SlideShare ist ein Scribd-Unternehmen logo
1 von 21
A Quick Online Safety Guide
         Grades 3-5
Why?
         The Internet represents
     s
         –   Great Opportunities
         –   Greater Responsibilities
         –   Greatest Chances for Dangerous Situations
         19% of teens feel safer online than in the real world*
     s
         39% of students trust people that they chat with
     s
         online*
         24% of students say they see nothing with chatting
     s
         with a stranger*
         10% of students have been asked to keep their
     s
         Internet relationship a secret*

*iSAFE America Student Assessment, 2004
Access
        Children between 8-18 use the
      s
        computer for more than an hour a day
      s 74% have a computer with Internet
        access*
      s 31% have high speed access (that
        number grows each year)*



*The George Lucas Foundation, “Synching Up With The iKid”, Edutopia, October 2005.
Types of People Who
       Use the Internet
  Responsible and Ethical
s
s Numbuts
s Hotheads
s Follow-You-Fionas
s Oogles
s Spamazoids
Responsible and
          Ethical
    They know the
s
    difference between
    right and wrong
    Wary of others
s
    Never shares
s
    personal information
    Has a good
s
    password
    Has a life beyond
s
    the computer
Numbuts
              Doesn’t have any
          s
              friends
              Stays in their room
          s
              all day
              Lacks social skills
          s
              Talks in code
          s
Hotheads
        They have a temper
    s
        They can lose
    s
        control of their
        temperature
        They say mean
    s
        things




Photo courtesy of Netsmartzkids.org
Follow-You-Fionas
                                          People who want to
                                      s
                                          be more than online
                                          friends
                                          Try to get personal
                                      s
                                          information
                                          May not be who
                                      s
                                          they say they are
                                          Trying to meet you
                                      s
                                          in person


Photo courtesy of Netsmartzkids.org
Oogles
                                          Trying to collect your
                                      s
                                          personal information
                                          Want to sell that
                                      s
                                          information to others
                                          Follow you around the
                                      s
                                          Internet
                                          They are sneaky may
                                      s
                                          want to give you “free”
                                          stuff




Photo courtesy of Netsmartzkids.org
Spamazoids
        They send out annoying
    s
        message that clog email
        accounts
        You didn’t ask for these
    s
        messages
        May contain things that do
    s
        bad things to your computer
        Watch out for phishing
    s
        (looking for personal
        information through email,
        usually updating accounts
        that you may or may not
        have with legit companies)
Photo courtesy of Netsmartzkids.org
Your Personal
          Information
    Phone Number, Address, Age, Name, Parents’
s
    Name, School, Grade, Work Information,
    Passwords, Usernames, etc.
    Once you give it away you can never take it
s
    back completely
    The only people you should trust with it are
s
    your parents (not even your best friend)
    Avoid putting personal pictures of yourself
s
    and friends online
Usernames and
       Profiles
  Make them unique and generic
s
s Only provide the required information
s Resist the temptation to revel personal
  information through usernames and
  profiles
Passwords
  Your key to safety
s
s Make it strong
    – Use a mix of capital and lower case letters,
      numbers, and special characters
    – Make it at least 8 characters long
    – Don’t use words or names
    Change it on a regular basis
s
Online Friends
  Let them be just that
s
s Don’t meet people you only know from
  being online with them
s You have no idea who the person is on
  the other computer
s Online only friends are still strangers
Cyber-bullying
         More likely to occur online than in person
     s
         (42% of students have been bullied)
         Follows you around easier than in person
     s
         Avoid situations by
     s
         –   Being kind to others
         –   Don’t use ALL CAPS
         –   Don’t send messages when you are angry
         Let adults know when it happens (58% of
     s
         students have not told an adult when they’ve
         been bullied online)

*iSAFE America Student Assessment, 2004
Don’t be afraid to talk
  Your parents care
s
s Involve them with your “online” life
s Let them know if you run into things
  that make you feel scared and
  comfortable
s Always get permission first
Putting up your guards
  Free Stuff
s
s Attachments
s Online Protection
“Free Stuff”
  Nothing is free on the Internet
s
s Your personal information is usually at
  risk
s Could be hidden costs that follow you
  for a long time
Attachments
    Added parts to the email
s
    May be legit stuff
s
    Could be a way for others to affect your
s
    computer with a virus or spyware
    Can be tricky and use people that you know
s
    (check in with them before you open
    attachments)
    Never open .exe attachments
s
    Watch out for links as well
s
Online Protection
    Get yourself Anti-Virus software
s
    –   AVG (free for home use)
    –   ClamAV (free for home use)
    –   Norton’s, McAfee ($)
    Get Adware and Spyware protection too
s
    –   Microsoft Defender
    –   Lavasoft
    –   Spybot
    Check with your ISP to see if they offer any
s
    online protection
    Update your software regularly and have it
s
    set to scan automatically
A Quick Online Safety Presentation

Weitere ähnliche Inhalte

Was ist angesagt?

Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for childrenAvanzo net
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateMarian Merritt
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kidsChris Burrows
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying caitlynx48
 

Was ist angesagt? (20)

Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety AdvocateCyberbullying by Marian Merritt, Norton Internet Safety Advocate
Cyberbullying by Marian Merritt, Norton Internet Safety Advocate
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 

Ähnlich wie A Quick Online Safety Presentation

The World Wide Web
The World Wide WebThe World Wide Web
The World Wide WebTony L
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For ParentsUNC-Greensboro
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social mediaChas Stephens
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsWebbed Marketing
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.pptNiravD3
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet SafetyEric Cedo
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentationSally Garza
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangersrangashree
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 

Ähnlich wie A Quick Online Safety Presentation (20)

The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social media
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
E-safety leaflet
E-safety leaflet E-safety leaflet
E-safety leaflet
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Kürzlich hochgeladen (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

A Quick Online Safety Presentation

  • 1. A Quick Online Safety Guide Grades 3-5
  • 2. Why? The Internet represents s – Great Opportunities – Greater Responsibilities – Greatest Chances for Dangerous Situations 19% of teens feel safer online than in the real world* s 39% of students trust people that they chat with s online* 24% of students say they see nothing with chatting s with a stranger* 10% of students have been asked to keep their s Internet relationship a secret* *iSAFE America Student Assessment, 2004
  • 3. Access Children between 8-18 use the s computer for more than an hour a day s 74% have a computer with Internet access* s 31% have high speed access (that number grows each year)* *The George Lucas Foundation, “Synching Up With The iKid”, Edutopia, October 2005.
  • 4. Types of People Who Use the Internet Responsible and Ethical s s Numbuts s Hotheads s Follow-You-Fionas s Oogles s Spamazoids
  • 5. Responsible and Ethical They know the s difference between right and wrong Wary of others s Never shares s personal information Has a good s password Has a life beyond s the computer
  • 6. Numbuts Doesn’t have any s friends Stays in their room s all day Lacks social skills s Talks in code s
  • 7. Hotheads They have a temper s They can lose s control of their temperature They say mean s things Photo courtesy of Netsmartzkids.org
  • 8. Follow-You-Fionas People who want to s be more than online friends Try to get personal s information May not be who s they say they are Trying to meet you s in person Photo courtesy of Netsmartzkids.org
  • 9. Oogles Trying to collect your s personal information Want to sell that s information to others Follow you around the s Internet They are sneaky may s want to give you “free” stuff Photo courtesy of Netsmartzkids.org
  • 10. Spamazoids They send out annoying s message that clog email accounts You didn’t ask for these s messages May contain things that do s bad things to your computer Watch out for phishing s (looking for personal information through email, usually updating accounts that you may or may not have with legit companies) Photo courtesy of Netsmartzkids.org
  • 11. Your Personal Information Phone Number, Address, Age, Name, Parents’ s Name, School, Grade, Work Information, Passwords, Usernames, etc. Once you give it away you can never take it s back completely The only people you should trust with it are s your parents (not even your best friend) Avoid putting personal pictures of yourself s and friends online
  • 12. Usernames and Profiles Make them unique and generic s s Only provide the required information s Resist the temptation to revel personal information through usernames and profiles
  • 13. Passwords Your key to safety s s Make it strong – Use a mix of capital and lower case letters, numbers, and special characters – Make it at least 8 characters long – Don’t use words or names Change it on a regular basis s
  • 14. Online Friends Let them be just that s s Don’t meet people you only know from being online with them s You have no idea who the person is on the other computer s Online only friends are still strangers
  • 15. Cyber-bullying More likely to occur online than in person s (42% of students have been bullied) Follows you around easier than in person s Avoid situations by s – Being kind to others – Don’t use ALL CAPS – Don’t send messages when you are angry Let adults know when it happens (58% of s students have not told an adult when they’ve been bullied online) *iSAFE America Student Assessment, 2004
  • 16. Don’t be afraid to talk Your parents care s s Involve them with your “online” life s Let them know if you run into things that make you feel scared and comfortable s Always get permission first
  • 17. Putting up your guards Free Stuff s s Attachments s Online Protection
  • 18. “Free Stuff” Nothing is free on the Internet s s Your personal information is usually at risk s Could be hidden costs that follow you for a long time
  • 19. Attachments Added parts to the email s May be legit stuff s Could be a way for others to affect your s computer with a virus or spyware Can be tricky and use people that you know s (check in with them before you open attachments) Never open .exe attachments s Watch out for links as well s
  • 20. Online Protection Get yourself Anti-Virus software s – AVG (free for home use) – ClamAV (free for home use) – Norton’s, McAfee ($) Get Adware and Spyware protection too s – Microsoft Defender – Lavasoft – Spybot Check with your ISP to see if they offer any s online protection Update your software regularly and have it s set to scan automatically