Internet Safety

69
Mrs. Eva’s Computer Classes Internet Safety Unit

description

Internet Safety Presentation covering 8 areas

Transcript of Internet Safety

Page 1: Internet Safety

Mrs. Eva’s Computer ClassesInternet Safety Unit

Page 2: Internet Safety
Page 3: Internet Safety
Page 4: Internet Safety
Page 5: Internet Safety

What we will cover:·Online Do's and Don'ts·Know the kinds of private information·Sharing personal information·Listen to your safety alarm

·Recognizing Bullies·Learn what to do if it happens·Online Do's and Don'ts

Page 6: Internet Safety
Page 7: Internet Safety
Page 8: Internet Safety

`

Page 9: Internet Safety

The most popular password (3.03% of the 20,000) was "123456." It's also generally considered the most common password used today <http://www.whatsmypass.com/?p=415>.

4 percent used some variant of the word "password." Seriously, people, there's no excuse for this one. "Password" was the 2nd most popular password used, also in keeping with historical trends.

16 percent of passwords were a person's first name. No word on if it was their first name, but someone's. Joshua is the most commonly used first-name password, a likely reference to the movie War Games.

Patterns abound. In addition to "123456," other patterns like "12345, "qwerty," and "abc123" were common, comprising 14 percent of the passwords used.

35 percent of passwords were six characters long. 0.34 percent were only one character long.

For reasons no one can explain, "dragon," "master," and "killer" all crack the top 20 passwords. (On the top 500 password list linked above, "dragon" is #7.)

Page 10: Internet Safety
Page 11: Internet Safety
Page 12: Internet Safety
Page 13: Internet Safety
Page 14: Internet Safety
Page 15: Internet Safety
Page 16: Internet Safety
Page 17: Internet Safety
Page 18: Internet Safety
Page 19: Internet Safety
Page 20: Internet Safety
Page 21: Internet Safety
Page 22: Internet Safety
Page 23: Internet Safety

Why or Why Not?

Page 24: Internet Safety
Page 25: Internet Safety
Page 26: Internet Safety
Page 27: Internet Safety
Page 28: Internet Safety

Examples of Personal MessagingWhat do you

think?

Page 29: Internet Safety
Page 30: Internet Safety
Page 31: Internet Safety
Page 32: Internet Safety
Page 33: Internet Safety
Page 34: Internet Safety

InternetReal Word

Compare these twoVENN Diagram

Page 35: Internet Safety
Page 36: Internet Safety
Page 37: Internet Safety
Page 38: Internet Safety
Page 39: Internet Safety

Illegal Downloading

Page 40: Internet Safety
Page 41: Internet Safety
Page 42: Internet Safety
Page 43: Internet Safety
Page 44: Internet Safety

Illegal DownloadingTrue Story

Page 45: Internet Safety
Page 46: Internet Safety
Page 47: Internet Safety
Page 48: Internet Safety
Page 49: Internet Safety
Page 50: Internet Safety
Page 51: Internet Safety
Page 52: Internet Safety
Page 53: Internet Safety
Page 54: Internet Safety
Page 55: Internet Safety
Page 56: Internet Safety
Page 57: Internet Safety
Page 58: Internet Safety
Page 59: Internet Safety
Page 60: Internet Safety
Page 61: Internet Safety

Virus's and Attachments

Page 62: Internet Safety

Terms to Know

Page 63: Internet Safety
Page 64: Internet Safety

What you should do

Page 65: Internet Safety

This really happened

Page 66: Internet Safety
Page 67: Internet Safety
Page 68: Internet Safety
Page 69: Internet Safety

Credits