c0
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010adewolfe
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramDaniel Hanttula
 
Glen Grove Internet Safety
Glen Grove Internet SafetyGlen Grove Internet Safety
Glen Grove Internet Safetybrianmengle
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingAntolduvai
 
I spresent
I spresentI spresent
I spresentloricrum
 
Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldDeborah Gonzalez, Esq.
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonEva Buyuksimkesyan
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangersrangashree
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Calebguestde489f
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Calebguestde489f
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 

Ähnlich wie Cyberwellness 2011 hws (20)

H:\Esafety\Esafety Staff Training 100609\E Safety Training
H:\Esafety\Esafety Staff Training 100609\E Safety TrainingH:\Esafety\Esafety Staff Training 100609\E Safety Training
H:\Esafety\Esafety Staff Training 100609\E Safety Training
 
Shasta COE cyberbullying2010
Shasta COE cyberbullying2010Shasta COE cyberbullying2010
Shasta COE cyberbullying2010
 
Stay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public ProgramStay Safe Online - Elementary School Level Public Program
Stay Safe Online - Elementary School Level Public Program
 
Glen Grove Internet Safety
Glen Grove Internet SafetyGlen Grove Internet Safety
Glen Grove Internet Safety
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
I spresent
I spresentI spresent
I spresent
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying Presentation
Cyberbullying PresentationCyberbullying Presentation
Cyberbullying Presentation
 
Let's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital WorldLet's Talk: Being Safe in a Digital World
Let's Talk: Being Safe in a Digital World
 
102009
102009102009
102009
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, LondonSurfing Safe on the Net, a school project presented at #Bett Show 2015, London
Surfing Safe on the Net, a school project presented at #Bett Show 2015, London
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Shouq jaber 11 a
Shouq jaber   11 aShouq jaber   11 a
Shouq jaber 11 a
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
Internet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, CalebInternet Safety Hope Sievert, Emma Balison, Caleb
Internet Safety Hope Sievert, Emma Balison, Caleb
 
Internet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, CalebInternet Safety Hope, Emma, Ali, Caleb
Internet Safety Hope, Emma, Ali, Caleb
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 

Mehr von Abel Kok

Synthesis revision
Synthesis revisionSynthesis revision
Synthesis revisionAbel Kok
 
Let’s do your final recap! 2013
Let’s do your final recap! 2013Let’s do your final recap! 2013
Let’s do your final recap! 2013Abel Kok
 
Afl ca2 p5 2013 parallel
Afl ca2 p5 2013 parallelAfl ca2 p5 2013 parallel
Afl ca2 p5 2013 parallelAbel Kok
 
Afl ca2 p5 2013 parallel
Afl ca2 p5 2013 parallelAfl ca2 p5 2013 parallel
Afl ca2 p5 2013 parallelAbel Kok
 
Sa1 p5 selected questions
Sa1 p5 selected questionsSa1 p5 selected questions
Sa1 p5 selected questionsAbel Kok
 
Sa1 p5 selected questions
Sa1 p5 selected questionsSa1 p5 selected questions
Sa1 p5 selected questionsAbel Kok
 
Oral preparation 2013 uploaded
Oral preparation 2013 uploadedOral preparation 2013 uploaded
Oral preparation 2013 uploadedAbel Kok
 
Making inferences second lesson
Making inferences second lessonMaking inferences second lesson
Making inferences second lessonAbel Kok
 
Making inferences first lesson
Making inferences first lessonMaking inferences first lesson
Making inferences first lessonAbel Kok
 

Mehr von Abel Kok (9)

Synthesis revision
Synthesis revisionSynthesis revision
Synthesis revision
 
Let’s do your final recap! 2013
Let’s do your final recap! 2013Let’s do your final recap! 2013
Let’s do your final recap! 2013
 
Afl ca2 p5 2013 parallel
Afl ca2 p5 2013 parallelAfl ca2 p5 2013 parallel
Afl ca2 p5 2013 parallel
 
Afl ca2 p5 2013 parallel
Afl ca2 p5 2013 parallelAfl ca2 p5 2013 parallel
Afl ca2 p5 2013 parallel
 
Sa1 p5 selected questions
Sa1 p5 selected questionsSa1 p5 selected questions
Sa1 p5 selected questions
 
Sa1 p5 selected questions
Sa1 p5 selected questionsSa1 p5 selected questions
Sa1 p5 selected questions
 
Oral preparation 2013 uploaded
Oral preparation 2013 uploadedOral preparation 2013 uploaded
Oral preparation 2013 uploaded
 
Making inferences second lesson
Making inferences second lessonMaking inferences second lesson
Making inferences second lesson
 
Making inferences first lesson
Making inferences first lessonMaking inferences first lesson
Making inferences first lesson
 

Kürzlich hochgeladen

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 

Kürzlich hochgeladen (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 

Cyberwellness 2011 hws

  • 1. Cyberwellness Hong Wen School Proudly brought to you by the ICT Committee
  • 2. Cyberwellness ambassadors: LAK BOON JUN LOH CHANG YIP 5P We will be sharing with you more of Cyberwellness throughout the year.
  • 3. What is Cyberwellness? Cyber Wellness refers to the positive well-being of Internet users. It involves an understanding of the risks of harmful online behaviours, an awareness of how to protect oneself and other Internet users from such behaviours.
  • 4. Ruben, a ten-year-old boy, opened an email which wanted him to give his name, address, contact number, saving bank account number and pin number. By doing so, the email promised to enter him in a lucky draw whereby he stands a chance to win one million dollars. Somewhere in Jurong West...
  • 5. Ken, a handsome twelve-year-old boy, chanced upon a website that promised to send him a latest set of Ben10 figurines to him if he were to fill up an online form asking for his name, address, email address, parents handphone numbers and his favourite hangouts. Somewhere in Woodlands…
  • 6. Jane, a gifted Hong Wen student, was updating her personal blog and facebook account and she thought it would be good to leave her name, address, contact numbers and other information so that her friends could contact her easily. Somewhere in Boon Keng…
  • 7. It is unwise to leave confidential information online . The lucky draw could be a scam . It is dangerous to leave information like your name, favourite hangouts online. . Be a smart Hong Wen student who knows what Cyberwellness is and how act wisely . Ruben Ken Jane Let's see what decisions did our 3 friends make and what happened to each of them a few days later.
  • 8. What have we learned from the skit? We do not reveal personal information online. We must practise Cyberwellness.
  • 9. Can we trust everything we see or read on the internet?
  • 10. NO.
  • 11.
  • 12. Hong Wen School Webpage
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.