cyber safety. protect your identity choose screen names/logins that do not give you away choose...

Post on 18-Jan-2016

218 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cyber Safety

Protect Your Identity

Choose screen names/logins that do not give you away

Choose password that cannot be easily guessed

Do not give away any personal information: name, birth date, social security number, address, etc.

Separate your personal identity from your internet identity

Think before you put anything on the internet… Just like a tattoo,

your digital reputation is an expression of yourself.

Highly visible, and hard to remove

ESPECIALLY IF YOUR PROFILE IS PUBLIC!!!!!!!

Risks

Enemies Predators Accountability for your statements Result in legal or school discipline “Instant background checks” Really can’t know what’s true No reasonable expectation of privacy

Making Impressions

It is reported that predators call social networking sites their

“Virtual Shopping Catalog”

Refer their ‘friends’ to that profile

A Powerful tool for recruiters, employers, or schools… They can see: Your use of language.

(status/comments) What you do in your spare time.

(pictures) What your interests are. (about me) Who you associate with. (friends)

THEY CAN MAKE A JUDGEMENT OF YOUR CHARACTER!

What should you do…

Use intelligent design

Use Intelligent Design

Eliminate all identifying information Anything that allows you to be located Anything that pairs the profile to your

name Delete inappropriate information Read your information to determine

what impression it gives Your site may appeal to someone you

didn’t intend for it to impress

What should you do…

Choose appropriate photos Un-tag inappropriate photos Use appropriate language. Don’t “like” inappropriate things. Set good privacy settings!

Social Networking Tips

Set your site so that people can only be added as your friend if you approve it

Set your profile as private Check the additional setting, i.e.,

photos Know the sites privacy policy Use strong passwords Use anti virus protection

Predator Simulation

What can be found on a Facebook profile?

What can be found on an Instagram?

What we know so far… His name His girlfriend’s name His birth date He is from Moreland, Georgia His email addresses His AIM screen name His cell phone number His personal web page address The music he likes The movies and TV shows he likes to watch

Time: 2 minutes

We now know his student number We know what he drinks We know his favorite holidays We know his favorite sports teams We know his major We have learned even more

information about where he is from

Time: 1 minute Total Time: 3 minutes

What we know so far…

Parents’ names Their address Home phone number Parents’ ages

Time: 2 minutes Total Time: 5 minutes

What we know so far…

Map to their house Satellite image Local theaters

Time: 2 minutes Total Time: 7 minutes

What we know so far…

What should you do…

Protect your personal information Be cautious of people online that you

do not REALLY f2f know Realize the criminal risks of some

internet actions Remember people online are still

people…

Spread the Word…

Create a Flyer in Word that either tells your peers A. Protect your Identity B. Protect yourself from Predators

top related