400

51
400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 100 200 300 400 500 200 300 100 Staying Incognito Talk to Me Let’s Get Together If you can’t say something nice… Miscellane ous

description

Staying Incognito. Talk to Me. Let’s Get Together. If you can’t say something nice…. Miscellaneous. 100. 100. 100. 100. 100. 200. 200. 200. 200. 200. 300. 300. 300. 300. 300. 400. 400. 400. 400. 400. 500. 500. 500. 500. 500. - PowerPoint PPT Presentation

Transcript of 400

Page 1: 400

400

500

100

200

300

400

500

100

200

300

400

500

100

200

300

400

500

100

200

300

400

500

200

300

100

Staying Incognito

Talk to MeLet’s Get Together

If you can’t say something

nice…

Miscellaneous

Page 2: 400

This should be at least eight characters long; contain a combination of letters, numbers, and special characters; and should not contain your login name, your first or last name, or any other information that is easy to find out about you.

Page 3: 400

What is a strong, secure password?

Source: http://www.microsoft.com/athome/security/privacy/password.mspx

Page 4: 400

To do this, choose a favorite quote, phrase, saying, song, then use the first letter or syllable from each word of the quote.

Page 5: 400

What is a good way to create a secure password?

Page 6: 400

Before doing this, make sure the Web site address starts with "https" and that your browser's status bar displays the "lock" icon.

Page 7: 400

What is submit financial information through a Web site?

Remember: never in an e-mail

Page 8: 400

These products allow adults to closely and specifically control what their children access.

Page 9: 400

What are Parental Control Tools/Software?

Page 10: 400

Examples of this category are: pictures, names and addresses, schools you attend, cell or phone numbers and many other things, such as the name of your school team.

Page 11: 400

What is Personal Information?

Source: http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec13.htm

Page 12: 400

LOL, POS, ROFL

Page 13: 400

What is Chat lingo, cyber talk, etc?

Source: http://www.missingkids.com/adcouncil/lingo.html

Page 14: 400

What you should do if you receive unsolicited emails with attachments from unknown senders.

Page 15: 400

What is do not open them and/or delete them?

Source: http://dispatch.mcafee.com/virus_tips.asp

Page 16: 400

This Internet technology notifies a user when a friend is online and allows them to "converse" by exchanging text messages.

Page 17: 400

What is IM (Instant Messaging)?

Page 18: 400

ICQ, an instant messaging computer program, owned by Time Warner's AOL subsidiary, got its name from this phrase.

Page 19: 400

What is “I Seek You”?

Source: http://www.answers.com/topic/icq

Page 20: 400

A Web site to which one or more people post their personal observations on particular subjects.

Page 21: 400

What is a Blog (web log)?

Page 22: 400

MySpace, Facebook and Xanga

Page 23: 400

What are popular social networking sites?

Page 24: 400

Blurring, morphing or changing photos you post on your site makes them interesting, but also does this.

Page 25: 400

What helps protect your identity?

Sources: http://www.wiredsafety.org/resources/pdf/socialnetworktips.pdf

Page 26: 400

Go alone to meet someone you’ve only known online

Page 27: 400

What is something you should never do?

Source: http://www.wiredsafety.org/safety/chat_safety/index.html

Page 28: 400

You are practicing this when you are courteous, honest and polite when using the Internet.

Page 29: 400

What is Netiquette?

Source: http://www.answers.com/netiquette&r=67

Page 30: 400

These should be set so that :1. people can only be added as your friend if you approve them2. people can only view your profile if you have approved them as a friend

Page 31: 400

What are the Privacy Settings?

Source: http://tcs.cybertipline.com/knowthedangers7.htm

Page 32: 400

Posting or sending a deliberately confrontational message via newsgroup, e-mail, etc., usually in response to a previous message.

Page 33: 400

What is flaming?

Source: http://www.netsmartz.org/safety/definitions.htm

Page 34: 400

In this type of cyberbullying, the cyberbully doesn’t see themselves as a bully at all. They see themselves as righting wrongs, or protecting themselves or others from the “bad guy” they are now victimizing.

Page 35: 400

What is “The Vengeful Angel”?

Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html

Page 36: 400

These cyberbullies want to exert their authority, show that they are powerful enough to make others do what they want and control others with fear.

Page 37: 400

What are The “Power-Hungry” (and/or) “Revenge of the Nerds”?

Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html

Page 38: 400

This cyberbullying is usually done or planned in a group, either virtually or together - and is done for entertainment.

Page 39: 400

What is “Mean Girls”?

Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html

Page 40: 400

These cyberbullies usually don’t think they are cyberbullies at all. They tend to respond in anger or frustration.

Page 41: 400

What is “Inadvertent” or “Because I Can”?

Source: http://www.stopcyberbullying.org/educators/howdoyouhandleacyberbully.html

Page 42: 400

An online scam where users think they are going to a legitimate web site, when in fact they are unknowingly redirected to an illegitimate site that steals their personal information.

Page 43: 400

What is Pharming?

Source: http://www.netsmartz.org/safety/definitions.htm

Page 44: 400

Emails or web sites are used to solicit personal and financial information for purposes of gaining access to those accounts.

Page 45: 400

What is Phishing?

Source: http://www.netsmartz.org/safety/definitions.htm

Page 46: 400

This Internet behavior is almost always characterized by the individual relentlessly pursuing his\her victim online and is very likely to include some form of offline attack, as well.

Page 47: 400

What is Cyberstalking?

Source: http://www.netsmartz.org/safety/definitions.htm

Page 48: 400

If mis-configured, these programs may expose the contents of your entire hard drive to all other users of the program.

Page 49: 400

What is file-sharing?

Source: http://security.getnetwise.org/tips/filesharing/

Page 50: 400

This group of 13-18 year-old volunteers has been specially trained in all aspects of online safety, privacy, and security. They run unique programs in schools to spread the word about responsible and safe surfing.

Page 51: 400

What are Teenangels?

Sources: http://www.wiredsafety.org/;http://www.teenangels.org/