How To Teach Kids To Be Safe Online
|
|
- Jason Owen
- 3 years ago
- Views:
Transcription
1 McAfee, an Intel company, is the world's largest dedicated security technology company. We are relentlessly focused on finding new ways to keep our customers and our communities safe, and especially our most vulnerable population, children. In order to do that, McAfee has partnered with the Department of Homeland Security, the National Cyber Security Alliance, the Anti-Phishing Working Group, and other organizations to develop curriculum aimed at helping kids understand how to stay safe and act responsibly online. Through McAfee Cares Online Safety for Kids, McAfee empowers its employees to volunteer in communities where they live and work to deliver these important messages to school-aged kids. One critical component of the Online Safety for Kids program is to educate parents on some of the risks that kids of all ages may encounter online, as well as offer some tips on how to help keep them safe as they use the Internet. 1
2 The primary message delivered in our Online Safety for Kids program is based on three pillars. They are: Cyber-security = Keeping your devices and information safe Cyber-safety = Keeping yourself safe Cyber-ethics = Acting responsibly and keeping the web a safer place for everybody By exploring these three key areas, students will learn the importance of making good decisions online. The core message we are promoting is STOP.THINK.CONNECT. 2
3 Just like you taught your children to stop, look and listen before crossing the street, they should take similar precautions when connecting to the Internet. Any time kids are about to go online, they need to make sure they re avoiding putting themselves or their personal information (as well as that of their family) at risk. In order to do that, it s important to: Stop Before using the Internet, take time to understand the risks and learn how to spot potential problems. Think Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how your actions online could impact your safety, or your family s. Connect Enjoy the Internet with greater confidence, knowing you ve taken the right steps to safeguard yourself and your computer. 3
4 Just like you taught your children to stop, look and listen before crossing the street, they should take similar precautions when connecting to the Internet. Any time kids are about to go online, they need to make sure they re avoiding putting themselves or their personal information (as well as that of their family) at risk. In order to do that, it s important to: Stop Before using the Internet, take time to understand the risks and learn how to spot potential problems. Think Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how your actions online could impact your safety, or your family s. Connect Enjoy the Internet with greater confidence, knowing you ve taken the right steps to safeguard yourself and your computer. 4
5 Just like you taught your children to stop, look and listen before crossing the street, they should take similar precautions when connecting to the Internet. Any time kids are about to go online, they need to make sure they re avoiding putting themselves or their personal information (as well as that of their family) at risk. In order to do that, it s important to: Stop Before using the Internet, take time to understand the risks and learn how to spot potential problems. Think Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how your actions online could impact your safety, or your family s. Connect Enjoy the Internet with greater confidence, knowing you ve taken the right steps to safeguard yourself and your computer. 5
6 [Possible discussion questions: ] What are the top three reasons your kids use the Internet? (Examples: homework, social networking, research, music, gaming, etc.) What are some websites that your kids visit regularly? What is your biggest concern about your kids online activity? We used to need a computer and phone line to use the Internet, but today we connect wirelessly via gaming systems like Nintendo DS, PlayStation 3, Xbox Live, as well as tablets, smartphones, and even some television sets. It s important for you to understand the capabilities that each of these devices has, so that you can be proactive in the ways you look after your children s safety. 6
7 [Possible discussion questions: ] What are the top three reasons your kids use the Internet? (Examples: homework, social networking, research, music, gaming, etc.) What are some websites that your kids visit regularly? What is your biggest concern about your kids online activity? We used to need a computer and phone line to use the Internet, but today we connect wirelessly via gaming systems like Nintendo DS, PlayStation 3, Xbox Live, as well as tablets, smartphones, and even some television sets. It s important for you to understand the capabilities that each of these devices has, so that you can be proactive in the ways you look after your children s safety. 7
8 Kids today were born into this digital world. They are what we call digital natives. Adults, on the other hand, are digital immigrants, and we have had to adopt these new technologies. The Internet has been referred to as the Wild Wild Web because it is a wide open territory where anything can happen. As kids navigate this environment, they can accidentally (or intentionally) visit risky sites. McAfee conducted a U.S. study in May 2012 called The Digital Divide, which revealed that 48% of parents believe that their teens tell them everything they do online. In contrast, 71% of teens reported having hidden their online activities from their parents at some point. The term digital divide refers to the disconnect between what parents believe their kids are doing online, and what they actually are doing. We ll explore what some of those behaviors are in a few minutes, but, first, let s take a look at what is at stake for our children. 8
9 Computers can create a feeling of anonymity, and we are more likely to do things online that we wouldn t even consider in real life. One in five teens reported ending a friendship because of something that happened online. What starts out in the school yard no longer stays there. When school ends, aggressive online behaviors cyberbullying -- continue denying kids of the refuge they would normally find at home. Shoplifting is an obvious crime, yet almost one third of teens reported pirating movies and music on the Internet. While a majority of kids would not consider cheating in front of a teacher, almost half of teens reported looking up test answers on the Internet. Cheating, bullying and stealing aren t new issues, but even kids who wouldn t normally engage in these behaviors might be tempted to do so online. 9
10 Another big concern is that many teens are accessing inappropriate content online. Nearly half of kids have stumbled across pornography through sources like online ads, spam and Facebook while one-third of teens admit to accessing porn intentionally. Less common, but more frightening, is the fact that one in ten teens reported meeting someone in person that they only knew online. 10
11 In this same study, McAfee identified different ways in which teenagers hide their behavior online. Let s take a minute to read through a few of them. Why do you think so many kids are hiding their behavior? [Take a few parent responses.] If your child is clearing the browsing history on your computer, or hiding online activities, it may be because he or she is too embarrassed or ashamed to talk to you about it. Opening up the lines of communication, and letting kids know about the risks to their safety (not to mention the risks to the digital devices they love) may persuade them to be more accountable for their actions on the Internet. 11
12 In order to teach our kids how to keep their devices and personal information safe, we need to first discuss some of the most common types of malware (malicious software) that they might encounter while traveling the world wide web. 12
13 What are the security risks to your digital devices? We saw several examples in the video we watched earlier, but what are they, really? Viruses Viruses are malicious programs capable of attaching to disks or other files that then replicate repeatedly, typically without user knowledge or permission. Some viruses can cause major damage to data and computer systems, and can spread from one system to another via , file sharing platforms and USB drives. Spyware These are unwanted programs that exploit infected computers for commercial gain. Some forms of spyware, such as keyloggers, run in the background on your system and record your keystrokes to gather personal information. You might not even know your computer is infected, which is why it s important have up-to-date anti-spyware software installed on your computer. Phishing/pharming Imagine the online bad guys throwing out virtual bait (such as a Pop-Up Ad for a free ipad or game) to get you to enter personal information (such as your name, address or credit card information). This information might then be used to hack into your online accounts, steal your financial assets or spread malware to other computers that connect to yours. Let s take a closer look at each of these types of threats. 13
14 One common type of phishing is the pop-up ad, which is designed to entice you to connect so that cybercriminals can take advantage of you in any one of several ways: Downloading malware onto your computer Taking you to a malicious website Getting you to share personal information. It s important to remind kids that if something seems too good to be true, it probably is! They should never click on pop-up ads not even to close them. Here are some tips to closing pop-up ads safely and securely. 14
15 To safely close a pop-up: On a PC, hold down the Alt key and press F4. For Mac users, hold down the Command key and press W. 15
16 Here s an example of spyware from the video we watched earlier. Jennifer checks her Facebook before school, and starts surfing on the Internet. What she doesn t realize is that when she searches for her favorite celebrity, she actually downloads a keylogger as well. Keylogger also called key logging and keystroke logging, is malware that usually runs hidden in the background of your computer automatically recording all keystrokes, including user names and passwords. Users are typically unaware of its presence. Here s a great tip to safe searching on the Internet: at McAfee we offer a free software product called Site Advisor. It let s you know BEFORE you go to a website if it s a threat to your computer s security by showing you a green, yellow, or red light. How does Site Advisor work? Each day, thousands of times a day, McAfee visits websites and tests them for a comprehensive set of security threats. From annoying pop-ups to back door Trojans that can steal your identity, we find the danger zones before you stumble on them. 16
17 When multiple computers have been infected with malware, they can create something called a botnet. As such, these computers can be controlled by cybercriminals sending out spam and viruses to other computers on the Internet essentially turning them into zombies. Something as simple as opening an infected attachment containing malware can turn a computer into a zombie. Once YOUR computer is infected, you can spread malware to all of your contacts. Safety Tip: NEVER open suspicious attachments. If the attachment is from someone you know, ask that person if it s safe to open. 17
18 It s critical to keep mobile devices secure, especially with all of the information we store on our mobile devices, such as pictures, contacts, texts, s, personal and financial information. We could be putting ourselves and our family members at risk if a phone ends up in the wrong hands. Here are some tips to help keep this sensitive information private: Always use a complex security passcode to lock a mobile device and help your children understand how important it is to keep it private. Remind them to log out of games and accounts like and Facebook and to never leave their device unattended. Keep in mind, there is anti-virus security software available for mobile devices. 18
19 One way to safeguard your personal information is to create secure passwords. Here are tips to creating safe, strong passwords: Mix upper and lower case letters, Include numbers and special characters, Make sure your password is at least 8 characters long, and Update/change them regularly. 19
20 Our kids are the first generation to grow up with hands-on access to the entire world via the Internet. With that access comes expanded risk. Helping our kids to develop good decision-making skills with regard to the Internet is critical to their safety and that process needs to start as soon as they are old enough to connect for the first time. 20
21 When we were growing up, the word friend had a much different meaning than it has with kids today. Today s social environments are the new playgrounds and kids are making friends with total strangers who may, or may not, be who they say the are. 92% of youth have at least one social media account. (McAfee Digital Deception study, June 2013) Because of this, it s important to explain to children from a very early age that people they meet online are STRANGERS, not friends. * Set parental controls: Sites like Club Penguin, Toontown and Webkinz are intended for younger children, but parents have to proactively go into their child s account and set privacy preferences because most of these websites default to open settings. * Read End User License Agreement: While some websites and apps like Facebook, Instagram and Keek, require that kids be 13 or older to create an account, many kids bypass these rules with fake birthdays. As a result, children may be exposed to inappropriate content. * Beware of posting TMI - Kids need to understand that if they reveal too much information about their personal lives (such as their full name, school, address, location, etc.) it could lead to problems like susceptibility to cyberbullies, online predators, invasion of privacy, and identity theft. 21
22 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 22
23 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 23
24 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 24
25 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 25
26 Here s an example of what can happen when someone shares too much information online. In this scenario, a child shares a picture of herself that she thinks is funny with four of her best friends. <Click > They think it s funny too and they can t resist sending it to a few more of their friends <Click for more faces> who send it to a few of their friends <Click for more faces> and so on <Click for more faces> and so forth. <Click for more faces> Eventually, the private picture has been sent to hundreds of people like her teachers, parents, and even strangers. Even if the girl tries to delete this picture from her device, it s too late it has already been forwarded, saved and possibly even altered. Kids need to understand that anything they post or send over the Internet (photos, messages, or personal information) is there forever even if they try to delete it. 26
27 Here s the cover of a popular teen magazine, promoting tips on sexting (the act of sending sexually explicit messages and/or photographs). Sexting is rampant among youth today and carries serious legal consequences including charges for distribution of child pornography. Children must be encouraged to take charge of their own online presence and reputation. Once a picture (or text, post, , etc.) is sent over the Internet, it leaves a digital footprint forever. 27
28 Most phones and cameras today have a feature that geotags photos by embedding the GPS coordinates of the location where you took the picture. Why is this a concern? If you take a picture in your home or at school and post it, anyone can figure out exactly where you are in that picture if your geotag feature isn t disabled potentially leading cybercriminals to your front door. Check your phone s manual for instructions on how to disable the geotag setting. 28
29 Keep in mind, even after disabling the geotag feature on your devices, you still need to be very careful about what you post. For example, in this picture the name of the school is visible on the wall behind the students. A simple Google search on the school s name can provide not only an address, but also a map that shows where these students are approximately eight hours a day. Introduce these safety tips when kids are young, and reinforce them frequently so that when they are old enough to use social networks, they re prepared to use them safely. Things to avoid: Photos taken in school uniform or school sweatshirt Displaying home address or license plate numbers 29
30 It s imperative to teach children that just like in real life, they must treat others online the way that they would like to be treated. We call this cyberethics. 30
31 When school children leave campus, they don t necessarily leave their classmates and their conflicts behind. Using computers and cell phones, students can be in touch with each other at all times and they may abuse this technology to pester, bully, and harm others. Rumors, embarrassing messages and pictures circulate MUCH more quickly than any playground rumor. Here are just a few warning signs that indicate your child might be a victim of cyberbullying: Being ill at ease when receiving an , IM, or text message Feeling upset after using the computer Refusing to leave the house or go to school Withdrawing from friends and family 31
32 Depending upon where you live, consequences for the BULLY range from being blocked from school sports and activities, to suspension or expulsion, to arrest and jail time. You as parents can also be sued for damages resulting from cyber bullying. Consequences for the victim may include anxiety, depression, fear, loneliness, low selfesteem, drop in academic achievement, serious long-term health issues, and injury. 32
33 Depending upon where you live, consequences for the BULLY range from being blocked from school sports and activities, to suspension or expulsion, to arrest and jail time. You as parents can also be sued for damages resulting from cyber bullying. Consequences for the victim may include anxiety, depression, fear, loneliness, low selfesteem, drop in academic achievement, serious long-term health issues, and injury. 33
34 Teach your kids that if they receive a mean or inappropriate text, post, , or photo they should STOP correspondence with the bully, and NOT respond or forward, BLOCK that person from being able to communicate with them, TELL a parent, teacher, or other trusted adult. 34
35 Teach your kids that if they receive a mean or inappropriate text, post, , or photo they should STOP correspondence with the bully, and NOT respond or forward, BLOCK that person from being able to communicate with them, TELL a parent, teacher, or other trusted adult. 35
36 Teach your kids that if they receive a mean or inappropriate text, post, , or photo they should STOP correspondence with the bully, and NOT respond or forward, BLOCK that person from being able to communicate with them, TELL a parent, teacher, or other trusted adult. 36
37 Part of teaching your kids to be responsible cybercitizens is to point out the real-life consequences of their online behavior. Remind them that if they wouldn t do something in person, they shouldn t do it online. <click to go through 5 examples> Reinforce the message that all of these things are illegal and have serious consequences. 37
38 Here s a real-life example of a serious consequence for stealing music some of you may have heard about it. This student from Boston University lost a lawsuit for downloading 30 songs. In May, 2012, the Supreme Court upheld the very stiff penalty. This college student could have purchased the music for about $30, but will end up paying over half a million dollars. 38
39 Thank you for being here today to discuss Online Safety for Kids. You have already taken a big step in helping to insure your family s online safety and security. We encourage you and your family to create your own Online Action Plan. In the meantime, here is a recap of steps you can take immediately to help safeguard your family. <Click to review steps listed on the slide.> Create complex passwords Keep devices in open high-traffic areas Disable geotagging Keep personal information private and NEVER share passwords Be careful about what you post online. Remember, anything you post online is there forever, even if you try to delete it. Use parental controls to block, filter and monitor content Keep a clean machine Make sure to use up-to-date, comprehensive security software Download SiteAdvisor which is a free tool from McAfee that provides website safety ratings For more information, and for links to additional resources, please visit For a fun, interactive way for kids 13 and under to learn about online safety, visit [Everloop is a fun, monitored/filtered online environment for kids ages 13 and under which complies with U.S. child privacy laws. Children can visit the McAfee loop and engage in activities without becoming an Everloop member, however, membership is required to enter Everloop and experience full functionality. Children cannot become members without parent permission validated by a $1.00 account transaction.] Questions? 39
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationNational Cybersecurity Awareness Campaign. Kids Presentation
National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help
More informationFAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:
FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful
More informationSarah Smythe Youth Community Developer Western Ottawa Community Resource Centre. Genevieve Hupe School Resource Officer Ottawa Police Service
Sarah Smythe Youth Community Developer Western Ottawa Community Resource Centre Genevieve Hupe School Resource Officer Ottawa Police Service From the choices below, which screen name is the worst for
More informationHOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationCyber safety Parent Easy Guide 63
Cyber safety Parent Easy Guide 63 The online world is part of everyday life for many children and young people. It is a huge virtual playground where they can play, learn and socialise. It can be accessed
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationGuideline on Windows 7 Parental Controls
CMSGu2012-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Windows 7 Parental Controls National Computer Board Mauritius
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationNational Cybersecurity Awareness Campaign Families Presentation
National Cybersecurity Awareness Campaign Families Presentation About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationOnly talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationE-Safety Issues and Online Safety
E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and
More informationSaheel KHOYRATTY. Partner Technology Advisor
Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment
More informationInternet Safety Plan for Your Family
The Mcafee 10-Step Internet Safety Plan for Your Family How to talk to kids, tweens, teens, and novices of any age about online security 10 Table of Contents 3 Introduction 4 5 Today s Internet: Proceed
More informationInternet Safety Guidelines
Internet Safety Guidelines Clear, simple, easy-to-read house rules should be posted on or near the monitor. Create your own computer rules or search for an Internet safety pledge you like. The pledge can
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationE-Safety Issues and Online Safety. Parents Evening
E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children
More informationOnline Safety for Middle and High School
Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET
More informationThe Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
More informationActivities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
More informationguide to staying safe online How to shop, bank, socialise and protect your identity online.
THE Mcafee guide to staying safe online How to shop, bank, socialise and protect your identity online. contents 1 Introduction 2 Today s Internet: Proceed with Caution 3 Consider the Upsides 4 Be Aware
More informationSafety Tips for Social Networking
Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and
More informationDIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS
DIGITAL DECEPTION: THE ONLINE BEHAVIOUR OF TEENS Foreword We love technology, and with good reason. It offers so much to the home in terms of entertainment, education, as well improving the functionality
More informationAffirmative Action Presentation
Affirmative Action Presentation Woodbridge Township School District A Guide to Social Media, Schools, and the Law. Woodbridge Township School District Staff Development 2012-2013 To provide school personnel,
More informationCybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
More informationIntroduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
More informationA Parents' Guide to. Snapchat. 2013 ConnectSafely.org
A Parents' Guide to Snapchat 2013 ConnectSafely.org Top 5 Questions Parents Have About Snapchat 1. Why do kids love Snapchat? They love the spontaneity of it. It s been (rightfully) drummed into their
More informationBE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
More informationSocial Networking Sites like Facebook, MSN
Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and
More informationAppropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness
Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger
More informationSocial Networking Sites A Predator s Playground?
Social Networking Sites A Predator s Playground? Posting too much information on social networking sites may be dangerous. A new craze is spreading among teens across the nation and it s growing with every
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informationInternet Safety & Awareness. Dan Tomlinson 02/23/2013
Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer
More informationYOUNG PEOPLE, MUSIC & THE INTERNET
YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationCyber-Safety Keeping Australians Safe Online
Cyber-Safety Keeping Australians Safe Online AIMIA Digital Policy Group DIGITAL POLICY GROUP Contents DIGITAL POLICY GROUP Facebook 2 Google 4 Yahoo!7 8 ebay 10 Summary 12 Key Contacts 12 Millions of people
More informationTechnology Acceptable Use Policy
Technology Acceptable Use Policy Introduction San Gabriel Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate, and develop
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationWhat you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
More informationA Parents Guide to. 2014 ConnectSafely.org
A Parents Guide to 2014 ConnectSafely.org Parenting in the age of social media can be tricky. Australians are amongst the highest users of social media in the world, averaging 22 hours per week per person.
More informationNorton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.
Norton 360 Our ultimate protection, now even more so. Introducing the new Norton 360. Our ultimate Internet and antivirus protection for all you do online Provides proactive protection, so you can do what
More informationA Parents' Guide to Cybersecurity
A Parents' Guide to Cybersecurity In partnership with Top 5 Questions Parents Have About Cybersecurity 1.What are the biggest security threats to kids? Children and teens can be caught by the same kinds
More informationPractical tips for a. Safe Christmas
Practical tips for a Safe Christmas CONTENTS 1. Online shopping 2 2. Online games 4 3. Instant messaging and mail 5 4. Practical tips for a safe digital Christmas 6 The Christmas holidays normally see
More informationUNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET
UNDERSTANDING YOUR ONLINE FOOTPRINTS: HOW TO PROTECT YOUR PERSONAL INFORMATION ON THE INTERNET SPEAKING NOTES FOR GRADES 4 TO 6 PRESENTATION SLIDE (1) Title Slide SLIDE (2) Key Points It can be really
More informationNET CETERA Chatting with Kids About Being Online
NET CETERA Chatting with Kids About Being Online People of all ages are: connecting with friends and family online Communicating online is a way of life, yet it comes with certain risks: Inappropriate
More informationParents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.
Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications
More informationFireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at www.ikeepsafe.org/fbo.]
1 Fireside Script INTRO MODERATOR: ALL DIGITAL PRODUCTS LIKE IPODS, CELL PHONES, COMPUTERS, WEBCAMS, DIGITAL CAMERAS AND GAME CONSOLES CONNECT TO WEB 2.0, WHICH ALLOWS US TO UPLOAD AND DOWNLOAD INFORMATION.
More informationClass 3: Identify Tricks and Scams Online
Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices
More informationOverexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12
Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12 Essential Question: What are the risks and responsibilities when you share online in a relationship? How can you respect
More informationYouth Online Behavior
Youth Online Behavior Created by: Andrea Pieters, Project Researcher, Youth and Education Christine Krupin, Project Researcher, Youth and Education June 1, 2010 Harris Interactive 6/21/2010 1 Methodology
More informationi-safe America Internet Safety Tips for Parents
i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and
More informationSOCIAL NETWORKING SITES
YOUNG PEOPLE AND SOCIAL NETWORKING SITES A GUIDE FOR PARENTS, CARERS & TEACHERS ABOUT SOCIAL NETWORKING SITES Social networking sites such as Facebook, MySpace and Twitter, are very popular with children,
More informationA Parents Guide to. 2015 ConnectSafely.org saferinternet.org.uk
A Parents Guide to 2015 ConnectSafely.org saferinternet.org.uk At the UK Safer Internet Centre, one of our key objectives is to develop new educational and awareness-raising resources for parents in the
More informationplatforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
More information15 Dangerous Apps Every Parent Should Know About
15 Dangerous Apps Every Parent Should Know About It s safe to say that the advent of the digital age and specifically the Internet, smartphones and social media have brought unique and daunting challenges
More informationToday s teens use technology more than ever. Most have
Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social
More informationHint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:
Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check
More informationWISE Online: An Internet and Mobile Phone Guide. http://esafety.ngfl-cymru.org.uk
WISE Online: An Internet and Mobile Phone Guide http://esafety.ngfl-cymru.org.uk File sharing and Copyright Everyone loves to file share to get music files. But here are some points to take note of: Downloading
More informationCyber Safety For Parents
Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting
More informationReport on Consumer Behaviors and Perceptions of Mobile Security. Presented by NQ Mobile & NCSA January 25, 2012
Report on Consumer Behaviors and Perceptions of Mobile Security Presented by NQ Mobile & NCSA January 25, 2012 Methodology Online survey of 1,158 consumers. Participants had to own a smartphone. Respondents
More informationA Publication of the GCPS Information Management Division
GCPS A Publication of the GCPS Information Management Division Gwinnett County Public Schools is committed to providing information related to student technology use in a manner that is clear, concise,
More informationHow Do People Use Security in the Home
How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology Kaarlo.Lahtela@hut.fi Abstract This paper investigates home security. How much people know about security and how
More informationToday s mobile ecosystem means shared responsibility
It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has
More informationDefense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
More informationThe Online Generation Gap. Contrasting attitudes and behaviors of parents and teens
The Online Generation Gap Contrasting attitudes and behaviors of parents and teens The Online Generation Gap: Contrasting attitudes and behaviors of parents and teens Submitted to: The Family Online Safety
More informationCyber Safety for Parent Involvement Council. Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction
Cyber Safety for Parent Involvement Council Sandi Paul Director of Technology Edward Aguiles Director of Curriculum and Instruction Topics for Presentation Parent Habits Poll Everywhere quiz Stats on actual
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationThis document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.
This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet. Hft Safeguarding Group commissioned a member of Hft National
More informationStaying Safe Online. A Practical Guide for Parents and Children.
Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively
More informationFront Range Christian School ipad Acceptable Use Policy
Introduction Front Range Christian School ipad Acceptable Use Policy Front Range Christian School recognizes that access to technology in school gives students greater opportunities to learn, engage, communicate,
More informationIT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE. Part I: Reducing Employee and Application Risks
IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part I: Reducing Employee and Application Risks As corporate networks increase in complexity, keeping them secure is more challenging. With employees
More informationWho Needs Parental Controls?
A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings From A National Survey Among Parents Supported by: A Survey Of Awareness, Attitudes, And Use Of Online Parental Controls Findings
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationSCRIPT FOR OUTREACH. Disconnected and Cyber Predators. Introduction. How many of you have your own cell phones or smart phone?
SCRIPT FOR OUTREACH Disconnected and Cyber Predators Introduction Hello! How is everyone doing today? My name is and I am here with some friends of mine from the American Bar Association Young Lawyers
More informationCyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
More informationDigital Citizenship Lesson
Digital Citizenship Lesson Categories: School Environment and Student Behavior/ Student Life Outside of School Environment Element: Digital Security Lesson: Malware Grade Level: 6-12 Part I Introduction
More informationMarlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
More informationHow To Avoid The Identity Theft Predators
Camp Watwuzithinkin How To Avoid The Identity Theft Predators Predator 0 An organism that lives by preying on other organisms Identity Thief 0 A person who makes a living by preying on other people Outsmart
More informationSTOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the
More informationDigital Safety and Privacy
Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationDallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences
Dallas Police Department Computer Crimes Unit Cyber-Bullying Sexting And Criminal Consequences Prepared by Detective Russell Stephens Computer Crimes Unit Dallas Police Department 214-671-3545 Cyber-bullying
More informationBritannica s Guide to e-safety
Britannica s Guide to e-safety Welcome to Britannica s guide to e-safety Here at Britannica we have long understood that while the internet opens up a whole new world of learning and discovery, it also
More informationComputer Security Maintenance Information and Self-Check Activities
Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.
More informationANDRA ZAHARIA MARCOM MANAGER
10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal
More informationCYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites. Mahwah Police Department Police Officer Rosario Zito
CYBER SAFETY Kids & Computers: Strategies on Cyberbullying and Personal Web Sites Mahwah Police Department Police Officer Rosario Zito What is IM? Yahoo! Messenger America Online Instant Messenger (AIM)
More informationTHE LITTLE BIG BOOK OF BADNESS
THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you
More informationA Parent s Guide to Social Networking Sites
A Parent s Guide to Social Networking Sites Five Lessons to Keep Your Kids Safe When They Socialize Online fa ye boo web mod. book.c club pe myspace facebook club peng.com yomo space webk yomod.com facebook
More informationCOMPUTERS & INTERNET SAFETY. Saint Francis Academy April 26, 2012
COMPUTERS & INTERNET SAFETY Saint Francis Academy April 26, 2012 HELLO! Mr. Michael Hoehl Pronounced Mr. Hale AGENDA Let s talk about the Internet! Challenges Trivia Safety Awareness Call to Action CHALLENGE
More information2014 Teen Internet Safety Survey. Conducted by The Futures Company
2014 Teen Internet Safety Survey Conducted by The Futures Company Contents Background, Objectives, Methodology Major Findings Important Trends Next Steps 2 Background + Objectives Cox s commitment to Online
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationCyberbullying: What Parents Can Do to Protect Their Children
Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,
More informationTWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY
TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message
More informationContact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
More information