SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
INTERNET SAFETY
Marjorie Renfrow
Marjorie.Renfrow@eagles.usm.edu
6/19/2014Internet Safety
2
GETTING STARTED
§ Look for a Lock for secure browsing
§ Use easy to remember passwords containing letters and numbers
§ Log out of websites completely when using shared computers
§ Assist children with internet searches and browsing
§ Use free or paid anti-virus software on a regular basis
6/19/2014
3
Internet Safety
LOOK FOR A LOCK
Secure browsing websites will place a
picture of a lock beside the URL in
addition to beginning with “https”
rather than “http.”
Never submit personal information to a
website that does not utilize these
devices as it can be easily interfered
with from outside forces.
Never submit credit card information,
social security numbers, usernames and
passwords to other accounts, or other
personal, private information to
websites without a lock!
6/19/2014Internet Safety
4
6/19/2014
5
Internet Safety
Passwords should contain both letters
and numbers.
Good passwords will have one or two
letters capitalized.
NEVER use the following words as
passwords as they are easily guessed by
hackers and internet intruders:
• Love
• God
• Password
• your name
• your birthdate
6/19/2014Internet Safety
6
Always remember to
completely sign out of any
and all applications you may
be using such as email, social
media websites, or any bill
paying sites you may visit to
avoid misuse of personal
information.
6/19/2014Internet Safety
7
Children should always be supervised
when using computers and accessing
the internet.
Some internet searches can produce
material or images no appropriate for
young children.
Many websites exist specifically for
children, but it can be very easy to
mistakenly click on an advertisement
which can take them away from the
approved website they were enjoying.
SEARCH ENGINES FOR KIDS
6/19/2014Internet Safety
8
INTERNET SECURITY
FREE PAID
6/19/2014Internet Safety
9
ANTI-VIRUS SOFTWARE
Anti-virus software can be free or paid subscription
There are many companies which produce and sell anti-virus software
Which ever product you choose, should be implemented monthly
Many products protect web browsers as well as whole computer
6/19/2014Internet Safety
10
THANK YOU FOR
VIEWING!
If you have any questions, please feel free to ask!
6/19/2014Internet Safety
11

Weitere ähnliche Inhalte

Was ist angesagt?

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
reidcollins42
 

Was ist angesagt? (20)

Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Cyber security
Cyber securityCyber security
Cyber security
 
OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Internet security
Internet securityInternet security
Internet security
 
Digital literacy & online safety
Digital literacy & online safety Digital literacy & online safety
Digital literacy & online safety
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Internet Safety Aisa
Internet Safety AisaInternet Safety Aisa
Internet Safety Aisa
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NETCP SON CANALS A GUIDE TO STAY SAFE ON THE NET
CP SON CANALS A GUIDE TO STAY SAFE ON THE NET
 

Andere mochten auch

Qualitative technologies
Qualitative technologiesQualitative technologies
Qualitative technologies
Carla Piper
 

Andere mochten auch (7)

Avc
AvcAvc
Avc
 
Qualitative technologies
Qualitative technologiesQualitative technologies
Qualitative technologies
 
552udl
552udl552udl
552udl
 
4 ways to prevent running injuries
4 ways to prevent running injuries4 ways to prevent running injuries
4 ways to prevent running injuries
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Ähnlich wie Renfrow Internet Safety

Ähnlich wie Renfrow Internet Safety (20)

Securityguide
SecurityguideSecurityguide
Securityguide
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Internet safety
Internet safetyInternet safety
Internet safety
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 

Kürzlich hochgeladen

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Renfrow Internet Safety

  • 3. GETTING STARTED § Look for a Lock for secure browsing § Use easy to remember passwords containing letters and numbers § Log out of websites completely when using shared computers § Assist children with internet searches and browsing § Use free or paid anti-virus software on a regular basis 6/19/2014 3 Internet Safety
  • 4. LOOK FOR A LOCK Secure browsing websites will place a picture of a lock beside the URL in addition to beginning with “https” rather than “http.” Never submit personal information to a website that does not utilize these devices as it can be easily interfered with from outside forces. Never submit credit card information, social security numbers, usernames and passwords to other accounts, or other personal, private information to websites without a lock! 6/19/2014Internet Safety 4
  • 5. 6/19/2014 5 Internet Safety Passwords should contain both letters and numbers. Good passwords will have one or two letters capitalized. NEVER use the following words as passwords as they are easily guessed by hackers and internet intruders: • Love • God • Password • your name • your birthdate
  • 6. 6/19/2014Internet Safety 6 Always remember to completely sign out of any and all applications you may be using such as email, social media websites, or any bill paying sites you may visit to avoid misuse of personal information.
  • 7. 6/19/2014Internet Safety 7 Children should always be supervised when using computers and accessing the internet. Some internet searches can produce material or images no appropriate for young children. Many websites exist specifically for children, but it can be very easy to mistakenly click on an advertisement which can take them away from the approved website they were enjoying.
  • 8. SEARCH ENGINES FOR KIDS 6/19/2014Internet Safety 8
  • 10. ANTI-VIRUS SOFTWARE Anti-virus software can be free or paid subscription There are many companies which produce and sell anti-virus software Which ever product you choose, should be implemented monthly Many products protect web browsers as well as whole computer 6/19/2014Internet Safety 10
  • 11. THANK YOU FOR VIEWING! If you have any questions, please feel free to ask! 6/19/2014Internet Safety 11