1 / 17

Homeland Security

Homeland Security. Hey, It’s Me!. I’m Tek – your i-SAFE guide. I’m a part of i-SAFE. i-SAFE is concerned with teaching you how to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior.

olina
Download Presentation

Homeland Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Homeland Security

  2. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE. i-SAFE is concerned with teaching you how to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior. Also, we hope to empower you to communicate what you learn from i-SAFE with others.

  3. The Plan In this lesson, you will be learning about cyber terrorism and homeland security. You will be participating in a scavenger hunt for information and formulating your own answers to some tough questions.

  4. All Right – Let’s Get Started Today we’re going to start with a discussion. We all know that going on the Internet is getting involved in a large Cyber Community. - What are some rules we should follow?

  5. Time to Brainstorm Think of terrorism events that have happened in and to the United States such as September 11, the War on Terrorism, etc. Let’s talk about those for a minute. Now think, could the Internet be utilized as a potential weapon either by terrorists or other governments? How?

  6. Cyber Terrorism The execution of a surprise attack by a sub national foreign terrorist group, or individuals with a domestic political agenda, using computer technology and the Internet to cripple or disable a nation's electronic and physical infrastructure. Also to be considered is a physical attack aimed at the Cyber infrastructure that would also result in down time. Either way, the goal is to increase panic, fear and confusion. Can you put this in your own words so you understand it?

  7. The use of computers and other devices to attack an enemy’s information systems as opposed to an enemy’s armies or factories Cyber Warfare Now consider: how can hacking, steganography, malicious code (i.e. viruses and worms) have an impact on cyber terrorism/ cyber warfare?

  8. Let’s Look at Some Important Vocabulary Terrorism: The unlawful use or threatened use of force or violence by a person or an organized group against people or property with the intention of intimidating or coercing societies or governments, often for ideological or political reasons. Cyber community: a group of people connected through online interaction.

  9. A Few More Words to Know Infrastructure: The basic facilities, services, and installations needed for the functioning of a community or society, such as transportation and communications systems, water and power lines, and public institutions including schools, post offices, and prisons. Target Hardening: Making targets more resistant to attack or more difficult to remove or damage.

  10. Think About It! If you apply cyber security strategies, are you in effect participating in Cyber Target Hardening? How is the infrastructure of the United States largely reliant on computers to work effectively? What are the possible consequences to the infrastructure of a cyber attack?

  11. It’s time to do an activity… Divide into groups.

  12. Time for Group Work In your groups you will participate in a scavenger hunt – either online or using worksheets. Make sure to read carefully and discuss each question. Sometimes there is more then one correct answer! Also, as a group you’ll need to come up with a few guidelines on how we all can help with Homeland Security We’ll meet back here when all the groups are finished.

  13. Presentation Time Present your information to the class along with your guidelines. Then Discuss: How could a few simple guidelines make a difference in protection against a Cyber terrorist threat? As a class, come up with Five Guidelines for prevention and protection.

  14. How Do you Know When You’re Done? Have you: 1. Completed the scavenger hunt and written your guidelines? 2. Discussed with your class what you have learned? 3. As a class, written five guidelines?

  15. It doesn’t have to end here! Find out about DRiVE!

  16. Take Action It’s Easy with the i-Mentor Training Network! Visit the X-BLOCK at www.isafe.orgto learn about the i-Mentor Training Network. It’s all online! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the X-BLOCK of the i-SAFE website at www.isafe.org.

  17. Get the recognition you deserve as an i-SAFE Mentor • Enroll online at www.isafe.org by clicking on Create an Account. • Receive your own Student Toolkit and materials to get started. Take Action www.isafe.org

More Related