SlideShare a Scribd company logo
1 of 21
The Educator’s Role inSafe Computing Jana Baxter Ann Noonen
The goal of this session is to give educators an overview of cyber security We will examine 3 areas Cyber Security Cyber Ethics Cyber Safety Safe Computing in Education
Definition Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and online information against threats Cyber Security
A global network that connects over one billion people and more than 600  million computers.  More than 100 countries are linked into exchanges of data, news and opinions http://www.internet.com What is the Internet
Desktop computers Handheld computers Cell phones Digital cable Satellite television and radio ATM machines Debit cards Credit cards Global positioning devices GPS  Technologies Connect to the Internet
Teacher Authority figure Facilitator Mentor Counselor Protector Educators Play Many Roles
It is now the role of the educator to practice safe computing in their classrooms Understand the nature and cause of cyber threats to protect yourself, your students and your school Learn how to fight cyber threats and teach your students and colleagues about cyber security Whose Job is it?
A code of safe and responsible behavior for the Internet Community Understanding the risks of harmful and illegal behavior online How to protect ourselves and other Internet and other Internet users from such behavior Lower Merion School District Cyber Ethics
There is a great need for resources for parents, educators and children for staying safe online Best Practices Dedicate one class to what is expected when going online from the school before you even go online Avoid letting students search and wander Look out for students turning off monitors quickly Instead of banning everything that the students enjoy, investigate ways in which you can use these technologies to enhance the teaching and learning experience Cyber Safety
Piracy  Illegal use of copyrighted material such as plagiarism or illegally downloading of music, movies, text, etc. Intrusion Unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer Identity theft computer intruders intent on stealing your personal information to commit fraud or theft Types of Cyber Threats
Predatory behavior A person with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc. Virus a self-replicating program that spreads by inserting copies of itself into other computer code or into documents Spam unwanted messages, often automated, sent to multiple users, mailing lists, or email groups Types of Cyber Threats
Worm a self-replicating, self-spreading malicious computer program Trojan horse a malicious program disguised as or hidden in legitimate software Malware software designed to harm your computer Spyware software that sends information from your computer to a third party without your consent Types of Cyber Threats
Illegal download or redistribution of copyrighted material May result in legal fines, job loss, or court action Intrusion into a school network May result in data alteration, identify theft, or destruction of school materials Effects of Cyber Threats
Clicking on pop-up window May result in spam sent to your e-mail address and others in your address book Virus, Malware or Trojan Horse May result in destruction of your data, computer or your school’s entire network Effects of Cyber Threats
Create a strong password Use letters, numbers and special characters Mathew12!goals Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions and text messages are not private Use caution when opening an unexpected e-mail Protect Against Cyber Threats
Regular back-up of data Be wary of file sharing Including sharing your computer with others Update your anti-virus program, virus definitions and anti-spyware software Use and maintain a firewall Protect Against Cyber Threats
Protect Against Cyber Threats Set your Web browser’s security option to a high level of safety
Enable pop-up blockers When idle, disconnect your computer from the Internet Take care when opening attachments E-mail Chat rooms Text messaging Update your computer for the latest security patches for the software and operating system you use Protect Against Cyber Threats
You can incorporate short lessons and techniques about cyber security as you teach various subjects Teaching Cyber Security
Incorporate short lessons or techniques regarding cyber security throughout the curriculum Other ideas??? Teaching Cyber Security
http://www.us-cert.gov http://www.mysecurecyberspace.com http://www.webopedia.com http://www.internet.com http://www.csialliance.org http://www.cyber-safety.com References

More Related Content

What's hot

Computer security
Computer securityComputer security
Computer securityfiza1975
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas InformáticaDani Díaz
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoPILARSUREZMENESES
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accountstechexpert2345
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber securitybrn8brwn
 

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
P7 unit 3
P7 unit 3 P7 unit 3
P7 unit 3
 
Review unit 2 tecnology 2 eso
Review unit 2 tecnology 2 esoReview unit 2 tecnology 2 eso
Review unit 2 tecnology 2 eso
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Email threats
Email threatsEmail threats
Email threats
 
Security
SecuritySecurity
Security
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 

Viewers also liked

Montaje y configuracion del pc
Montaje y configuracion del pcMontaje y configuracion del pc
Montaje y configuracion del pcEsteban Bedoya
 
Algoritmos y programas super manual de algoritmia
Algoritmos y programas   super manual de algoritmiaAlgoritmos y programas   super manual de algoritmia
Algoritmos y programas super manual de algoritmiaEsteban Bedoya
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedSiddharth Bhattacharya
 
Telecomdemopack 111011210800-phpapp02
Telecomdemopack 111011210800-phpapp02Telecomdemopack 111011210800-phpapp02
Telecomdemopack 111011210800-phpapp02Brawin Joshua
 
Taller cross docking[1][1]
Taller cross docking[1][1]Taller cross docking[1][1]
Taller cross docking[1][1]colsabi
 
Product Work Logs
Product Work LogsProduct Work Logs
Product Work LogsHaley Keen
 
Brønshøj skole kvalitetsrapport 2010
Brønshøj skole  kvalitetsrapport 2010Brønshøj skole  kvalitetsrapport 2010
Brønshøj skole kvalitetsrapport 2010Krumso
 
Gode Bilder 18127
Gode Bilder 18127Gode Bilder 18127
Gode Bilder 18127jaal
 
Zone 40 – 10 år efter
Zone 40 – 10 år efterZone 40 – 10 år efter
Zone 40 – 10 år efterCyclingEmbassy
 
Workshop om webdesign | e360 på Bornholm
Workshop om webdesign | e360 på BornholmWorkshop om webdesign | e360 på Bornholm
Workshop om webdesign | e360 på BornholmMette Sandgaard
 
Cykelutbildning i Malmø 2004-2006
Cykelutbildning i Malmø 2004-2006Cykelutbildning i Malmø 2004-2006
Cykelutbildning i Malmø 2004-2006CyclingEmbassy
 

Viewers also liked (20)

CyBeR sAfEtY
CyBeR sAfEtYCyBeR sAfEtY
CyBeR sAfEtY
 
Chat room 01
Chat room 01Chat room 01
Chat room 01
 
Acelerando windows
Acelerando windowsAcelerando windows
Acelerando windows
 
Montaje y configuracion del pc
Montaje y configuracion del pcMontaje y configuracion del pc
Montaje y configuracion del pc
 
Chat Room Safety
Chat Room SafetyChat Room Safety
Chat Room Safety
 
Algoritmos y programas super manual de algoritmia
Algoritmos y programas   super manual de algoritmiaAlgoritmos y programas   super manual de algoritmia
Algoritmos y programas super manual de algoritmia
 
Hacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques UsedHacking A Web Site And Secure Web Server Techniques Used
Hacking A Web Site And Secure Web Server Techniques Used
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
5, east austin metrics
5, east austin metrics5, east austin metrics
5, east austin metrics
 
Det Gode Billede
Det Gode BilledeDet Gode Billede
Det Gode Billede
 
Telecomdemopack 111011210800-phpapp02
Telecomdemopack 111011210800-phpapp02Telecomdemopack 111011210800-phpapp02
Telecomdemopack 111011210800-phpapp02
 
Taller cross docking[1][1]
Taller cross docking[1][1]Taller cross docking[1][1]
Taller cross docking[1][1]
 
Product Work Logs
Product Work LogsProduct Work Logs
Product Work Logs
 
Brønshøj skole kvalitetsrapport 2010
Brønshøj skole  kvalitetsrapport 2010Brønshøj skole  kvalitetsrapport 2010
Brønshøj skole kvalitetsrapport 2010
 
Langsomheden
LangsomhedenLangsomheden
Langsomheden
 
Gode Bilder 18127
Gode Bilder 18127Gode Bilder 18127
Gode Bilder 18127
 
Zone 40 – 10 år efter
Zone 40 – 10 år efterZone 40 – 10 år efter
Zone 40 – 10 år efter
 
Workshop om webdesign | e360 på Bornholm
Workshop om webdesign | e360 på BornholmWorkshop om webdesign | e360 på Bornholm
Workshop om webdesign | e360 på Bornholm
 
Innovation på fyn
Innovation på fynInnovation på fyn
Innovation på fyn
 
Cykelutbildning i Malmø 2004-2006
Cykelutbildning i Malmø 2004-2006Cykelutbildning i Malmø 2004-2006
Cykelutbildning i Malmø 2004-2006
 

Similar to 02 Educators Role

CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWBilly Warero
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantagesRadhika Sharma
 
Internet-Safety-1.pptx
Internet-Safety-1.pptxInternet-Safety-1.pptx
Internet-Safety-1.pptxAnnaRicaSicang
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptvisik2
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAnoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptfaadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptssuser77bda9
 

Similar to 02 Educators Role (20)

cyber_security
cyber_securitycyber_security
cyber_security
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Protect
ProtectProtect
Protect
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Cyber security and its advantages
Cyber security and its advantagesCyber security and its advantages
Cyber security and its advantages
 
Internet-Safety-1.pptx
Internet-Safety-1.pptxInternet-Safety-1.pptx
Internet-Safety-1.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Computer security
Computer securityComputer security
Computer security
 
User wareness
User warenessUser wareness
User wareness
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

02 Educators Role

  • 1. The Educator’s Role inSafe Computing Jana Baxter Ann Noonen
  • 2. The goal of this session is to give educators an overview of cyber security We will examine 3 areas Cyber Security Cyber Ethics Cyber Safety Safe Computing in Education
  • 3. Definition Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and online information against threats Cyber Security
  • 4. A global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news and opinions http://www.internet.com What is the Internet
  • 5. Desktop computers Handheld computers Cell phones Digital cable Satellite television and radio ATM machines Debit cards Credit cards Global positioning devices GPS Technologies Connect to the Internet
  • 6. Teacher Authority figure Facilitator Mentor Counselor Protector Educators Play Many Roles
  • 7. It is now the role of the educator to practice safe computing in their classrooms Understand the nature and cause of cyber threats to protect yourself, your students and your school Learn how to fight cyber threats and teach your students and colleagues about cyber security Whose Job is it?
  • 8. A code of safe and responsible behavior for the Internet Community Understanding the risks of harmful and illegal behavior online How to protect ourselves and other Internet and other Internet users from such behavior Lower Merion School District Cyber Ethics
  • 9. There is a great need for resources for parents, educators and children for staying safe online Best Practices Dedicate one class to what is expected when going online from the school before you even go online Avoid letting students search and wander Look out for students turning off monitors quickly Instead of banning everything that the students enjoy, investigate ways in which you can use these technologies to enhance the teaching and learning experience Cyber Safety
  • 10. Piracy Illegal use of copyrighted material such as plagiarism or illegally downloading of music, movies, text, etc. Intrusion Unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer Identity theft computer intruders intent on stealing your personal information to commit fraud or theft Types of Cyber Threats
  • 11. Predatory behavior A person with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc. Virus a self-replicating program that spreads by inserting copies of itself into other computer code or into documents Spam unwanted messages, often automated, sent to multiple users, mailing lists, or email groups Types of Cyber Threats
  • 12. Worm a self-replicating, self-spreading malicious computer program Trojan horse a malicious program disguised as or hidden in legitimate software Malware software designed to harm your computer Spyware software that sends information from your computer to a third party without your consent Types of Cyber Threats
  • 13. Illegal download or redistribution of copyrighted material May result in legal fines, job loss, or court action Intrusion into a school network May result in data alteration, identify theft, or destruction of school materials Effects of Cyber Threats
  • 14. Clicking on pop-up window May result in spam sent to your e-mail address and others in your address book Virus, Malware or Trojan Horse May result in destruction of your data, computer or your school’s entire network Effects of Cyber Threats
  • 15. Create a strong password Use letters, numbers and special characters Mathew12!goals Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions and text messages are not private Use caution when opening an unexpected e-mail Protect Against Cyber Threats
  • 16. Regular back-up of data Be wary of file sharing Including sharing your computer with others Update your anti-virus program, virus definitions and anti-spyware software Use and maintain a firewall Protect Against Cyber Threats
  • 17. Protect Against Cyber Threats Set your Web browser’s security option to a high level of safety
  • 18. Enable pop-up blockers When idle, disconnect your computer from the Internet Take care when opening attachments E-mail Chat rooms Text messaging Update your computer for the latest security patches for the software and operating system you use Protect Against Cyber Threats
  • 19. You can incorporate short lessons and techniques about cyber security as you teach various subjects Teaching Cyber Security
  • 20. Incorporate short lessons or techniques regarding cyber security throughout the curriculum Other ideas??? Teaching Cyber Security
  • 21. http://www.us-cert.gov http://www.mysecurecyberspace.com http://www.webopedia.com http://www.internet.com http://www.csialliance.org http://www.cyber-safety.com References