Internet Safety Pitfalls and Dangers

Ramiro Govea
7 Aug 201216:46

Summary

TLDRThis video script serves as a cautionary guide to navigating the internet safely. It compares the online world to a city with various neighborhoods, some safe and others dangerous. The script warns against 'bad neighborhood' websites that may scam, steal personal information, or spread false information. It advises on safe social networking, emphasizing the importance of privacy settings and not sharing sensitive personal details. The video also covers the risks of online predators, the dangers of sharing personal information, and the potential long-term consequences of online posts. It provides tips for secure online shopping, recognizing phishing scams, and dealing with cyberbullying, ultimately urging viewers to exercise common sense and caution in the digital realm.

Takeaways

  • 🏠 The internet has 'neighborhoods' that can be safe or dangerous, similar to real cities.
  • ⚠️ Be cautious of websites that make unrealistic claims, contain illegal content, or aim to steal personal information.
  • πŸ”’ Social network sites can be risky if you don't control who can see your information.
  • πŸ‘€ Never reveal sensitive personal details like your last name, address, or passwords online.
  • πŸ“ Be aware that online posts can have long-lasting effects and be seen by a wide audience.
  • πŸ›’ When shopping online, ensure the site is secure (https, lock icon) and belongs to a reputable retailer.
  • 🎣 Beware of 'phishing' scams that trick you into revealing personal information through fake emails or websites.
  • 🐠 Fishing scams are not about fish, but about stealing your personal and financial information.
  • πŸ—£οΈ Cyberbullying can have serious real-world consequences and is a form of immature behavior.
  • πŸ‘₯ If meeting an online acquaintance, choose a public place with many people and consider bringing a friend or parent.

Q & A

  • What are some risks associated with visiting certain websites online?

    -Risks include encountering sites that make unrealistic claims, contain illegal or immoral content, or are designed to steal personal information such as Social Security and credit card numbers.

  • Why are social network sites considered a potential 'bad neighborhood' on the internet?

    -Social network sites can be risky because they may contain unreliable information, be used to obtain personal details for spamming, or even harbor criminals who disguise their identities to target victims.

  • What is the importance of limiting access to your page on social network sites?

    -Limiting access helps to weed out undesirable individuals by controlling who can see your page and information, thus enhancing privacy and security.

  • Why should you be cautious about the information you post online?

    -Online postings can be saved and resent, potentially reaching a worldwide audience, and they can last for years, impacting your personal and professional life.

  • What safety tips are suggested when interacting with online acquaintances?

    -Never reveal personal details like your last name, address, or passwords, and avoid meeting online acquaintances in person, especially in secluded places.

  • How can you protect your credit card information when shopping online?

    -Ensure the website uses https, look for a lock icon, and verify that the site is part of a well-known retailer with a physical address and a clear return policy.

  • What is phishing and how can it be identified?

    -Phishing is a scam where criminals send emails pretending to be from a bank or financial institution to steal personal data. It's often identified by urgent requests to act and links to fake websites that ask for sensitive information.

  • What are the potential consequences of cyberbullying?

    -Consequences can range from humiliation and harassment to more severe outcomes like suicides, serious assaults, murder, and school expulsions.

  • What should you do if you are targeted by a cyberbully?

    -Ignore the bully, block the sender if it's an email or message, and report serious threats to a parent, school counselor, or the police.

  • Why is it advised to keep your chat room handle or IM screen name from revealing your identity?

    -Revealing too much information in your handle or screen name can pose serious risks by making it easier for criminals to deduce your full identity and potentially stalk or harm you.

  • What is the significance of the 's' in 'https' when making online purchases?

    -The 's' stands for secure, indicating that the site is encrypted and uses special software to protect your information, making it more difficult for criminals to steal data during transactions.

Outlines

00:00

🌐 Internet Safety and Social Media

This paragraph discusses the similarities between neighborhoods in a city and websites on the internet, highlighting that while most are safe, some can be dangerous. It warns against websites that make unrealistic claims, contain illegal or immoral content, or aim to steal personal information. The paragraph also addresses the potential risks of social networking sites, where criminals may pose as trustworthy individuals to deceive users. It advises on precautions such as limiting access to personal pages, not revealing sensitive personal information, and being cautious about the longevity of online posts that could be seen by a wide audience, including potential employers and authorities.

05:01

πŸ›‘οΈ Protecting Yourself Online

The second paragraph provides safety tips for online interactions, emphasizing the importance of ending conversations that make one feel uncomfortable and reporting them to a trusted adult. It advises against sharing phone numbers with online acquaintances due to the risk of being tracked. The paragraph also warns against meeting online friends in person, especially in isolated locations, and suggests public places with other people present as safer alternatives. It discusses the importance of secure online shopping, looking for 'https' in the website address and a lock icon as indicators of a secure site, and checking for a retailer's physical address and clear return policies.

10:05

🐟 Phishing Scams and Cyberbullying

This paragraph focuses on phishing scams where criminals send deceptive emails to steal sensitive information like Social Security numbers and credit card details. It explains that these scams often use urgency and fake links to trick victims. The paragraph also addresses cyberbullying, detailing the negative impacts it can have, including suicides and serious legal consequences. It provides advice on how to handle cyberbullying, such as ignoring it, blocking the sender, and reporting threats to authorities.

15:08

πŸ”’ Final Safety Precautions for Online Activities

The final paragraph reiterates the importance of following safety rules online to avoid dangerous situations. It emphasizes the need for controlling who can see one's social network page, not sharing personal details with online acquaintances, and being cautious about meeting online friends in person. It also highlights the importance of recognizing phishing schemes and the need to report threats from cyberbullies. The paragraph concludes by encouraging the exercise of common sense and caution to enjoy the internet safely.

Mindmap

Keywords

πŸ’‘Cyberspace

Cyberspace refers to the virtual environment created by computer networks, particularly the internet. In the context of the video, it underscores the distinction between the physical and digital realms, highlighting the potential risks of online interactions. The video mentions that what appears on a monitor in cyberspace may not reflect real-world realities, indicating the need for caution in online activities.

πŸ’‘Personal Information

Personal information encompasses details such as Social Security numbers, credit card details, and home addresses. The video stresses the importance of safeguarding this data to prevent identity theft and fraud. It warns against sharing such sensitive information on unsecured websites or with untrustworthy individuals online.

πŸ’‘Social Networking Sites

Social networking sites are online platforms that allow users to connect, communicate, and share information. The video uses these sites as a focal point to discuss the potential dangers of online interactions, such as encountering criminals who may disguise their identities to target victims. It also offers advice on how to use these sites safely.

πŸ’‘Cyber Bullying

Cyber bullying is the use of electronic communication to harass, threaten, or intimidate others. The video addresses this issue, explaining that it can take various forms, including blogs, social media posts, and text messages. It provides guidance on how to handle such situations, emphasizing the importance of reporting threats to authorities.

πŸ’‘Online Predators

Online predators are individuals who exploit the internet to deceive and harm others, often targeting children and teenagers. The video script mentions the uncovering of criminals on social network sites, illustrating the real-world consequences of interacting with such individuals. It advises on precautions to take to avoid becoming a victim.

πŸ’‘Phishing Scams

Phishing scams involve fraudulent attempts to obtain sensitive information, such as usernames, passwords, and credit card details, often by disguising as a trustworthy entity in electronic communications. The video explains how these scams work and the importance of recognizing and avoiding them to protect personal and financial information.

πŸ’‘Secure Websites

Secure websites are those that use encryption to protect the privacy and integrity of the exchanged information. The video highlights the importance of looking for 'https' in the web address and a lock icon as indicators of a secure site, especially when making online purchases or providing personal information.

πŸ’‘Digital Footprint

A digital footprint refers to the trail of data left by an individual's online activities. The video script emphasizes that online postings can have long-lasting effects, potentially impacting future opportunities such as employment or education. It advises users to be mindful of the information they share online.

πŸ’‘Cybersecurity

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. The video touches on various cybersecurity measures, such as using secure websites and being cautious about sharing personal information, to safeguard against online threats.

πŸ’‘Online Etiquette

Online etiquette refers to the norms and rules for responsible and respectful behavior on the internet. The video script indirectly addresses this concept by discussing the importance of not revealing personal information and the potential harm caused by cyber bullying, suggesting that users should act ethically and considerately in online environments.

πŸ’‘Digital Identity

Digital identity is the online representation of oneself, which can include screen names, avatars, and other identifiers. The video warns against using screen names or handles that reveal too much personal information, as this can make individuals vulnerable to identity theft or stalking.

Highlights

The internet has areas similar to dangerous neighborhoods in cities.

Some websites make unrealistic claims or contain illegal content.

Personal information theft is a common threat on the internet.

Social network sites can be safe if certain precautions are taken.

Limiting access to your page on social networks is crucial.

Never reveal personal details like last name or address online.

Online posts can have long-lasting effects on your reputation.

Cyber bullies use various platforms to harass or humiliate others.

Cyber bullying can lead to severe real-world consequences.

Secure online shopping requires checking for 'https' and a lock icon.

Phishing scams often start with emails pretending to be from financial institutions.

Deleting suspicious emails is the best course of action.

Cyber bullies are often younger and hide behind a computer.

Ignoring cyber bullies is generally the best response.

Meeting online acquaintances in person can be dangerous.

If meeting online acquaintances, choose public places with others present.

Exercise caution and common sense for safe internet use.

Transcripts

play00:11

[Music]

play00:22

[Music]

play00:35

if you travel around any large city

play00:37

you'll probably find a rich variety of

play00:40

neighborhoods some may have expensive

play00:43

homes on Treeline streets others may be

play00:46

nice but not quite so exclusive still

play00:49

others may be extremely

play00:51

dangerous places you undoubtedly would

play00:54

never want to visit the internet at

play00:57

least in one respect is a lot like those

play01:00

ities While most websites like most

play01:02

neighborhoods are perfectly fine others

play01:05

are online locations you would be well

play01:07

advised to avoid some of these so-called

play01:11

bad neighborhood sites may make

play01:13

unrealistic claims to entice you into

play01:15

making an unwise

play01:18

[Music]

play01:21

purchase or their content may be illegal

play01:24

or immoral or their sole purpose may be

play01:27

to steal your personal information such

play01:29

as as Social Security and credit card

play01:32

numbers we'll discuss these sites in

play01:34

more detail in a few minutes some other

play01:37

bad neighborhood websites may contain

play01:40

completely outrageous and unreliable

play01:46

information or may be placed online to

play01:48

obtain your email address in order to

play01:51

barrage you later with scores of

play01:53

unwanted emails that try to sell you

play01:55

something

play01:57

[Music]

play02:01

some websites are safe but only if you

play02:04

follow some precautions social network

play02:07

sites are notable examples if you're one

play02:10

of the millions of people who visit a

play02:12

social network site each day you know

play02:14

that they're a great way to keep track

play02:16

of

play02:18

Friends make

play02:21

plans share your

play02:23

thoughts and perhaps make some new

play02:27

friends but there can be a side because

play02:31

what you see on your monitor it's in

play02:33

cyberspace after all doesn't necessarily

play02:36

reflect what's in the real world in fact

play02:39

some news accounts have reported that a

play02:41

major social network site uncovered some

play02:45

29,000 criminals some extremely

play02:48

dangerous who disguise their true

play02:50

identity to Target victims most of these

play02:53

criminals are expert Liars who know how

play02:56

to cultivate your trust so clearly some

play02:59

cautionary action is in order first

play03:03

you'll want to limit access to your page

play03:05

to weed out undesirable individuals that

play03:09

means choosing a site that allows you to

play03:11

control who can see your page and your

play03:16

information now a few cautionary words

play03:19

if and when you post a blog use a chat

play03:22

room or send an instant message or email

play03:25

to an online

play03:27

acquaintance never reveal your last name

play03:31

address phone number usernames or

play03:35

passwords also it's just common sense to

play03:38

post only information that you're

play03:40

comfortable having others see because

play03:43

after all in the online world it's easy

play03:45

to spread personal information far and

play03:48

wide to a worldwide audience that

play03:50

potentially numbers in the millions

play03:53

you'll want to keep in mind that

play03:55

postings including those that may seem

play03:57

funny at the time can last for years

play03:59

years decades or even longer because

play04:03

they can be downloaded saved and then

play04:05

resent in the future to family members

play04:08

including parents Teachers College

play04:11

admissions officials possible employers

play04:14

and even the police so think hard before

play04:18

posting anything that could be

play04:20

embarrassing or harmful to you both now

play04:22

and in years to come keep in mind too

play04:25

that your online words and pictures may

play04:28

be accessible to IND individuals whose

play04:30

intentions are far less than honorable

play04:33

thus an I am screen name chat room

play04:36

handle or blog ID that gives too many

play04:39

clues about your identity May pose some

play04:41

serious risks if any of your handles are

play04:45

too revealing here's an important safety

play04:47

tip seriously consider changing them

play04:50

because a clever felon might be able to

play04:52

figure out your full name and more after

play04:55

reading a few of your emails or blog

play04:57

posts for instance after digging around

play05:00

on the net he could decipher this screen

play05:03

name as Lily mandelli age 14 at

play05:07

Westfield bidd school if Lily posts some

play05:10

pictures of herself on her Social

play05:12

Network website or blog or if she emails

play05:15

her picture to a person she's met in a

play05:17

chat room or texted in an IM session

play05:20

Lily may be placing herself in Mortal

play05:23

danger that's right mortal danger police

play05:27

reports are full of examples of Vic who

play05:30

were stalked by an individual they had

play05:32

met online and then foolishly emailed

play05:35

their picture to that

play05:38

[Music]

play05:46

person now a few more safety tips before

play05:50

we move on first if anyone sends you an

play05:53

instant message or email that discusses

play05:56

private matters that make you feel

play05:58

uncomfortable it's time to end the

play06:00

conversation or correspondence and then

play06:03

tell an adult such as a parent about it

play06:06

next if an online acquaintance asks you

play06:09

to call him or her on the phone it could

play06:11

be dangerous to do so because your phone

play06:14

number can be displayed on caller ID

play06:17

then using an online reverse phone

play06:19

number service a criminal can easily

play06:22

track down your family's name and

play06:26

address finally it's not a good idea to

play06:29

meet an online acquaintance in person

play06:32

however if you do never meet him or her

play06:35

in an out ofthe way Place such as a

play06:37

forest preserve or a deserted house no

play06:40

matter what he or she says in fact any

play06:44

suggestion to meet in an uninhabited

play06:46

place should immediately raise a red

play06:49

flag if you do meet it should be where

play06:52

there are lots of people around an

play06:55

outside mall during the day would be a

play06:57

good choice and always bring along

play07:00

someone a friend or preferably a parent

play07:03

if it's a friend tell someone else where

play07:05

you're going and when you plan to return

play07:08

but again as a general rule it's best to

play07:11

keep an online buddy as a cyberspace

play07:14

friend now let's turn our attention to

play07:17

online shopping if your parents let you

play07:20

shop with their credit card to make

play07:22

online purchases you'll need to make

play07:24

certain that their credit card

play07:26

information isn't stolen one of the best

play07:28

ways to do do that is when you're

play07:30

checking out look at the website address

play07:33

bar at the top of your browser's page

play07:36

the address should start with the

play07:37

letters

play07:39

https instead of merely

play07:41

HTTP the s means the site is secured

play07:45

with special software that makes it very

play07:47

difficult to steal any information a

play07:50

browser generated lock icon on most

play07:52

checkout Pages normally means the same

play07:54

thing however some criminal programmers

play07:57

have been able to forge the s and the

play08:00

lock icon so you'll need to do more to

play08:02

be certain your credit card information

play08:04

is kept

play08:05

safe first you should make sure that the

play08:08

site is part of a well-known retailer a

play08:11

company that has a street address not

play08:13

just a post office box in addition the

play08:16

company's phone number should be posted

play08:18

in case the merchandise gets lost in

play08:20

transit or arrives broken next check to

play08:23

see that the online store has a clearly

play08:26

stated return and refund policy

play08:30

finally you should use only browsers

play08:33

such as Internet Explorer Firefox Opera

play08:36

and Netscape or Internet providers if

play08:39

possible that verify that you're going

play08:42

to a safe website if you don't take all

play08:45

these precautions there's a better than

play08:47

average chance that you'll never get

play08:49

what you ordered where's my Stu and your

play08:52

parents credit card information will

play08:54

wind up in the hands of a criminal scam

play08:56

artist who applies his trade online

play09:01

some internet criminals specialize in

play09:03

another kind of scam they send so-called

play09:06

fishing emails to unsuspecting victims

play09:09

to steal Social Security numbers credit

play09:12

card information and other private data

play09:15

that allow them to walk off with their

play09:17

victim's money and personal identities

play09:19

more often than not fishing schemes

play09:22

start with emails that claim that a bank

play09:24

or other financial institution has lost

play09:27

information on your or your parents

play09:29

account they also contain statements

play09:32

that urgently implore you to act

play09:34

immediately they generally have a link

play09:37

that's supposed to be a legitimate

play09:38

website that will clear up the problem

play09:41

but the site is fake although it may

play09:44

look like the real thing it often asks

play09:46

for names on the account Social Security

play09:49

and account numbers passwords as well as

play09:52

usernames birth dates and so on so if

play09:55

you ever get an email like this the best

play09:58

thing for you to do is

play09:59

delete

play10:05

it while some people use the internet

play10:08

for criminal activities others may go

play10:10

online to humiliate or harass classmates

play10:13

or acquaintances as you probably know

play10:16

they're called cyber bullies cyber

play10:19

bullies May create blogs website guest

play10:22

books IM postings and even cell phone

play10:25

pictures and text messages to spread

play10:28

lies transmit threats or send other

play10:31

hurtful

play10:32

communication sometimes cyber Bullies

play10:34

Are retaliating for something that's

play10:36

happened offline usually at school often

play10:39

they don't realize the full consequences

play10:41

of what they're doing similarly some

play10:44

people may think that making fun of

play10:46

others or spreading rumors about them

play10:48

online is entertaining and won't have

play10:51

any real world

play10:53

significance but they're wrong although

play10:56

rare some cyber bully events have

play10:58

resulted in

play11:01

suicides serious

play11:05

assaults

play11:08

murder and school

play11:11

expulsions a number of State

play11:13

legislatures have now passed laws that

play11:15

make some forms of cyber bullying

play11:18

criminal acts other states are

play11:20

considering similar legislation so

play11:23

clearly cyber bullying is not all fun in

play11:26

games moreover it's immature po most

play11:30

cyber Bullies Are between 9 and 14 years

play11:33

old according to the latest research

play11:35

it's rare for older teens to be cyber

play11:38

bullies they've outgrown the childish

play11:41

behavior that entails hiding behind a

play11:43

computer so what should you do if

play11:46

somebody cyber bullies you most experts

play11:49

say that as a general rule you should

play11:52

ignore it difficult as that may be if

play11:55

it's an email block the sender do the

play11:58

same if it's a a message on your social

play12:00

network site if there's a serious threat

play12:03

in a cyber bully note talk to a parent

play12:06

or parents a school counselor or call

play12:09

the police difficult as that may

play12:13

[Music]

play12:16

be the internet then can be a great

play12:19

place to learn communicate with friends

play12:22

and acquaintances and buy your favorite

play12:24

music or videos or an unlimited array of

play12:27

other items you undoubtedly already know

play12:30

that regrettably however the internet is

play12:33

also a place where undesirable and

play12:36

sometimes dangerous people may hang out

play12:39

but if you follow a few safety rules you

play12:41

can save yourself a lot of grief and

play12:44

perhaps even your life if you want a

play12:47

social network page place it on a site

play12:50

that allows you to control who can see

play12:52

it never tell an online acquaintance

play12:55

your last name address phone number

play12:59

number usernames or

play13:01

passwords post only information that you

play13:04

feel comfortable with others seeing

play13:07

remember that it's generally not a good

play13:09

idea to meet an online acquaintance in

play13:12

person but if you do make sure there are

play13:15

lots of people around during the day and

play13:18

in a public place and bring along a

play13:20

friend or parent be sure your chat room

play13:23

and IM screen names don't give away your

play13:26

identity be aware of fishing scheme

play13:30

finally remember that it's best to

play13:32

merely ignore cyber bullies but if a

play13:35

cyber bully posts a serious threat tell

play13:38

an adult about it in short you can have

play13:41

fun shop and learn a lot on the internet

play13:45

if you just exercise a little Common

play13:47

Sense

play13:48

[Music]

play13:52

caution true or false when targeting

play13:55

victims dangerous criminals disguise

play13:58

their Identity On social network

play14:04

sites three online precautions you can

play14:07

take to keep dangerous persons from

play14:09

learning your name and where you live

play14:12

are

play14:18

and online postings can last for a years

play14:24

B decades or more C both a and

play14:33

B true or false as a precaution you

play14:38

should make sure your chat room handle

play14:39

or IM screen name makes it easy to

play14:42

determine your real

play14:48

name what was Lily Mandel's

play14:55

mistake why should you never tell your

play14:58

phone number to to an online

play15:04

acquaintance fill in the blanks if you

play15:08

meet an online acquaintance the meeting

play15:10

should take place where there

play15:12

are and you should bring along

play15:15

a

play15:21

or an important safety precaution you

play15:24

can take when buying something online

play15:26

and are on the checkout page is

play15:29

a look for https in the browser address

play15:34

B look for a lock icon C both A and

play15:44

B true or false fishing scams Target

play15:48

people who eat fish

play15:55

regularly fill in the blanks if a cber

play15:59

bully message contains a threat you

play16:02

should and

play16:27

perhaps e

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
Internet SafetyOnline ScamsSocial NetworksCyber BullyingPersonal InformationOnline ShoppingCriminal ActivityPrivacy ProtectionDigital IdentityCybersecurity