SlideShare a Scribd company logo
1 of 20
The Educator’s Role inSafe Computing Jana Baxter Ann Noonen
The goal of this session is to give educators an overview of cyber security We will examine 3 areas Cyber Security Cyber Ethics Cyber Safety Safe Computing in Education
Definition Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and on-line information against threats Cyber Security
A global network that connects over one billion people and more than 600  million computers.  More than 100 countries are linked into exchanges of data, news and opinions http://www.internet.com What is the Internet
Desktop computers Hand-held computers Cell phones Digital cable Satellite television and radio ATM machines Debit cards Credit cards Global positioning devices GPS  Technologies Connect to the Internet
Teacher Authority figure Facilitator Mentor Counselor Protector Educators Play Many Roles
It is now the role of the educator to practice safe computing in their classrooms Understand the nature and cause of cyber threats to protect yourself, your students and your school Learn how to fight cyber threats and teach your students and colleagues about cyber security Whose Job is it?
A code of safe and responsible behavior for the Internet Community Understanding the risks of harmful and illegal behavior online How to protect ourselves and other Internet and other Internet users from such behavior Lower Merion School District Cyber Ethics
Piracy  Illegal use of copyrighted material such as plagiarism or illegally downloading of music, movies, text, etc. Intrusion Unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer Identity theft computer intruders intent on stealing your personal information to commit fraud or theft Types of Cyber Threats
Predatory behavior Aperson with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc. Virus a self-replicating program that spreads by inserting copies of itself into other computer code or into documents Spam unwanted messages, often automated, sent to multiple users, mailing lists, or email groups Types of Cyber Threats
Worm a self-replicating, self-spreading malicious computer program Trojan horse a malicious program disguised as or hidden in legitimate software Malware software designed to harm your computer Spyware software that sends information from your computer to a third party without your consent Types of Cyber Threats
Illegal download or redistribution of copyrighted material May result in legal fines, job loss, or court action Intrusion into a school network May result in data alteration, identify theft, or destruction of school materials Effects of Cyber Threats
Clicking on pop-up window May result in spam sent to your e-mail address and others in your address book Virus, Malware or Trojan Horse May result in destruction or your data, computer or your school’s entire network Effects of Cyber Threats
Create a strong password Use letters, numbers and special characters Mathew12!goals Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions and text messages are not private Use caution when opening an unexpected e-mail Protect Against Cyber Threats
Regular back-up of data Be wary of file sharing Including sharing your computer with others Update your anti-virus program, virus definitions and anti-spyware software Use and maintain a firewall Protect Against Cyber Threats
Protect Against Cyber Threats Set your Web browser’s security option to a high level of safety
Enable pop-up blockers When idle, disconnect your computer from the Internet Take care when opening attachments E-mail Chat rooms Text messaging Update your computer for the latest security patches for the software and operating system you use Protect Against Cyber Threats
You can incorporate short lessons and techniques about cyber security as you teach various subjects Teaching Cyber Security
Incorporate short lessons or techniques regarding cyber security throughout the curriculum Other ideas??? Teaching Cyber Security
http://www.us-cert.gov http://www.mysecurecyberspace.com http://www.webopedia.com http://www.internet.com http://www.csialliance.org References

More Related Content

What's hot

Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoPILARSUREZMENESES
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPTNitesh Dubey
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrimeRahul Sharma
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threadsVdidv
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
cyber-security course outline
cyber-security course outlinecyber-security course outline
cyber-security course outlineShoaibBhattiM
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Internet security terms and definitions
Internet security terms and definitionsInternet security terms and definitions
Internet security terms and definitionsRozell Sneede
 

What's hot (20)

Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrime
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
cyber-security course outline
cyber-security course outlinecyber-security course outline
cyber-security course outline
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Network security
Network securityNetwork security
Network security
 
Internet security terms and definitions
Internet security terms and definitionsInternet security terms and definitions
Internet security terms and definitions
 

Viewers also liked

Interpret Company Overview
Interpret Company OverviewInterpret Company Overview
Interpret Company Overviewdowlingmi01
 
Prefer Able Staffing Companies Overview
Prefer Able Staffing Companies OverviewPrefer Able Staffing Companies Overview
Prefer Able Staffing Companies OverviewBroberts331
 
Companies Act 2006 - Key points
Companies Act 2006 - Key pointsCompanies Act 2006 - Key points
Companies Act 2006 - Key pointsMartinFrost
 
Fast Boot Times with InsydeH2O
Fast Boot Times with InsydeH2OFast Boot Times with InsydeH2O
Fast Boot Times with InsydeH2Oinsydesoftware
 
Technology: Challenges and Opportunities for Company Secretary
Technology: Challenges and Opportunities for Company SecretaryTechnology: Challenges and Opportunities for Company Secretary
Technology: Challenges and Opportunities for Company SecretaryPavan Kumar Vijay
 
Esencia Company Overview - A leading design Services company in the bayarea
Esencia Company Overview - A leading design Services company in the bayareaEsencia Company Overview - A leading design Services company in the bayarea
Esencia Company Overview - A leading design Services company in the bayareaesenciatech
 
Xuber Company Overview
Xuber Company OverviewXuber Company Overview
Xuber Company OverviewXuber
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Linaro
 
Companies Bill 2012 : Overview of Modern Company Law
Companies Bill 2012 : Overview of Modern Company LawCompanies Bill 2012 : Overview of Modern Company Law
Companies Bill 2012 : Overview of Modern Company LawPavan Kumar Vijay
 
International Business and Marketing
International Business and Marketing International Business and Marketing
International Business and Marketing Qamar Farooq
 
Optimum branding company overview
Optimum branding company overviewOptimum branding company overview
Optimum branding company overviewAF Designz
 
Sample Company Overview Presentation
Sample Company Overview PresentationSample Company Overview Presentation
Sample Company Overview PresentationJulie Grosse
 
Neoris Company Overview
Neoris Company OverviewNeoris Company Overview
Neoris Company OverviewNEORIS
 
Performance lab company overview
Performance lab company overviewPerformance lab company overview
Performance lab company overviewGeorge Kovalov
 
2009 Company Overview Paetec
2009 Company Overview Paetec2009 Company Overview Paetec
2009 Company Overview Paetecscolucci
 

Viewers also liked (18)

Interpret Company Overview
Interpret Company OverviewInterpret Company Overview
Interpret Company Overview
 
Prefer Able Staffing Companies Overview
Prefer Able Staffing Companies OverviewPrefer Able Staffing Companies Overview
Prefer Able Staffing Companies Overview
 
Neo company overview presentation 2014 08 14
Neo company overview presentation   2014 08 14Neo company overview presentation   2014 08 14
Neo company overview presentation 2014 08 14
 
Companies Act 2006 - Key points
Companies Act 2006 - Key pointsCompanies Act 2006 - Key points
Companies Act 2006 - Key points
 
Fast Boot Times with InsydeH2O
Fast Boot Times with InsydeH2OFast Boot Times with InsydeH2O
Fast Boot Times with InsydeH2O
 
Technology: Challenges and Opportunities for Company Secretary
Technology: Challenges and Opportunities for Company SecretaryTechnology: Challenges and Opportunities for Company Secretary
Technology: Challenges and Opportunities for Company Secretary
 
Esencia Company Overview - A leading design Services company in the bayarea
Esencia Company Overview - A leading design Services company in the bayareaEsencia Company Overview - A leading design Services company in the bayarea
Esencia Company Overview - A leading design Services company in the bayarea
 
Xuber Company Overview
Xuber Company OverviewXuber Company Overview
Xuber Company Overview
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_
 
Companies Bill 2012 : Overview of Modern Company Law
Companies Bill 2012 : Overview of Modern Company LawCompanies Bill 2012 : Overview of Modern Company Law
Companies Bill 2012 : Overview of Modern Company Law
 
International Business and Marketing
International Business and Marketing International Business and Marketing
International Business and Marketing
 
Optimum branding company overview
Optimum branding company overviewOptimum branding company overview
Optimum branding company overview
 
Company profile
Company profileCompany profile
Company profile
 
Sample Company Overview Presentation
Sample Company Overview PresentationSample Company Overview Presentation
Sample Company Overview Presentation
 
Neoris Company Overview
Neoris Company OverviewNeoris Company Overview
Neoris Company Overview
 
Performance lab company overview
Performance lab company overviewPerformance lab company overview
Performance lab company overview
 
2009 Company Overview Paetec
2009 Company Overview Paetec2009 Company Overview Paetec
2009 Company Overview Paetec
 
Final company overview 2014
Final company overview 2014Final company overview 2014
Final company overview 2014
 

Similar to 02 Educators Role

3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantagesRadhika Sharma
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptvisik2
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossarythinkict
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Internet-Safety-1.pptx
Internet-Safety-1.pptxInternet-Safety-1.pptx
Internet-Safety-1.pptxAnnaRicaSicang
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAnoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptfaadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 

Similar to 02 Educators Role (20)

cyber_security
cyber_securitycyber_security
cyber_security
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Computer security
Computer securityComputer security
Computer security
 
Protect
ProtectProtect
Protect
 
Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
User wareness
User warenessUser wareness
User wareness
 
Internet-Safety-1.pptx
Internet-Safety-1.pptxInternet-Safety-1.pptx
Internet-Safety-1.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

02 Educators Role

  • 1. The Educator’s Role inSafe Computing Jana Baxter Ann Noonen
  • 2. The goal of this session is to give educators an overview of cyber security We will examine 3 areas Cyber Security Cyber Ethics Cyber Safety Safe Computing in Education
  • 3. Definition Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and on-line information against threats Cyber Security
  • 4. A global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news and opinions http://www.internet.com What is the Internet
  • 5. Desktop computers Hand-held computers Cell phones Digital cable Satellite television and radio ATM machines Debit cards Credit cards Global positioning devices GPS Technologies Connect to the Internet
  • 6. Teacher Authority figure Facilitator Mentor Counselor Protector Educators Play Many Roles
  • 7. It is now the role of the educator to practice safe computing in their classrooms Understand the nature and cause of cyber threats to protect yourself, your students and your school Learn how to fight cyber threats and teach your students and colleagues about cyber security Whose Job is it?
  • 8. A code of safe and responsible behavior for the Internet Community Understanding the risks of harmful and illegal behavior online How to protect ourselves and other Internet and other Internet users from such behavior Lower Merion School District Cyber Ethics
  • 9. Piracy Illegal use of copyrighted material such as plagiarism or illegally downloading of music, movies, text, etc. Intrusion Unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer Identity theft computer intruders intent on stealing your personal information to commit fraud or theft Types of Cyber Threats
  • 10. Predatory behavior Aperson with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc. Virus a self-replicating program that spreads by inserting copies of itself into other computer code or into documents Spam unwanted messages, often automated, sent to multiple users, mailing lists, or email groups Types of Cyber Threats
  • 11. Worm a self-replicating, self-spreading malicious computer program Trojan horse a malicious program disguised as or hidden in legitimate software Malware software designed to harm your computer Spyware software that sends information from your computer to a third party without your consent Types of Cyber Threats
  • 12. Illegal download or redistribution of copyrighted material May result in legal fines, job loss, or court action Intrusion into a school network May result in data alteration, identify theft, or destruction of school materials Effects of Cyber Threats
  • 13. Clicking on pop-up window May result in spam sent to your e-mail address and others in your address book Virus, Malware or Trojan Horse May result in destruction or your data, computer or your school’s entire network Effects of Cyber Threats
  • 14. Create a strong password Use letters, numbers and special characters Mathew12!goals Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions and text messages are not private Use caution when opening an unexpected e-mail Protect Against Cyber Threats
  • 15. Regular back-up of data Be wary of file sharing Including sharing your computer with others Update your anti-virus program, virus definitions and anti-spyware software Use and maintain a firewall Protect Against Cyber Threats
  • 16. Protect Against Cyber Threats Set your Web browser’s security option to a high level of safety
  • 17. Enable pop-up blockers When idle, disconnect your computer from the Internet Take care when opening attachments E-mail Chat rooms Text messaging Update your computer for the latest security patches for the software and operating system you use Protect Against Cyber Threats
  • 18. You can incorporate short lessons and techniques about cyber security as you teach various subjects Teaching Cyber Security
  • 19. Incorporate short lessons or techniques regarding cyber security throughout the curriculum Other ideas??? Teaching Cyber Security
  • 20. http://www.us-cert.gov http://www.mysecurecyberspace.com http://www.webopedia.com http://www.internet.com http://www.csialliance.org References