It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar

Similar documents
EADS up. stop think connect

ONLINE SAFETY. Messaging, , Vlogging and Sexting

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Topic Course Activities

Digital Safety and Digital Citizenship

Anti-Cyber Bullying Policy.

Course Outline (version 2)

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

South Central Power Stop Scams

Student E-Safety Induction

Online Security and Safety Protect Your Computer - and Yourself!

My Digital Footprint. A guide to digital footprint awareness and management

Norton Online Reputation Report: Why Millennials should manage their online footprint

Online Dangers. According to the National Center for Missing and Exploited Children.

Cyber Safety Awareness in Schools. A Delhi Police Initiative

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

It pays to stop and think

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Cyber Smarts Using Social Media Wisely

A GUIDE TO CYBERBULLYING THINK BEFORE YOU POST

Top 5 Tips To Take A Stand Against Telephone Scams

Safety and Security. April 2015

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

Sky Social Media Guidelines for Contributors

10 Quick Tips to Mobile Security

Chapter 6 Network and Internet Security and Privacy

The Table Privacy Policy Last revised on August 22, 2012

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Social Networking Applied

ONLINE SAFETY FOR KIDS TIPS FOR PARENTS

The 12 scams of Christmas

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Social Media Reputation Management

Introduction to

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Social Media and Cyber Safety

Security Awareness. Presented by OSU Institute of Technology

How To Remove Personal Antivirus Security Pro Virus

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Personal Cybersecurity

FAQ: Privacy, Security, and Data Protection at Libraries

INTERNET SAFETY IS IMPORTANT

Electronic Network Acceptable Use Policy

BEST PRACTICES FOR PERSONAL Security

PUPIL ICT ACCEPTABLE USE POLICY

Best Practices Guide to Electronic Banking

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

DCSZ Student AUP Policy

STUDENT ICT ACCEPTABLE USE POLICY

Everyday Digital Skills Projects Plus skills learned through the project

Why isn t your chapter on Facebook?

Technology Safety Quick Tips

Cyber Security Guide. For Politicians and Political Parties

How to Keep Your Personal Information Secure

Staying Safe on the Internet. Mark Schulman

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Family Technology Boundaries:

Circle Link 1 "Know Before You Go" Web Literacy Tips:

Mobile Security for Android devices

NESTLÉ Consumer Privacy Notice Template PRIVACY NOTICE

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

PROTECTING YOUR BUSINESS ASSETS

Chapter 4 Network and Internet Security

WYNN SOCIAL CASINO PRIVACY POLICY

FAQ. Usually appear to be sent from official address

Methodology USA UK AUSTRALIA CANADA JAPAN N=1,008 MOE=+/-3% N=1,044 MOE=+/- 3% N=1,028 MOE=+/- 3% N=1,025 MOE=+/- 3% N=1,005 MOE=+/- 3%

Cyber Hygiene Guide. Politicians and Political Parties

ASKnLearn Learning Management System Parents Talk Punggol Green Primary School 2 & 3 Jan 2014

Your profile contains your contact information. This is what other members will use when they want to get in touch.

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HOW TO CONFIGURE SOCIAL MEDIA PRIVACY SETTINGS

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

How to Build a Culture of Security

PRACTICING SAFE COMPUTING AT HOME

Financial scams. What to look for and how to avoid them.

IS Today: Managing in a Digital World 9/17/12

Newcomer Finances Toolkit. Fraud. Worksheets

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

SHS Annual Information Privacy and Security Training

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Cell Phone Project: Mr. Veronsky, Grade 8, Computer Applications

Creating and Protecting Your Online Identity for Job Search. A guide for newcomers to British Columbia

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

ANNUAL SECURITY AWARENESS TRAINING 2012

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

Privacy Notice Froneri South Africa (Pty) Ltd t\a Dairymaid ( Froneri ) ( Privacy Notice ) Froneri Froneri Froneri

Facebook Guide. How many Facebook friends should I have?

Dumas ISD. Acceptable Use Policy

Guide to credit card security

Payment Systems Department

(10/17) PATIENT GUIDE

Transcription:

You Won!!! It is my great pleasure to inform that you have won the latest model of Ferrari Car and 4 Bed Room Villa in Palm Jumeirah for attending this Seminar To Process and deliver your Car and Villa please send your contact details, parents bank account number and a processing fee of 2000 AED to me urgently today.

Dark Side of the Cyber World A Discussion with SMART Students:

Agenda Internet, Cyber, Trends.. Children on Cyber World What are the Cyber Security risks What you can do to stop? How do you respond? Be a SMART Child on Cyber!

Key Words Cyber Cyber Crime Cyber Security

Some interesting Videos http://www.youtube.com/v/ehv93zg8xla http://www.youtube.com/v/9newx7buydy http://www.childnet.com/resources/digizen-game http://infosecawareness.in/cartoon-videos/identitytheft/ http://infosecawareness.in/cartoon-videos/onlinechatting/ http://www.youtube.com/v/c8hkdfamxyi

E-Children A recent Study reveals that Children (3-5 years) are more skilled at using smartphones/devices than tying their shoes It s a birth right now!... Not any more a Luxury!

The Danger! Like Outside world there are bad people in Cyber World too (We are but Good, Right? ) Almost every activity what is happening in the real world is now online You may put yourself and your parents in danger, if doesn't t use it properly

Why More Safety/Security issues? All are using Internet or Are SMART now Smart Phones Smart Devices IPAD, Galaxy TAB, etc More activity on internet friends, communication, buying, selling, and payments, etc. More Bad people migrating to Cyber easy and hidden

How the Children can be at Risk? Content Contact Conduct

What is the Danger? Cyber Bullying Misusing the Children and that will spoil the future Financial losses to parents Private Data disclosed by children online, including family photos Downloading of viruses/worms etc.. That could even control the camera on your phone/laptop.!

Motivation for Cyber Crime Money Revenge Curiosity Fun Praise seekers

What are the Bad things? Phishing Internet Scams Malware (virus, worms etc.) Cyber stalking Cyber bullying Online Predation Inappropriate content

How do the bad guys work? Find kids through social networking, blogs, chat rooms, instant messaging, email, discussion boards, and other websites. Seduce their targets through attention, affection, kindness, and even gifts. Know the latest music and hobbies likely to interest kids.

How the Bad Guys Work? Listen to and sympathize with kids' problems. Try to ease young people's inhibitions by gradually introducing in appropriate content into their conversations or by showing them explicit material. Might also evaluate the kids they meet online for future face-to-face contact.

Suspicious Notices in FB or other social media

Suspicious!

Suspicious!!

How to be Safe? Don t reveal personal or financial information in an email Before sending sensitive information over the Internet, Check the security of the web site Pay attention to the web site s URL If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly and/or google about it. Keep a Clean machine

How can you protect yourself? Never download images from an unknown source-they could be not good to view by you and family and could get your PC or phone go bad. Using email filters. Telling an adult immediately if anything that happens online makes you feel uncomfortable or frightened. Choosing a gender-neutral screen name that doesn't contain suggestive words or reveal personal information.

How can you protect yourself? Never revealing personal information about yourselves (including age and gender) or information about your family to anyone online and not filling out online personal profiles. Stopping any email communication, instant messaging conversations, or chats if anyone starts to ask questions that are too personal or suspicious (abnormal) Have a family agreement on Internet use and post it near the computer to remind you to protect your privacy on the Internet.

Prevention Keep shared information to minimum Strong and easy to remember passwords Privacy settings on social media and games Security Software Avoid scams

Prevention Some Quick Tips.. 1) If you get a notice of a PHOTO TAG Do not open it... 2) If you get a notification that a friend reported you for offensive behavior etc.. Do not open it. 3) Is a Video saying 99% of People can not watch this for more the 15 Sec. Do not open it. 4) All Messages from your friends via chat saying click this link.. Do not open. Only way to protect yourself from these is to ignore them and not to click on them.

Online Games Security Protect games with strong passwords Keep Personal information secret (no telephone number, location etc. to strangers) Make up a safe gamer name Play fair Never meet an online friend in person without safeguard in place (parent) No games above your age level Make sure your PC/device is always protected with Anti Virus and other security measures

Social Media Be Sensitive on what you upload Use privacy and security options provided, so that what you post is seen by whom you know only Keep your personal details personal

Tweeteee. There is no Delete when you tweet Never Post Sensitive Information Understand the Privacy Policies and Terms Posted Information is Permanent Verify your contacts Secure your Profile Practice Good password Management Limit the information you expose

Mobile Devices Keep security software current Protect all devices that connect to the Internet Secure your personal information Think before you app Only Give your mobile number out to people you know and trust Learn how to disable the geo-tagging on your phone at. http://icanstalku.com/how.php#disable

Smart Devices Do not Jail Break Connect only to authorized Wi Fi Use auto lock with password Download applications from authorized app stores only Use privacy options provided by various mobile OS Do not accept calls from weird number or Do not give call back.

What to Do? Connect with care Get savvy about Wi Fi hotspots Protect your $ When in doubt, don t respond Be Web Wise Stay current. Keep pace with new ways to stay safe online Know how to cell block others Use caution when meeting face-to-face

PCs / Laptops Install Anti Virus and up date Install Personal Firewall, if possible Keep the windows (OS) updated with the latest patch Avoid installing cracked software Keep OS files and Personal files in different HDD partition Factory default is good to do a local cleanup Factory restore may not wipe all the data, when you dispose or exchange/maintenance, but wiping need to use

Online Shopping Check out sellers Make sure the site is legitimate Protect your personal information Use safe payment options Keep a paper trail Turn your computer off when you are finished shopping Be wary of emails requesting information

How do you respond? If Somebody harass you online, hostile or sending disturbing materials block them and report to your parents or friends Report improper game and content to the game service You may keep your parents in confidence as they are the most interested in your safety and well being

What to do if you are victim? Report it to the appropriate people, including your parents If you believe financial accounts may be compromised contact your financial institution and close the account 9s). Watch for any unauthorized charges Consider reporting the attack to your local police When in doubt, throw it out Think before you act Secure your accounts Make passwords long and strong Unique account, unique password

Hacked Accounts How do I know my email or social network account has been hacked? There are posts you never made on your social network page. These posts often encourage your friends to click on a link or download an App. A friend, family member or colleague reports getting email from you that you never sent Your information was lost via data breach, malware infection or lost/stolen device.

What to do if it is compromised? Notify all your contacts that they may receive spam messages that appear to come from your account. Your computer needs to be assessed and scanned for security risks and make sure all the security software are up to date Change passwords to all accounts that have been compromised and other key accounts asap. If you cannot access your account because a password has been changed

How to get Less SPAM Don t Post Addresses Online (as much as) Avoid common, Guessable Formats Limit Sharing of Addresses Use Disposable Addresses No Email Based Screen Names Delete without Opening Disable Automatic Content Downloads

How to handle SPAM Don t Forward Spam Never Reply or Click the Links Never Purchase anything from Spam Avoid Opting In Read Privacy Policies Use a Spam Filter Report Spam Keep Anti-Virus software updated

How can I find it is Genuine? Common Sense Too good to happen! http://www.hoax-slayer.com/site-search.html http://www.scamwatch.gov.au/ http://www.419scam.org/ If nothing else works http://google.com

Useful Utilities http://staysafeonline.org/stay-safeonline/free-security-check-ups/

Be a SMART Child Safe Meet Accepting Reliable Tell

SMARTER Top tips Protect your online reputation: use the services provided to manage your digital footprints and think before you post. Content posted online can last forever and could be shared publicly by anyone. Know where to find help: understand how to report to service providers and use blocking and deleting tools. If something happens that upsets you online, it s never too late to tell someone. Don t give in to pressure: if you lose your inhibitions you've lost control; once you ve pressed send you can t take it back. Respect the law: use reliable services and know how to legally access the music, film and TV you want. Acknowledge your sources: use trustworthy content and remember to give credit when using others work/ideas.

1. Acceptance 2. Sensitivity to nations and cultures 3. While Doing school work 4. While Using Email and Chatting 5. Pretending to be some one else 6. Use of Bad Language 7. Hide Personal Information 8. While Downloading Ethics

Quiz Which of the following tips can help you to look after yourself and look out for others when you are using social networks or instant messaging? a) Check your privacy settings b) Find out how to make an online report c) Always treat others with respect d) Tell a friend or family member if something upsets or concerns you How old do you have to be to have a Facebook account? a) 18 b) 15 c) 12 d) 13 e) There is no age limit f) Any age but with parent's permission Webcams can let you see and hear who you are chatting to in instant messaging services, but is it possible for this to be recorded? a) Yes b) No

Quiz Using illegal file-sharing program to download or stream content can cause some unwanted side-effects. Which of the following sideeffects can happen as a result? a) You download a computer virus b) You get pop-ups that are difficult to get rid of Your computer gets slowed down significantly by a file you download c) You download spyware which means strangers can access the information on your computer d) You might be exposed to nasty images, such as very violent ones

Quiz Gaming can involve live online chat. What tips can help you stay safe when gaming online? a) Keep gaming friends 'in the game' don't share personal information with people you ve met in games and don t share your social networking profile details or email address b) Use a strong and unique password c) Never play online games d) Know how to report and block people e) Remember to log out a service after you have finished using it

Quiz If you give out your mobile phone number online, which of the following are true? a) You could start to receive texts from people you don t know b) You could be sent premium rate texts that cost you money c) Your phone number could be used to locate where you are d) You could start to receive promotional texts for things you don t want

Quiz Which of these can add costs to your mobile bill? a) Upgrading a free app b) Dialing an 09 number to vote on a TV show c) Receiving questions or answers from a quiz service by text d) Dialing 999 in an emergency

Summary Be SMART Child in SMART way Use the facilities wisely and securely Ensure that you keep your parents in Confidence Don t trust strangers Don t trust unexpected emails, messages, communication Don t believe without validating Don t believe in too good to be true