cyebrsafety webinar september, 2015. 2 what are other current cyber issues? ●digital identity...
TRANSCRIPT
![Page 1: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/1.jpg)
Cyebrsafety webinarSeptember, 2015
![Page 2: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/2.jpg)
2
What are other current Cyber Issues?
● Digital Identity
● Fraud
● Geo-location
● Hacker
● Identity theft
● Malware
● Phishing
● Plagiarise
● Sexting
● Social Network Sites
● Spam
● Trojan
● Trolling
● Cyberbullying
![Page 3: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/3.jpg)
3
The three C’s of cybersafety:
Contact
Conduct
Content
![Page 4: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/4.jpg)
4
Contact
• Friends/followers Vs Acquaintances• Who can see your personal information
• Who can contact you• Who are you sharing information with
• Be careful who you trust
![Page 5: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/5.jpg)
5
Conduct
• Think before you post, chat, upload, download etc
• Don’t retaliate to or join in cyberbullying• Treat others with respect
• Be a positive digital citizen (report, rate effectively)
![Page 6: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/6.jpg)
6
Content
• Protect your digital reputation• Protect personal information
• Be wary of scams, pop – ups etc• Contribute positively to online content
such as reviews, blogs etc• Be a digital skeptic
![Page 7: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/7.jpg)
7
Links to the eSmart framework
Consider the 3 C’s in the policy development process and when writing Acceptable Use Agreements
Link the 3 C’s to the school values – “Our values online” and expected behavior protocols
Provide PD for staff to understand, teach and role model the 3 C’s
Use the 3 C’s as the foundation of your eSmart Curriculum
Support parents in their understanding of the 3 C’s
![Page 8: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/8.jpg)
8
Practical example 1: Acceptable Use Policies (2.3) and School Values (3.1)
As a student at AMF Secondary College, when using digital technologies and utilizing online platforms I agree to the following:
Contact:• Ensure I regularly check my privacy settings in the platforms I use to ensure my
personal information isn’t being shared• Not share personal information online• Only friend/follow appropriate people
Conduct: Abiding by the school values online• Respect:
- think before I post information about myself and others including images, videos, and comments- never to retaliate to cyberbullying or cyberbully others
• Community:- Be a responsible digital citizen by reporting inappropriate websites and content to the eSafety Commissioner or a trusted adult
Content:• Use the internet as a resource but critical analyse the information I come across and
not plagiarize the work of others.• Be wary of scams for example pop ups
Student Name: _____________________ Signature: ________________ Date: _______
![Page 9: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/9.jpg)
9
Practical example 2: Parent tips (6.1 and 6.2)
http://www.thinkuknow.org.au/site/sites/thinkuknow.org.au.site/files/Factsheets/family_internet_safety_contract.pdf
![Page 10: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/10.jpg)
10
• Cyber Issues are a result of behaviours not
platforms
• Most risks can be minimized by considering
Contact, Conduct and Content
• These three areas should be reflected
across all areas of an eSmart School
Key points
![Page 11: Cyebrsafety webinar September, 2015. 2 What are other current Cyber Issues? ●Digital Identity ●Fraud ●Geo-location ●Hacker ●Identity theft ●Malware ●Phishing](https://reader030.vdocuments.mx/reader030/viewer/2022032805/56649ee85503460f94bf9c4e/html5/thumbnails/11.jpg)
11