Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

CYBER

SAFETY
Technology Presentation
Think about and discuss the follow
scenarios. Be prepared to provide
justification for your ideas.
You want to share a photo of your school
excursion on your social media, but you're
not sure if it's appropriate. What should
you do?
You come across a
website with
inappropriate content
while doing research for
a school project. What
should you do?
A classmate shares a photo of you online
without your permission. What should you
do?
You receive a message
from someone you don't
know asking for your
personal information.
What should you do?
You see someone being
cyberbullied online.
What should you do?
You discover that someone has created a
fake profile using your name and photo
online.
What should you do?
You receive a message
from a friend telling you
to click on a link to win
a prize. What should
you do?
You accidentally click on a pop-up ad and
your computer starts acting strange. What
should you do?
You accidentally share
your personal
information with
someone you don't know
online. What should you
do?
A friend wants to share your social media
password to help you manage your
account while you're on vacation. What
should you do?
You receive an email
from someone claiming
to be a family member
in trouble and in need of
money. What should you
do?
You accidentally click on a suspicious link
that leads to a fake login page. What
should you do?
You receive a hateful
comment on your social
media video from a
cyberbully. What should
you do?
Questions & Comments?

You might also like