SlideShare a Scribd company logo
The Missouri River Regional Library The Basics of Internet Safety
The Good Communication Information Entertainment Sharing Connecting
The Bad Spam Phishing Identity Theft Adware Spyware Pop-ups Flaming Stalking, harassment ,bullying
The Internet Can Seem Like a Scary Place http://www.flickr.com/photos/rling/438040809/
The Good News Last year your odds of becoming a cyber victim dropped  from 1 in 4 to 1 in 6  - stats from Consumer Reports, Sept 2008, pg 23
The Bad News your odds of becoming a victim are 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
Spam Unsolicited messages http://www.flickr.com/photos/grumbler/532250527/
True or False If I get unwanted email I should click on the “unsubscribe” link False!
Not just for email anymore E-mail spam,  Instant messaging  Blogs Wiki Mobile phone messaging  Internet forums Fax
Protection Email with a good filter –  email Don’t open spam -  email Get an email address just for use online -  email Turn on comment moderation –  blogs, wikis Turn comments off –  blogs, wikis, flickr Restriction access –  forums, blogs, wikis, flickr Limit who get’s your contact information –  email, IM, Fax, Text
Fishing? http://www.flickr.com/photos/peterhess/2682317551/
Not That Kind - Phishing The process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication -  http://en.wikipedia.org/wiki/Phishing
Protection Don’t access your accounts from an email link Don’t respond to fear tactics Know who the link is from Be suspicious of links from people you know Look for substitutions 0 for O, 1 for L or I, etc
Identity Theft your personal information is stolen and used without your knowledge to commit fraud or other crimes - http://www.ftc.gov/bcp/edu/microsites/idtheft/ http://www.flickr.com/photos/carbonnyc/57280104/
Protection Don’t download free software Don’t click on email links to log into accounts Use anti-virus software Use anti-spyware software Use a firewall https Credit reports Don’t send confidential information via email Use a complex password Use one credit card for online transactions – review the statements carefully
Adware Software that pops up advertisements on a user's computer. ads targeted to the individual user based on data collected from  key words entered in search engines and the types of Web sites visited.  - pc magazine http://www.flickr.com/photos/djm/17328024/
Spyware Software installed covertly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. -  http://en.wikipedia.org/wiki/Spyware http://www.flickr.com/photos/practicalowl/314989744/
Pop Ups A small window that is displayed on top of the existing windows on screen -pc magazine http://www.flickr.com/photos/paperghost/876640836/
Protection Don’t download free software Don’t click on pop-ups Don’t click on links from people you don’t know Be wary of links from people you do know Look for substitutions 0 for O, 1 for L or I, etc Anti-spyware software
Flaming Hostile and insulting interaction Usually occurs in the social context of a discussion board, chat or e-mail.  Attempt to assert authority or establish a position of superiority  Believes he or she carries the only valid opinion.  Personal attacks on those who disagree.  Wish to upset and offend other members of the forum  (trolls)  http://flickr.com/photos/cleaneugene/2438462422/
Protection Don’t feed the “trolls” Think twice, or three times  Count to ten Know and use proper netiquette  Trust your instincts Leave the situation
Stalking, Harassment, Bullying   The attacker harasses a victim using electronic communication, such as e-mail or instant messaging or messages posted to a Web site or a discussion group.  Relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. http://flickr.com/photos/blogjamdotorg/463043832/
Some examples Unwanted emails Unwanted Instant Messages Posting lies, hateful messages on discussion boards, blogs, forums etc Pose as the victim and send/post offensive comment, content or emails Fake photos Fake websites
Protection Don’t get involved in flame wars Don’t share personal information online Ignore taunts  Trust your instincts
If you are being stalked, bullied or harassed Save messages Screenshots Save screen name, email address, profiles, etc Block if possible Contact your Internet Service Provider Contact law enforcement
Predators Attempt to exploit  people, usually for sexual or financial purposes  http://flickr.com/photos/eldave/2037762175/
Protection Consider not posting a photo Limit what personal information you share Limit who can see your personal information Don’t talk to strangers Use a screen name that doesn’t reveal too much about you Trust your instincts
7 Online Blunders Assuming your security software is protecting you Accessing an account through an email link Using a single password for all online accounts Downloading free software Thinking your Mac shields you from all risks Clicking on a pop-up ad that says your pc is insecure Shopping online the way you do in stores - from Consumer Reports, Sept 2008 pg 26
More Resources http://besafe.more.net/ http://besafe.more.net/sam/resources.shtml http://www.wiredsafety.org/resources/powerpoint/cyberstalking_study.ppt . http://www.beverlypd.org/pdf/PERSONAL%20SAFETY/CYBERSTALKING.pdf http://www.fbi.gov/publications/pguide/pguidee.htm http://safekids.com/2008/03/18/safety-myths-and-web-20/ http://www.ftc.gov/bcp/edu/microsites/idtheft/ http://www.ftc.gov/bcp/conline/edcams/freereports/index.html https://www.annualcreditreport.com http://www.snopes.com/ http://besafe.more.net/ http://inobtr.org/Intro.aspx

More Related Content

PPT
Top Ten Ways to Shockproof Your Use of Social Media
PDF
31 Internet Security Tips on CyberSecurity Month Ocotober
PPTX
Internet safety
PDF
15 Security & Privacy Tips for Social Media Safety
PPT
Social Networking
PPT
Social Media Safety Presentation
PDF
Online Security
PDF
Social Media Safety
Top Ten Ways to Shockproof Your Use of Social Media
31 Internet Security Tips on CyberSecurity Month Ocotober
Internet safety
15 Security & Privacy Tips for Social Media Safety
Social Networking
Social Media Safety Presentation
Online Security
Social Media Safety

What's hot (19)

PDF
Social Media Safety Tips
PPT
School presentation
PDF
Pwned in high ed
PPT
Protecting your privacy online
PDF
Child safety 16 jun14
PPTX
L2 rules of netiquette
PPTX
Cyberbullying Investigation/Reporting/ Procedures
PPTX
Social Media Privacy
PPTX
Cyber safety
PPT
Internet safety for middles school
PDF
Social networking fraud handout june 2011
PPTX
Internet Safety
PPTX
eSmart Libraries cybersafety presentation june 2015
PPT
My Online Image
PPT
Becybersmart
PPTX
Internet Safety for Parents presentation 2017
PPTX
Social & mobile security
PPTX
Protecting your privacy online june 2012 tech tuesday
PPTX
Mark Rogers' Social Network Presentation
Social Media Safety Tips
School presentation
Pwned in high ed
Protecting your privacy online
Child safety 16 jun14
L2 rules of netiquette
Cyberbullying Investigation/Reporting/ Procedures
Social Media Privacy
Cyber safety
Internet safety for middles school
Social networking fraud handout june 2011
Internet Safety
eSmart Libraries cybersafety presentation june 2015
My Online Image
Becybersmart
Internet Safety for Parents presentation 2017
Social & mobile security
Protecting your privacy online june 2012 tech tuesday
Mark Rogers' Social Network Presentation
Ad

Viewers also liked (20)

PPT
P O W E R P O I N T C I M DÀ L I G U E S
PPS
Zambete
PPT
Portfolio Feb08 r2
PPT
So What and Who Cares: Getting Your Message Right
PPTX
Ecer2010 3 - "Learning about and with the social media: evaluation study of D...
PPT
5 top tips for compelling, relevant blog content
PPT
Proxecto de recuperación do río Corgo nos Salgueiriños
PPS
Culturismo Al Extremo
PDF
Adobe
PPT
Presentation Part III
PPTX
TV lecture: Technology
PPT
Saved (Part 1)
PPT
Rasna Presentation Part II
PPTX
Job creation with audio
PDF
Kelola sda draft micro teaching final
PPT
TRANSICION TERRENO
PPT
Het Spel Van De Wereld
PPT
Effective Personal Branding
PPSX
Academic research
PPT
Fuelling Ontario’s Greenhouse Industry with Biomass
P O W E R P O I N T C I M DÀ L I G U E S
Zambete
Portfolio Feb08 r2
So What and Who Cares: Getting Your Message Right
Ecer2010 3 - "Learning about and with the social media: evaluation study of D...
5 top tips for compelling, relevant blog content
Proxecto de recuperación do río Corgo nos Salgueiriños
Culturismo Al Extremo
Adobe
Presentation Part III
TV lecture: Technology
Saved (Part 1)
Rasna Presentation Part II
Job creation with audio
Kelola sda draft micro teaching final
TRANSICION TERRENO
Het Spel Van De Wereld
Effective Personal Branding
Academic research
Fuelling Ontario’s Greenhouse Industry with Biomass
Ad

Similar to The Basics Of Internet Safety (20)

PPT
100812 internet security2.0
PPTX
IS Presetation.pptx
PPT
Security At Home
PDF
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
PPSX
IDENTIFYING CYBER THREATS NEAR YOU
PPTX
ONLINE SAFETY-online Etiquette ETEC.pptx
PDF
Cybersecurity Awareness Posters - Set #2
PPTX
Online Safety
PPT
Users guide
PPT
Digital safety[1]
PPTX
Phishing
PDF
Social Networks And Phishing
PPTX
ONLINE SAFETY empowerment technolog.pptx
PPTX
Cyber safety.pptx
PDF
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
PPTX
The Dark Side Of The Web
PPT
10 online privacy module samedit1
PPT
10 online privacy module samedit1
PPTX
Pengetahun Dasar Tenatng Cyber Security Untuk Anak.pptx
PPT
Internet Safety
100812 internet security2.0
IS Presetation.pptx
Security At Home
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
IDENTIFYING CYBER THREATS NEAR YOU
ONLINE SAFETY-online Etiquette ETEC.pptx
Cybersecurity Awareness Posters - Set #2
Online Safety
Users guide
Digital safety[1]
Phishing
Social Networks And Phishing
ONLINE SAFETY empowerment technolog.pptx
Cyber safety.pptx
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
The Dark Side Of The Web
10 online privacy module samedit1
10 online privacy module samedit1
Pengetahun Dasar Tenatng Cyber Security Untuk Anak.pptx
Internet Safety

More from Bobbi Newman (20)

PDF
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...
PPTX
Escape The Silo: Why and How to Escape Your Professional Silo - ILA/ACRL ke...
PPTX
Disruption as Opportunity - Spotlight Speaker
PDF
A Bridge Across the Divide: The Role of Libraries in the Digital Skills Gap
PDF
Looking Over The Horizon: Exploring the Future of Libraries
PPTX
This Transliterate Life
PPTX
Digital Literacy: It's about more than access
PPTX
Set the World on Fire, keynote, Colorado Association of Libraries
PDF
Closing the Digital Skills Gap
PPTX
Bridging the Digital Divide: It's more than teaching computer skills to seniors
PPTX
Exploring transliteracy
PPTX
The Role of the Library in a Digital World
PPTX
Libraries Bridging the Digital Divide
PPTX
From Training to Learing
PPT
Why transliteracy
PPT
The Role of Libraries in a Transliterate World
PPT
Libraries in a Transliterate, Technology Fluent World
PPT
Libraries and Transliteracy: An Introduction for Medical Librarians
PPT
Twitterfor beginners
PPTX
Why Transliteracy? An Introduction for Librarians
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...
Escape The Silo: Why and How to Escape Your Professional Silo - ILA/ACRL ke...
Disruption as Opportunity - Spotlight Speaker
A Bridge Across the Divide: The Role of Libraries in the Digital Skills Gap
Looking Over The Horizon: Exploring the Future of Libraries
This Transliterate Life
Digital Literacy: It's about more than access
Set the World on Fire, keynote, Colorado Association of Libraries
Closing the Digital Skills Gap
Bridging the Digital Divide: It's more than teaching computer skills to seniors
Exploring transliteracy
The Role of the Library in a Digital World
Libraries Bridging the Digital Divide
From Training to Learing
Why transliteracy
The Role of Libraries in a Transliterate World
Libraries in a Transliterate, Technology Fluent World
Libraries and Transliteracy: An Introduction for Medical Librarians
Twitterfor beginners
Why Transliteracy? An Introduction for Librarians

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Machine Learning_overview_presentation.pptx
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

The Basics Of Internet Safety

  • 1. The Missouri River Regional Library The Basics of Internet Safety
  • 2. The Good Communication Information Entertainment Sharing Connecting
  • 3. The Bad Spam Phishing Identity Theft Adware Spyware Pop-ups Flaming Stalking, harassment ,bullying
  • 4. The Internet Can Seem Like a Scary Place http://www.flickr.com/photos/rling/438040809/
  • 5. The Good News Last year your odds of becoming a cyber victim dropped from 1 in 4 to 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
  • 6. The Bad News your odds of becoming a victim are 1 in 6 - stats from Consumer Reports, Sept 2008, pg 23
  • 7. Spam Unsolicited messages http://www.flickr.com/photos/grumbler/532250527/
  • 8. True or False If I get unwanted email I should click on the “unsubscribe” link False!
  • 9. Not just for email anymore E-mail spam, Instant messaging Blogs Wiki Mobile phone messaging Internet forums Fax
  • 10. Protection Email with a good filter – email Don’t open spam - email Get an email address just for use online - email Turn on comment moderation – blogs, wikis Turn comments off – blogs, wikis, flickr Restriction access – forums, blogs, wikis, flickr Limit who get’s your contact information – email, IM, Fax, Text
  • 12. Not That Kind - Phishing The process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication - http://en.wikipedia.org/wiki/Phishing
  • 13. Protection Don’t access your accounts from an email link Don’t respond to fear tactics Know who the link is from Be suspicious of links from people you know Look for substitutions 0 for O, 1 for L or I, etc
  • 14. Identity Theft your personal information is stolen and used without your knowledge to commit fraud or other crimes - http://www.ftc.gov/bcp/edu/microsites/idtheft/ http://www.flickr.com/photos/carbonnyc/57280104/
  • 15. Protection Don’t download free software Don’t click on email links to log into accounts Use anti-virus software Use anti-spyware software Use a firewall https Credit reports Don’t send confidential information via email Use a complex password Use one credit card for online transactions – review the statements carefully
  • 16. Adware Software that pops up advertisements on a user's computer. ads targeted to the individual user based on data collected from key words entered in search engines and the types of Web sites visited. - pc magazine http://www.flickr.com/photos/djm/17328024/
  • 17. Spyware Software installed covertly on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. - http://en.wikipedia.org/wiki/Spyware http://www.flickr.com/photos/practicalowl/314989744/
  • 18. Pop Ups A small window that is displayed on top of the existing windows on screen -pc magazine http://www.flickr.com/photos/paperghost/876640836/
  • 19. Protection Don’t download free software Don’t click on pop-ups Don’t click on links from people you don’t know Be wary of links from people you do know Look for substitutions 0 for O, 1 for L or I, etc Anti-spyware software
  • 20. Flaming Hostile and insulting interaction Usually occurs in the social context of a discussion board, chat or e-mail. Attempt to assert authority or establish a position of superiority Believes he or she carries the only valid opinion. Personal attacks on those who disagree. Wish to upset and offend other members of the forum (trolls) http://flickr.com/photos/cleaneugene/2438462422/
  • 21. Protection Don’t feed the “trolls” Think twice, or three times Count to ten Know and use proper netiquette Trust your instincts Leave the situation
  • 22. Stalking, Harassment, Bullying The attacker harasses a victim using electronic communication, such as e-mail or instant messaging or messages posted to a Web site or a discussion group. Relies upon the anonymity afforded by the Internet to allow them to stalk their victim without being detected. http://flickr.com/photos/blogjamdotorg/463043832/
  • 23. Some examples Unwanted emails Unwanted Instant Messages Posting lies, hateful messages on discussion boards, blogs, forums etc Pose as the victim and send/post offensive comment, content or emails Fake photos Fake websites
  • 24. Protection Don’t get involved in flame wars Don’t share personal information online Ignore taunts Trust your instincts
  • 25. If you are being stalked, bullied or harassed Save messages Screenshots Save screen name, email address, profiles, etc Block if possible Contact your Internet Service Provider Contact law enforcement
  • 26. Predators Attempt to exploit people, usually for sexual or financial purposes http://flickr.com/photos/eldave/2037762175/
  • 27. Protection Consider not posting a photo Limit what personal information you share Limit who can see your personal information Don’t talk to strangers Use a screen name that doesn’t reveal too much about you Trust your instincts
  • 28. 7 Online Blunders Assuming your security software is protecting you Accessing an account through an email link Using a single password for all online accounts Downloading free software Thinking your Mac shields you from all risks Clicking on a pop-up ad that says your pc is insecure Shopping online the way you do in stores - from Consumer Reports, Sept 2008 pg 26
  • 29. More Resources http://besafe.more.net/ http://besafe.more.net/sam/resources.shtml http://www.wiredsafety.org/resources/powerpoint/cyberstalking_study.ppt . http://www.beverlypd.org/pdf/PERSONAL%20SAFETY/CYBERSTALKING.pdf http://www.fbi.gov/publications/pguide/pguidee.htm http://safekids.com/2008/03/18/safety-myths-and-web-20/ http://www.ftc.gov/bcp/edu/microsites/idtheft/ http://www.ftc.gov/bcp/conline/edcams/freereports/index.html https://www.annualcreditreport.com http://www.snopes.com/ http://besafe.more.net/ http://inobtr.org/Intro.aspx