1 / 30

Cyber Security

Cyber Security. Level 5. Hey Everybody!. My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to be safe online.

meghan
Download Presentation

Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security Level 5

  2. Hey Everybody! My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i-SAFE with others.

  3. The PlanToday you will be learning about viruses and malicious code. For this lesson you will be designing brochures on e-mail etiquette and safety.

  4. All Right – Let’s Get Started Today we’re going to start with a game – The Handshake Game

  5. Here are the Rules! • We are going to play a short game about communication. • You will be given time to go around and communicate with each other in different ways. • Your teacher will give each person a special instruction on how to communicate as he/she meets each person. You are not to tell others what your instruction is; you are only to do the behavior. Teacher - please pass out a behavior strip to each student at this time. Then allow them to begin.

  6. Please Return to Your Seats at this Time    • If you had contact – a handshake - with another student, please stand. • Those students who are standing are Infected. • Ask remaining students to stand if they had contact with any of the now standing students who were infected. • This is how a virus works. It spreads and infects quickly, through contact.

  7. Let’s Learn! Just as you communicated in the activity, e-mail is a form of communication. However, it has its own set of rules. Some reasons for this are harmful items like computer viruses.

  8. Time for Discussion How many of you have ever had your computer crash because of a virus? Does anyone know how viruses are spread? What are some viruses you have heard of?

  9. Activity One common method of obtaining a virus is by downloading an attachment from e-mail. On your own, Brainstorm a list of 5-10 rules for e-mail based on your experience with it. If you have no experience, email is a written form of communication but with seemingly instant access available on a computer. When finished brainstorming, share your rules with the class and discuss them.

  10. Teacher’s choice: For a classroom with computers, return to the Cyber Community folder on the CD and select HTML Activities. Follow the link: “Begin Here”. Students should work in groups. When completed - Return here to Slide 23 to continue. Otherwise – let’s continue on…

  11. Email Etiquette Email Etiquette is part of being a good cyber citizen. E-mail is different then phone conversations, letters, or face-to-face meetings. That’s why it has some rules of its own. * This material can be found on reference pages 1-3

  12. Flaming Flaming: Flaming is when you send a mean or hurtful email. Flaming tends to happen frequently on the net because it's easy to write things without thinking them through. It's also easy to be misunderstood when writing e-mail messages, which can lead to a flame reply. Flaming can easily get out of control – If you get a flame message from someone, tell your parents or just delete it.

  13. Spamming Spamming:Spam refers to e-mail garbage. Spamming is when you send junk mail such as jokes, hoaxes, urban legends, etc. to many people at once. You should never email this type of stuff to people you do not know. And typically, even your friends don’t want this stuff cluttering their email box. Spim: Just like Spam, but delivered by Instant Messaging.

  14. Forwarding Forwarding:Think before you forward email. 1. When you forward e-mail, you are giving out personal information such as the email addresses of the person who sent it to you. 2. Forwarding e-mail can also be considered spamming. Make sure the email you send has a point.

  15. Phishing Sometimes you may receive emails from a business asking for personal information. You should never reply to these type of emails. They are usually from people trying to steal your information for illegal reasons. They are “fishing” for information – thus the term phishing.

  16. Malware Malware are programs such as worms and viruses that include malicious code – code written with the intent to harm, destroy, or annoy. Code is a term for the language(s) computer programs are written in – the code tells the computer what and how to do things. Malware can attach to email and carry out their programming which can cause computers to work improperly.

  17. Viruses A Virus is a program that spreads itself by infecting files. Viruses are dangerous and can shut your computer down. While there are many ways to get a virus, the most common is through e-mail attachments.

  18. Worms Worms also include malicious code. Worms work through networks. They travel through shared files and programs and can bring down an entire computer system.

  19. Trojan Horse Trojan Horses are another type of malicious code. These are programs that claim to do one thing but actually do another when downloaded. For example, you download a game to play but instead it wipes out your hard drive.

  20. Here are ways you can keep your own computer safe, and make sure it doesn’t threaten other computers: (1) Find out if your computer has a firewall. If not, ask your parents to make sure one is installed. A firewall protects information from entering your computer without your permission. (2) Keep your computer updated (make sure updates are downloaded for your operating system regularly) (3) Find out if your computer has virus protection software installed. If not, ask your parents to make sure they install virus protection software on your computer, keep it updated and USE it. This is very important!

  21. And just a couple more: (4) Don’t open e-mails if you don’t know who they are from. (5) Be careful when you see e-mail that has been forwarded “FW:” or if it has an attachment with the suffix of “.exe,” “.scr,” or “.vsb.” (6) If you do want to open an attachment, scan it through the virus software first. Sometimes even your friends can pass on viruses unintentionally. To do this, save all attachments before opening them.

  22. Some Fun with Email

  23. I hope you learned something I know I did! All right – let’s get into groups. Your teacher will divide you up for our next activity.

  24. All right – Everyone in Groups? Good! Your task today is to create a brochure on e-mail etiquette and safety. I’m going to help you out and show you how to get started.

  25. Build a Brochure Ok – Now you understand the concept of email along with some of its dangers. In your small groups, return to (A) what you have learned and (B) your former brainstorm list. Using these items, you are to design a brochure on E-mail Etiquette and Safety. Brochures should be informative and creative. One simplified suggestion would be to have a Do and Don’t list.

  26. So Get Started! Do your best on these brochures! Once you are finished your group will present your brochure to the rest of the class and discuss what you have learned.

  27. How Do you Know When You’re Done? Have you: 1. Completed your group brochure? 2. Shared your brochure with your class? 3. Discussed as a class what you have learned about email etiquette and safety?

  28. It doesn’t have to end here! Find out about DRiVE!

  29. Take Action It’s Easy with the i-Mentor Training Network! Visit the X-BLOCK at www.isafe.orgto learn about the i-Mentor Training Network. It’s all online! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the X-BLOCK of the i-SAFE website at www.isafe.org.

  30. Get the recognition you deserve as an i-SAFE Mentor • Enroll online at www.isafe.org by clicking on Create an Account. • Receive your own Student Toolkit and materials to get started. Take Action www.isafe.org

More Related