Internet Safety
Review Key
Review Key
Watch “5 Internet Safety Tips for Kids”.
List the 5 tips
Don’t give out personal information.
Never send pictures to strangers.
Keep passwords private.
Don’t download anything without permission.
Tell an adult if you receive a mean or strange message
Read “Internet Safety Email”
List 4 rules about Email.
Don’t open emails from strangers.
If you receive an email that asks you to send in your password, do not do it!
If you receive an email asking for personal information, do not do it!
If you receive an email saying you won something, do not answer the email!
List the 5 basic rules for creating a good password?
8 Characters
Symbols
Numbers
Capital letters
No real words.
The over all rule about creating a secure password…
Good passwords are easy to remember and hard to guess.
List 4 pieces of information that is considered “personal information”.
Your Phone number
Your Address
Your Full name
Your Email address
The over all rule about personal information is …
Personal information is information about who you are and where you are.
Watch "Cyber Security 101”.
What is a computer network?
A web of connected computers or devices
Why are cyber vulnerabilities unlikely to ever go away?
They are side effects of the freedom and ease of communicating online.
The size and complexity of networks grew enormously when
The number of personal computers greatly increased
What groups can exploit cyber vulnerabilities?
Criminals, Governments, Hacktivist
Watch “Digital Footprint”.
List 5 elements of digital footprint outcomes.
You can be searched.
It can be copied.
It can be shared.
It can be broadcast.
It is permanent.
List 6 ways a digital foot print can impact a person’s life.
Your online reputation and image.
Your real-life reputation and image.
Your employment prospects.
Admission to schools, university, or groups.
Relationships with friends, family, teachers and others
Reputations with friends, family, teachers and others
Watch “A Cyber Privacy Parable”.
Answer the 7 questions below the video.
How did all the trouble start?
Tim posted a picture of himself in front of his house playing frisbie.
Did only his friends see it?
No.
Where did it go?
Server of social network, government server, identity theft crime ring server,
What did the advertising firm do?
Sent him advertisements based on the toy he was playing with.
What did the crime ring notice in the picture?
Exact location the photo was taken. His address.
What did the crime ring do with Tim's information?
Gathered all the information about Tim on the Internet and took his identity. Reset Tim’s password. Took money from his bank. Sent email contacts malware that was able to take their banking information.
What can you do to protect yourself?
Be careful what you post online.
Keep software up to date.
Make secure passwords.
Use different passwords for each site.
Watch at least 2 videos.
Write at least 1 piece of advice that you would give someone based on the videos you watched.