Sheena Unangst Nani Paulino Gemma Doculan Frankie Perez
Objectives By the end of this presentation, MAT students will be able to Define what is digital safety with 90% accuracy.  Identify the different types of digital tech tools affected by online threats with 85% accuracy. Describe the different types of online threats with 85% accuracy. List safety tips for using the internet with 90% accuracy. Explain a variety of online software tools that deter online threats with 90% accuracy.     
What is Digital or Online Safety? Digital or online safety is a term used to describe the act of being aware of on-line threats and taking the necessary steps to avoiding those threats.
Examples of Digital Tools/ Materials   Tangible Tools:      -Cell phones      -Digital cameras      -Technology for young people-PSP, Nintendo DS, etc.     Intangible Tools: - Internet (used for RPGs, social networking, online banking transactions)
General Statistics Total of 1.3 million consumer complaints regarding a breach of online safety.  Of this number 54% were fraud complaints.  21% were identity theft complaints  25% were other complaints              Aspen Publishers, Inc. (June 2010)  
Statistics Online Threats to Tweens:    12% of tweens (56% of teens) receive requests for personal information  10% of tweens (54% of teens) frequently have private conversations with online strangers through instant messaging  5% of tweens (42% of teens) said they have posted personal information online  4% of tweens (30% of teens) reported that they have talked with a cyber stranger about meeting in person  16% of tweens and teens discovered that someone online was an adult pretending to be much younger
Online Threats   Malware Viruses Worms Macro-viruses                 Get Safe Online (2010)    Privacy Spyware Wifi Eavesdropping Highjacking/physical theft Phishing  
Online Threats   Finances Fruad Identify Theft Spam email               Get Safe Online (2010) Family Identify Theft Spam email Cyberstalking Sexual Predators
Precautionary Actions "Vigilence is still the best defense"     Online threats are usually:   Done to make money   Random victims   Use less protection or are unprotected
Identifying at-risk children Your child may be at risk if he/she:  spends a large amount of time online, especially at night. has pornography on your child's computer. is receiving or making phone calls to numbers you do not recognize. receives mail, gifts, or packages from someone you don't know. turns the computer off or switches the screen when you come into the room. is withdrawn from the rest of the family. is using an online account from someone else.       Federal Bureau of Investigation, Cyber Division, (2010).
How to help victims If your child was a victim of an online threat:   Communicate to your child the dangers and consequences of online socializing. Report the situation to your online service provider, your legislature, or a law enforcement officer. Educate yourself about parental controls, protection tools and software available to create a safe computer. Install protection tools and software into your child's computer, and monitor on a timely basis. Regularly communicate with your child, and create rules and limits for using the computer.     Federal Bureau of Investigation, Cyber Division, (2010).
Digital Tools Safety Tips: For Tangible Products Use common sense - Do not leave cameras, computers or handheld consoles unattended. Put a password on your computer and cellphone Do not write your password on your planner or a piece of paper and leave it in your wallet. Use secure programs like google docs.
Internet Safety for Adware, Spyware and Computer Viruses   Don't open email attachments from people you don't know. Avoid downloading free software online unless you're certain it's from a reputable company. Many free programs are merely a device for delivering adware and spyware. Install virus protection software and        firewall. Check for updates regularly.  
Internet Safety: From Logging On to Logging Off   Going Online Create different profiles on an internet-connected computer to protect personal information for each user. Choose secure passwords that are a combination of of letters and numbers, and do not share passwords with unauthorized users.  Avoid using the same password for multiple accounts.
    Surfing the Internet   Only visit reputable Web sites rather than personal pages from unknown individuals. Use only one credit card for online shopping to avoid exposing multiple cards to fraud or theft.  Monitor children’s Internet usage including the sites they visit and how long they are online
Internet Safety: From Logging On to Logging Off Email, Chatting and Messaging   Report and delete any spam messages.  Avoid e-mail scams that ask for money, credit card information or other personal details.  Do not give out e-mail addresses indiscriminately.  Do not open e-mails with unexpected attachments or from unknown senders.  Choose an anonymous username if possible to avoid identifying details such as age, school, gender or location.
Internet Safety: From Logging On to Logging Off Email, Chatting and Messaging (Continued) Observe proper online etiquette when chatting and report offensive behavior to chat moderators or other authority figures.  Do not send pictures to unknown individuals.  Properly log off accounts when using a public or shared computer to avoid unintentionally giving another person access.  Never agree to meet anyone in person whom you’ve only met online.
Internet Safety: From Logging On to Logging Off Downloads   Only download from reputable, authorized sites.  Run a virus inspection program prior to installing or using any downloaded files.  Limit the amount of downloads to minimize potential risks.     
Internet Safety: From Logging On to Logging Off Social-Network Sites and RPG's Choose a username without identifying details.  Limit personal information in a profile and avoid too many details that can help someone uncover an identity.  Opt to keep a profile or other personal information private if possible.  Report offensive behavior and vandalism to the appropriate authorities.  Do not put a personal Web address in an e-mail signature that may be forwarded to many people.
Tools for Protection *Protection against adware and spyware     1. Make sure your firewall is on       -A firewall in a computer denies or permits the passage of         information from the internet based on a set of rules or         criteria   2. Be careful where you visit and download       -unscrupulous programs come from unscrupulous sites   3. Read the EULA      -It's a legal agreement your making with the software vendor.  By not reading         it you may be unwittingly agreeing to install spyware and adware   4. Protect your system      -make sure your antivirus program blocks spyware and adware
Tools for Protection *Anti-virus software tools      -Symantec      -Mcafee      -Shield       -A.V.G.   These programs primarily do two things:   1. Examine files to look for known virus by means of a virus dictionary   2. Identify suspicious behavior from any computer program which might indicate infection.  
Sites that Help *Internet websites that guide safe browsing: http://www.commonsense.com/internet-safety-tips/tips-for-kids.php http://www.cyberangels.org/ http://www.fbi.gov/kids/k5th/safety2.htm http://www.nsteens.org *Web based game that teaches how to be safe: http://www.att.com/Common/images/safety/game.html  
References Banking on Online Safety.  Teller Vision , (1394), 2-3. Retrieved from Business Source             Premier database. Federal Bureau of Investigation. (N.D.). A Parent's Guide to Internet Safety.  FBI Publications . <http://www.fbi.gov/publications/pguide/pguidee.htm>Retrieved from the Web June 19, 2010. Federal Trade Commission. (2000). How to Protect Your Child's Privacy Online: A Teacher's Guide.  FTC .<http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec10.pdf>Retrieved from the Web June 19, 2010.  Internet Safety Facts <http://safety.lovetoknow.com/Category:Internet_Safety_Facts4> Aspen Publishers, Inc. (June 2010).   Microsoft. (2006, October 23).  What is a computer virus?   Retrieved from http://www.microsoft.com/nz/protect/computer/basics/virus.mspx   Norton from Symantec. (2007, February 19).  Internet Safety and Your Tween . Retrieved from http ://www.symantec.com/norton/library/familyresource/article.js?paid=pr_internetsafety_and_your_tween.  N.A. (May 23, 2008). How to Avoid Trouble Online .Happy Trails Computer Club . <http://cybercoyote.org/security/vigilance.shtml>Retrieved from the Web June 19, 2010  N.A. (2010). Overview of the Different Threats.  Get Safe Online.  <http://www.getsafeonline.org/nqcontent.cfm?a_id=1168>Retrieved from the web June 19, 2010.

Digital safety[1]

  • 1.
    Sheena Unangst NaniPaulino Gemma Doculan Frankie Perez
  • 2.
    Objectives By theend of this presentation, MAT students will be able to Define what is digital safety with 90% accuracy.  Identify the different types of digital tech tools affected by online threats with 85% accuracy. Describe the different types of online threats with 85% accuracy. List safety tips for using the internet with 90% accuracy. Explain a variety of online software tools that deter online threats with 90% accuracy.     
  • 3.
    What is Digitalor Online Safety? Digital or online safety is a term used to describe the act of being aware of on-line threats and taking the necessary steps to avoiding those threats.
  • 4.
    Examples of DigitalTools/ Materials   Tangible Tools:      -Cell phones      -Digital cameras     -Technology for young people-PSP, Nintendo DS, etc.     Intangible Tools: - Internet (used for RPGs, social networking, online banking transactions)
  • 5.
    General Statistics Totalof 1.3 million consumer complaints regarding a breach of online safety. Of this number 54% were fraud complaints. 21% were identity theft complaints 25% were other complaints              Aspen Publishers, Inc. (June 2010)  
  • 6.
    Statistics Online Threatsto Tweens:    12% of tweens (56% of teens) receive requests for personal information 10% of tweens (54% of teens) frequently have private conversations with online strangers through instant messaging 5% of tweens (42% of teens) said they have posted personal information online 4% of tweens (30% of teens) reported that they have talked with a cyber stranger about meeting in person 16% of tweens and teens discovered that someone online was an adult pretending to be much younger
  • 7.
    Online Threats  Malware Viruses Worms Macro-viruses                 Get Safe Online (2010)   Privacy Spyware Wifi Eavesdropping Highjacking/physical theft Phishing  
  • 8.
    Online Threats  Finances Fruad Identify Theft Spam email               Get Safe Online (2010) Family Identify Theft Spam email Cyberstalking Sexual Predators
  • 9.
    Precautionary Actions &quot;Vigilenceis still the best defense&quot;     Online threats are usually:   Done to make money   Random victims   Use less protection or are unprotected
  • 10.
    Identifying at-risk childrenYour child may be at risk if he/she: spends a large amount of time online, especially at night. has pornography on your child's computer. is receiving or making phone calls to numbers you do not recognize. receives mail, gifts, or packages from someone you don't know. turns the computer off or switches the screen when you come into the room. is withdrawn from the rest of the family. is using an online account from someone else.       Federal Bureau of Investigation, Cyber Division, (2010).
  • 11.
    How to helpvictims If your child was a victim of an online threat:   Communicate to your child the dangers and consequences of online socializing. Report the situation to your online service provider, your legislature, or a law enforcement officer. Educate yourself about parental controls, protection tools and software available to create a safe computer. Install protection tools and software into your child's computer, and monitor on a timely basis. Regularly communicate with your child, and create rules and limits for using the computer.     Federal Bureau of Investigation, Cyber Division, (2010).
  • 12.
    Digital Tools SafetyTips: For Tangible Products Use common sense - Do not leave cameras, computers or handheld consoles unattended. Put a password on your computer and cellphone Do not write your password on your planner or a piece of paper and leave it in your wallet. Use secure programs like google docs.
  • 13.
    Internet Safety forAdware, Spyware and Computer Viruses   Don't open email attachments from people you don't know. Avoid downloading free software online unless you're certain it's from a reputable company. Many free programs are merely a device for delivering adware and spyware. Install virus protection software and      firewall. Check for updates regularly.  
  • 14.
    Internet Safety: FromLogging On to Logging Off   Going Online Create different profiles on an internet-connected computer to protect personal information for each user. Choose secure passwords that are a combination of of letters and numbers, and do not share passwords with unauthorized users. Avoid using the same password for multiple accounts.
  • 15.
        Surfingthe Internet   Only visit reputable Web sites rather than personal pages from unknown individuals. Use only one credit card for online shopping to avoid exposing multiple cards to fraud or theft. Monitor children’s Internet usage including the sites they visit and how long they are online
  • 16.
    Internet Safety: FromLogging On to Logging Off Email, Chatting and Messaging   Report and delete any spam messages. Avoid e-mail scams that ask for money, credit card information or other personal details. Do not give out e-mail addresses indiscriminately. Do not open e-mails with unexpected attachments or from unknown senders. Choose an anonymous username if possible to avoid identifying details such as age, school, gender or location.
  • 17.
    Internet Safety: FromLogging On to Logging Off Email, Chatting and Messaging (Continued) Observe proper online etiquette when chatting and report offensive behavior to chat moderators or other authority figures. Do not send pictures to unknown individuals. Properly log off accounts when using a public or shared computer to avoid unintentionally giving another person access. Never agree to meet anyone in person whom you’ve only met online.
  • 18.
    Internet Safety: FromLogging On to Logging Off Downloads   Only download from reputable, authorized sites. Run a virus inspection program prior to installing or using any downloaded files. Limit the amount of downloads to minimize potential risks.    
  • 19.
    Internet Safety: FromLogging On to Logging Off Social-Network Sites and RPG's Choose a username without identifying details. Limit personal information in a profile and avoid too many details that can help someone uncover an identity. Opt to keep a profile or other personal information private if possible. Report offensive behavior and vandalism to the appropriate authorities. Do not put a personal Web address in an e-mail signature that may be forwarded to many people.
  • 20.
    Tools for Protection*Protection against adware and spyware     1. Make sure your firewall is on      -A firewall in a computer denies or permits the passage of        information from the internet based on a set of rules or        criteria   2. Be careful where you visit and download      -unscrupulous programs come from unscrupulous sites   3. Read the EULA     -It's a legal agreement your making with the software vendor.  By not reading        it you may be unwittingly agreeing to install spyware and adware   4. Protect your system     -make sure your antivirus program blocks spyware and adware
  • 21.
    Tools for Protection*Anti-virus software tools     -Symantec     -Mcafee     -Shield     -A.V.G.   These programs primarily do two things:   1. Examine files to look for known virus by means of a virus dictionary   2. Identify suspicious behavior from any computer program which might indicate infection.  
  • 22.
    Sites that Help*Internet websites that guide safe browsing: http://www.commonsense.com/internet-safety-tips/tips-for-kids.php http://www.cyberangels.org/ http://www.fbi.gov/kids/k5th/safety2.htm http://www.nsteens.org *Web based game that teaches how to be safe: http://www.att.com/Common/images/safety/game.html  
  • 23.
    References Banking onOnline Safety. Teller Vision , (1394), 2-3. Retrieved from Business Source             Premier database. Federal Bureau of Investigation. (N.D.). A Parent's Guide to Internet Safety. FBI Publications . <http://www.fbi.gov/publications/pguide/pguidee.htm>Retrieved from the Web June 19, 2010. Federal Trade Commission. (2000). How to Protect Your Child's Privacy Online: A Teacher's Guide. FTC .<http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec10.pdf>Retrieved from the Web June 19, 2010.  Internet Safety Facts <http://safety.lovetoknow.com/Category:Internet_Safety_Facts4> Aspen Publishers, Inc. (June 2010).   Microsoft. (2006, October 23). What is a computer virus?   Retrieved from http://www.microsoft.com/nz/protect/computer/basics/virus.mspx  Norton from Symantec. (2007, February 19). Internet Safety and Your Tween . Retrieved from http ://www.symantec.com/norton/library/familyresource/article.js?paid=pr_internetsafety_and_your_tween.  N.A. (May 23, 2008). How to Avoid Trouble Online .Happy Trails Computer Club . <http://cybercoyote.org/security/vigilance.shtml>Retrieved from the Web June 19, 2010 N.A. (2010). Overview of the Different Threats. Get Safe Online. <http://www.getsafeonline.org/nqcontent.cfm?a_id=1168>Retrieved from the web June 19, 2010.