SlideShare ist ein Scribd-Unternehmen logo
1 von 21
A Quick Online Safety Guide
         Grades 3-5
Why?
         The Internet represents
     s
         –   Great Opportunities
         –   Greater Responsibilities
         –   Greatest Chances for Dangerous Situations
         19% of teens feel safer online than in the real world*
     s
         39% of students trust people that they chat with
     s
         online*
         24% of students say they see nothing with chatting
     s
         with a stranger*
         10% of students have been asked to keep their
     s
         Internet relationship a secret*

*iSAFE America Student Assessment, 2004
Access
        Children between 8-18 use the
      s
        computer for more than an hour a day
      s 74% have a computer with Internet
        access*
      s 31% have high speed access (that
        number grows each year)*



*The George Lucas Foundation, “Synching Up With The iKid”, Edutopia, October 2005.
Types of People Who
       Use the Internet
  Responsible and Ethical
s
s Numbuts
s Hotheads
s Follow-You-Fionas
s Oogles
s Spamazoids
Responsible and
          Ethical
    They know the
s
    difference between
    right and wrong
    Wary of others
s
    Never shares
s
    personal information
    Has a good
s
    password
    Has a life beyond
s
    the computer
Numbuts
              Doesn’t have any
          s
              friends
              Stays in their room
          s
              all day
              Lacks social skills
          s
              Talks in code
          s
Hotheads
        They have a temper
    s
        They can lose
    s
        control of their
        temperature
        They say mean
    s
        things




Photo courtesy of Netsmartzkids.org
Follow-You-Fionas
                                          People who want to
                                      s
                                          be more than online
                                          friends
                                          Try to get personal
                                      s
                                          information
                                          May not be who
                                      s
                                          they say they are
                                          Trying to meet you
                                      s
                                          in person


Photo courtesy of Netsmartzkids.org
Oogles
                                          Trying to collect your
                                      s
                                          personal information
                                          Want to sell that
                                      s
                                          information to others
                                          Follow you around the
                                      s
                                          Internet
                                          They are sneaky may
                                      s
                                          want to give you “free”
                                          stuff




Photo courtesy of Netsmartzkids.org
Spamazoids
        They send out annoying
    s
        message that clog email
        accounts
        You didn’t ask for these
    s
        messages
        May contain things that do
    s
        bad things to your computer
        Watch out for phishing
    s
        (looking for personal
        information through email,
        usually updating accounts
        that you may or may not
        have with legit companies)
Photo courtesy of Netsmartzkids.org
Your Personal
          Information
    Phone Number, Address, Age, Name, Parents’
s
    Name, School, Grade, Work Information,
    Passwords, Usernames, etc.
    Once you give it away you can never take it
s
    back completely
    The only people you should trust with it are
s
    your parents (not even your best friend)
    Avoid putting personal pictures of yourself
s
    and friends online
Usernames and
       Profiles
  Make them unique and generic
s
s Only provide the required information
s Resist the temptation to revel personal
  information through usernames and
  profiles
Passwords
  Your key to safety
s
s Make it strong
    – Use a mix of capital and lower case letters,
      numbers, and special characters
    – Make it at least 8 characters long
    – Don’t use words or names
    Change it on a regular basis
s
Online Friends
  Let them be just that
s
s Don’t meet people you only know from
  being online with them
s You have no idea who the person is on
  the other computer
s Online only friends are still strangers
Cyber-bullying
         More likely to occur online than in person
     s
         (42% of students have been bullied)
         Follows you around easier than in person
     s
         Avoid situations by
     s
         –   Being kind to others
         –   Don’t use ALL CAPS
         –   Don’t send messages when you are angry
         Let adults know when it happens (58% of
     s
         students have not told an adult when they’ve
         been bullied online)

*iSAFE America Student Assessment, 2004
Don’t be afraid to talk
  Your parents care
s
s Involve them with your “online” life
s Let them know if you run into things
  that make you feel scared and
  comfortable
s Always get permission first
Putting up your guards
  Free Stuff
s
s Attachments
s Online Protection
“Free Stuff”
  Nothing is free on the Internet
s
s Your personal information is usually at
  risk
s Could be hidden costs that follow you
  for a long time
Attachments
    Added parts to the email
s
    May be legit stuff
s
    Could be a way for others to affect your
s
    computer with a virus or spyware
    Can be tricky and use people that you know
s
    (check in with them before you open
    attachments)
    Never open .exe attachments
s
    Watch out for links as well
s
Online Protection
    Get yourself Anti-Virus software
s
    –   AVG (free for home use)
    –   ClamAV (free for home use)
    –   Norton’s, McAfee ($)
    Get Adware and Spyware protection too
s
    –   Microsoft Defender
    –   Lavasoft
    –   Spybot
    Check with your ISP to see if they offer any
s
    online protection
    Update your software regularly and have it
s
    set to scan automatically
A Quick Online Safety Presentation

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
Ellie Simons
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
TeamBanana
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
ducklvr9
 

Was ist angesagt? (20)

Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cyber security for children
Cyber security for childrenCyber security for children
Cyber security for children
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Digital footprint powerpoint
Digital footprint powerpointDigital footprint powerpoint
Digital footprint powerpoint
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 

Ähnlich wie A Quick Online Safety Presentation

Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
UNC-Greensboro
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social media
Chas Stephens
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
Sally Garza
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
markkreiter
 

Ähnlich wie A Quick Online Safety Presentation (20)

The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Internet Safety For Parents
Internet Safety For ParentsInternet Safety For Parents
Internet Safety For Parents
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Safety on social media
Safety on social mediaSafety on social media
Safety on social media
 
Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Growing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in SchoolsGrowing Up Digital - Cyberbullying in Schools
Growing Up Digital - Cyberbullying in Schools
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Social media details.ppt
Social media details.pptSocial media details.ppt
Social media details.ppt
 
Youth Internet Safety
Youth Internet SafetyYouth Internet Safety
Youth Internet Safety
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
What is Cyberbullying presentation
What is Cyberbullying presentationWhat is Cyberbullying presentation
What is Cyberbullying presentation
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 
E-safety leaflet
E-safety leaflet E-safety leaflet
E-safety leaflet
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

A Quick Online Safety Presentation

  • 1. A Quick Online Safety Guide Grades 3-5
  • 2. Why? The Internet represents s – Great Opportunities – Greater Responsibilities – Greatest Chances for Dangerous Situations 19% of teens feel safer online than in the real world* s 39% of students trust people that they chat with s online* 24% of students say they see nothing with chatting s with a stranger* 10% of students have been asked to keep their s Internet relationship a secret* *iSAFE America Student Assessment, 2004
  • 3. Access Children between 8-18 use the s computer for more than an hour a day s 74% have a computer with Internet access* s 31% have high speed access (that number grows each year)* *The George Lucas Foundation, “Synching Up With The iKid”, Edutopia, October 2005.
  • 4. Types of People Who Use the Internet Responsible and Ethical s s Numbuts s Hotheads s Follow-You-Fionas s Oogles s Spamazoids
  • 5. Responsible and Ethical They know the s difference between right and wrong Wary of others s Never shares s personal information Has a good s password Has a life beyond s the computer
  • 6. Numbuts Doesn’t have any s friends Stays in their room s all day Lacks social skills s Talks in code s
  • 7. Hotheads They have a temper s They can lose s control of their temperature They say mean s things Photo courtesy of Netsmartzkids.org
  • 8. Follow-You-Fionas People who want to s be more than online friends Try to get personal s information May not be who s they say they are Trying to meet you s in person Photo courtesy of Netsmartzkids.org
  • 9. Oogles Trying to collect your s personal information Want to sell that s information to others Follow you around the s Internet They are sneaky may s want to give you “free” stuff Photo courtesy of Netsmartzkids.org
  • 10. Spamazoids They send out annoying s message that clog email accounts You didn’t ask for these s messages May contain things that do s bad things to your computer Watch out for phishing s (looking for personal information through email, usually updating accounts that you may or may not have with legit companies) Photo courtesy of Netsmartzkids.org
  • 11. Your Personal Information Phone Number, Address, Age, Name, Parents’ s Name, School, Grade, Work Information, Passwords, Usernames, etc. Once you give it away you can never take it s back completely The only people you should trust with it are s your parents (not even your best friend) Avoid putting personal pictures of yourself s and friends online
  • 12. Usernames and Profiles Make them unique and generic s s Only provide the required information s Resist the temptation to revel personal information through usernames and profiles
  • 13. Passwords Your key to safety s s Make it strong – Use a mix of capital and lower case letters, numbers, and special characters – Make it at least 8 characters long – Don’t use words or names Change it on a regular basis s
  • 14. Online Friends Let them be just that s s Don’t meet people you only know from being online with them s You have no idea who the person is on the other computer s Online only friends are still strangers
  • 15. Cyber-bullying More likely to occur online than in person s (42% of students have been bullied) Follows you around easier than in person s Avoid situations by s – Being kind to others – Don’t use ALL CAPS – Don’t send messages when you are angry Let adults know when it happens (58% of s students have not told an adult when they’ve been bullied online) *iSAFE America Student Assessment, 2004
  • 16. Don’t be afraid to talk Your parents care s s Involve them with your “online” life s Let them know if you run into things that make you feel scared and comfortable s Always get permission first
  • 17. Putting up your guards Free Stuff s s Attachments s Online Protection
  • 18. “Free Stuff” Nothing is free on the Internet s s Your personal information is usually at risk s Could be hidden costs that follow you for a long time
  • 19. Attachments Added parts to the email s May be legit stuff s Could be a way for others to affect your s computer with a virus or spyware Can be tricky and use people that you know s (check in with them before you open attachments) Never open .exe attachments s Watch out for links as well s
  • 20. Online Protection Get yourself Anti-Virus software s – AVG (free for home use) – ClamAV (free for home use) – Norton’s, McAfee ($) Get Adware and Spyware protection too s – Microsoft Defender – Lavasoft – Spybot Check with your ISP to see if they offer any s online protection Update your software regularly and have it s set to scan automatically