1 / 21

Cyber Challenges NID Administrator Conference

Cyber Challenges NID Administrator Conference. November 10, 2009. Overview. Acceptable use Internet Filtering Social Web (MySpace, Facebook, etc.) Cyberbullying Plagiarism Phishing. Acceptable Use. Why do we need to have such a document? What things need to be covered?

urvi
Download Presentation

Cyber Challenges NID Administrator Conference

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Challenges NID Administrator Conference November 10, 2009

  2. Overview • Acceptable use • Internet Filtering • Social Web (MySpace, Facebook, etc.) • Cyberbullying • Plagiarism • Phishing

  3. Acceptable Use • Why do we need to have such a document? • What things need to be covered? • NID’s Technology Acceptable Use document

  4. Acceptable Use – Why • The goal of the acceptable use document is to outline how the tools: computers, network, internet, resources (printers, scanners, personal storage devices) are to be used in your school or office. • To protect both the students and staff from using these tools improperly. Also to know what is or is not allowed with these resources.

  5. Acceptable Use - What • Hardware – what is available, what it can be used for, at what times • Internet – understanding that the content and material is not under the control of the school and that care with this tool must be taken in use of it. • Internet use as a educational tool, not a entertainment or personal communication tool (web, e-mail)

  6. Internet Use – What • In what ways tools like the Internet are acceptable, how e-mail should be used as a contact tool. • What information can be taken or brought into the school using storage devices (CD, Flash Drives, etc)

  7. Acceptable Use – NID • The NID website at www.ni.lcms.org provides a outline of a Technology Acceptable use document at : https://ni.lcms.org/ClientData/1074/Assets/documents/school/curriculum/technology/acceptable%20use%20policy.doc

  8. Internet Filtering • The Internet is a online version of the real world, and there is good and bad, objectional, offensive content, along with some great educational tools. • Internet Filtering attempts to limit access to objectional content and materials. • There are Free and Commercial tools to help schools with this problem.

  9. Internet Filtering - Tools • DNS system - OpenDNS for K-12 - http://www.opendns.com/solutions/k12 • A variety of Software, specifically Internet Filtering, or Security with Internet filtering (antivirus) • Internet Filtering devices – Internet routers, firewall devices, internet filtering appliances. • Internet providers who filter - http://www.illinois.net/services/filtering/index.htm

  10. Social Web Sites • There are many social websites that are used for contacting friends, companies, entertainers • Most popular Social Websites for all ages – MySpace, Facebook • Other Social Websites LinkedIn, Spoke, Twitter, Flickr, Bebo, YouTube, and many more. • Facebook and MySpace intend to remove accounts of people who are less than 13 years of age – based on the information provided.

  11. Social Web Sites • Keep in mind that there is no good way that allows these providers to know for sure the age of the person and the account(s) they may setup. • Never post information about your specific location, nothing you would not want printed in a paper about yourself. • People’s response differs when they are not face to face.

  12. Cyberbullying • Cyberbullying is the tormenting , threatening, harassing, humiliation or embarrassing, using the Internet, other digital technologies, or mobile phones. • Cyberbullying is people in the same age range or peer group, not someone older.

  13. Cyberbullying – Prevention • Never give out personal information online • Never tell others your password to accounts • Explain to children if they receive such a message to share it with a parent, teacher or guardian. • Never put anything online that your would not want everyone to see. • Never send messages when you are angry

  14. Cyberbullying - Prevention • Teach that you should interact with people online as you would interact with them in person. • Encourage parents to keep the computer in a busy area of the home • Know what people your child is interacting with online • Learn the variety of Acronyms • Do not take away access – many hide this activity in fear of loosing the privilege

  15. Cyberbullying – Web Sites • Cyber Bullying Web Sites • http://www.ncpc.org/topics/cyberbullying • http://www.cyberbullying.us/ • IM and Texting Acronyms • http://www.netlingo.com/acronyms.php • http://www.aim.com/acronyms.adp?aolp=0

  16. Plagiarism • Easy access to copy information from a variety of sources with the Internet. • From books • From magazines • From authors • From news (TV, Internet, and Newspapers) • From online resources (encyclopedias, dissertations, or other peoples work)

  17. Plagiarism - Prevention • Need to explain proper use • Need to verify sources – especially on the Internet – land of many “experts” • Have students provide a reference of sources to verify work • Online tools – for verification • Turnitin - http://www.turnitin.com • Learn to use Google to search Internet sources

  18. Phishing • Phishing is the attempt to trick people into providing information to sources other than the one being presented. • Phishing exists in e-mail, web sites • One of the most popular forms of web phishing is presenting the user with a pop-up that makes the user think the computer is infected and that they need to purchase the product they are presenting to clean it – products that either cause more troubles or do nothing.

  19. Phishing • This type of web phishing is quite common on social web sites since there is a high volume of viewers. • Some the of the most popular forms of e-mail phishing are personnel department requests, banking requests, and computer upgrades that require you to provide information about your accounts, or personal information to defraud you.

  20. Phishing Prevention • Use a current web browser – make sure the phishing protection is turned on. Internet Explorer 7 & 8, Firefox 3 & 3.5 • Verify the URL the last two parts for example (good: support.att.net) (bad: support.att.badprovider.com) • Good Antivirus, Spyware tools to keep these types of things reaching you in the first place. • http://www.onguardonline.gov/topics/phishing.aspx

  21. To Learn More • Government – OnGuard Online - http://www.onguardonline.gov • Microsoft Online Safety and Privacy http://www.microsoft.com/protect/default.aspx • Symantec – Risks http://www.symantec.com/norton/security_response/index.jsp • Content that I have gathered on these subjects http://cais.cus.edu/spicemk/computersafety.html

More Related