2. The goal of this session is to give educators an overview of cyber security We will examine 3 areas Cyber Security Cyber Ethics Cyber Safety Safe Computing in Education
3. Definition Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and online information against threats Cyber Security
4. A global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news and opinions http://www.internet.com What is the Internet
5. Desktop computers Handheld computers Cell phones Digital cable Satellite television and radio ATM machines Debit cards Credit cards Global positioning devices GPS Technologies Connect to the Internet
7. It is now the role of the educator to practice safe computing in their classrooms Understand the nature and cause of cyber threats to protect yourself, your students and your school Learn how to fight cyber threats and teach your students and colleagues about cyber security Whose Job is it?
8. A code of safe and responsible behavior for the Internet Community Understanding the risks of harmful and illegal behavior online How to protect ourselves and other Internet and other Internet users from such behavior Lower Merion School District Cyber Ethics
9. There is a great need for resources for parents, educators and children for staying safe online Best Practices Dedicate one class to what is expected when going online from the school before you even go online Avoid letting students search and wander Look out for students turning off monitors quickly Instead of banning everything that the students enjoy, investigate ways in which you can use these technologies to enhance the teaching and learning experience Cyber Safety
10. Piracy Illegal use of copyrighted material such as plagiarism or illegally downloading of music, movies, text, etc. Intrusion Unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer Identity theft computer intruders intent on stealing your personal information to commit fraud or theft Types of Cyber Threats
11. Predatory behavior A person with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc. Virus a self-replicating program that spreads by inserting copies of itself into other computer code or into documents Spam unwanted messages, often automated, sent to multiple users, mailing lists, or email groups Types of Cyber Threats
12. Worm a self-replicating, self-spreading malicious computer program Trojan horse a malicious program disguised as or hidden in legitimate software Malware software designed to harm your computer Spyware software that sends information from your computer to a third party without your consent Types of Cyber Threats
13. Illegal download or redistribution of copyrighted material May result in legal fines, job loss, or court action Intrusion into a school network May result in data alteration, identify theft, or destruction of school materials Effects of Cyber Threats
14. Clicking on pop-up window May result in spam sent to your e-mail address and others in your address book Virus, Malware or Trojan Horse May result in destruction of your data, computer or your school’s entire network Effects of Cyber Threats
15. Create a strong password Use letters, numbers and special characters Mathew12!goals Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions and text messages are not private Use caution when opening an unexpected e-mail Protect Against Cyber Threats
16. Regular back-up of data Be wary of file sharing Including sharing your computer with others Update your anti-virus program, virus definitions and anti-spyware software Use and maintain a firewall Protect Against Cyber Threats
17. Protect Against Cyber Threats Set your Web browser’s security option to a high level of safety
18. Enable pop-up blockers When idle, disconnect your computer from the Internet Take care when opening attachments E-mail Chat rooms Text messaging Update your computer for the latest security patches for the software and operating system you use Protect Against Cyber Threats
19. You can incorporate short lessons and techniques about cyber security as you teach various subjects Teaching Cyber Security
20. Incorporate short lessons or techniques regarding cyber security throughout the curriculum Other ideas??? Teaching Cyber Security