1 / 29

Cyber Security

Cyber Security. Level 6. Hey Everybody!. My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to be safe online.

yana
Download Presentation

Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security Level 6

  2. Hey Everybody! My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i-SAFE with others.

  3. The PlanToday you will be learning about viruses and malicious code. For this lesson you will be developing a top ten list of e-mail rules to follow along with a slogan.

  4. All Right – Let’s Get Started Today we’re going to start with a game – The Match-Up Game Your Teacher will tell you how to play, then return back here.

  5. Please Return to Your Seats at this Time    • Ok – now we’re going to learn more about these terms and why they are important. • Each of those vocabulary terms has something to do with email communication. • Let’s see who got what right! • *Teacher please see answer key for correct answers.

  6. Let’s Learn! Just as you communicated in the activity, e-mail is a form of communication. However, it has its own set of rules. Some reasons for this are harmful items like computer viruses.

  7. Time for Discussion How many of you have ever had your computer crash because of a virus? Does anyone know how viruses are spread? What are some viruses you have heard of?

  8. Think About It! What are your experiences with e-mail? What are some common issues or annoyances you have run into with e-mail?

  9. Teacher’s choice: For a classroom with computers, return to the Cyber Community folder on the CD and select HTML Activities. Follow the link: “Begin Here”. Students should work in groups. When completed - Return here to Slide 24 to continue. Otherwise – let’s continue on…

  10. Email Etiquette • E-mail Etiquette is part of being a good cyber citizen. • E-mail is different than phone conversations, letters, or face-to-face meetings. These differences cause a new set of problems associated with this communication. Educate yourself on these e-mail no no’s. • This material can be found on activity pages #3-4

  11. Flaming Because e-mail is written and instantaneous, people find it easier to say things they might not otherwise say. Flaming is when you send a mean or hurtful e-mail. Flaming tends to happen frequently on the net because it's easy to write things without thinking them through. Flaming can easily get out of control - If you get a flame message from someone, tell your parents or just delete it. Also, before you send an e-mail, think carefully about what you have said. Some things can be taken the wrong way – use emoticons to show people when you are joking.

  12. Spamming Spam is considered to be e-mail garbage. It is all that stuff you get and have to delete. Spamming is when you send junk mail such as jokes, hoaxes, urban legends, etc. to many people at once. You should never e-mail this type of material to people you do not know. And typically, even your friends don’t want this stuff cluttering up their e-mail box.

  13. Forwarding • Forwarding: Think before you forward. • When you forward e-mail, you are giving out personal information such as the e-mail addresses of the person who sent it to you. If you do have to forward it – delete previous addresses and BCC it to everyone – that way no e-mail addresses show but yours. • 2. Forwarding e-mail can also be considered spamming. Make sure the e-mail you send has a point.

  14. Hoaxes There are a lot of stories, rumors, and urban legends circulating out there. Realize that not everything you receive in e-mail is true. Some examples are the e-mails that tell you to forward to ten friends and you’ll receive money/gift certificates from a favorite store. Another harmful example is the e-mail that claims a virus may have been installed on your computer and you should delete a certain file. Often this file is a necessary one for your computer. Make sure you delete these types of hoax e-mails and don’t pass them on.

  15. Viruses A Virus is a program that spreads itself by infecting files. Viruses are dangerous and can shut your computer down. While there are many ways to get a virus, the most common is through email attachments.

  16. Here are ways you can keep your own computer safe, and make sure it doesn’t threaten other computers: 1.Install a firewall on you computer. A firewall protects information from entering your computer without your permission. 2.Keep you computer updated (download updates for your operating system regularly) 3.Install virus protection software on your computer, keep it updated and USE it. 4. Don’t open e-mails if you don’t know who they are from. 5.Another red flag is when e-mail is forwarded “FW:” or it has an attachment with the suffix of “.exe,” “.scr,” or “.vsb.” 6. If you do want to open an attachment, scan it through the virus software first. Sometimes even your friends can pass on viruses unintentionally. To do this save all attachments before opening them. There are consequences for creating or spreading a virus. You can be prosecuted as a criminal.

  17. Some Fun with Email

  18. Malicious Code Malicious code is a computer program code that is written with the intent to harm, destroy, or annoy. Viruses are malicious code. They attach to e-mail and carry out their programming which causes problems and money.

  19. Worms Worms are also malicious code. Worms work through networks. They travel through shared files and programs and can bring down an entire system.

  20. Trojan Horses Trojan horses are another type of malicious code. These are programs that claim to do one thing but actually do another when downloaded. For example, you download a game but the program wipes your hard drive.

  21. Phishing Sometimes you may receive emails from a business asking for personal information. You should never reply to these type of emails. They are usually from people trying to steal your information for illegal reasons. They are “fishing” for information – thus the term phishing.

  22. Spyware A program running in the background to monitor your computer activities. Frequently downloaded without you knowing it, they can monitor your web browsing and cause pop-ups.

  23. I hope you learned something I know I did! All right – let’s get into groups. Your teacher will divide you up for our next activity.

  24. All right – Everyone in Groups? Good! Your task today is to think back over what you have learned and create a top ten list of rules for e-mail use. Then develop a slogan to help remember safe and responsible e-mail use. You can put your list on paper or on a poster board!

  25. So Get Started! Do your best on these slogans and lists! Once you are finished your group will present your list and slogan to the rest of the class and discuss what you have learned. And once you’re finished, check out i-SAFE’s contests! Click on the link to Contests and Incentives at www.isafe.org.

  26. How Do you Know When You’re Done? Have you: 1. Completed your Top Ten list and Slogan? 2. Shared your list and slogan with your class? 3. Discussed as a class what you have learned about e-mail etiquette and safety?

  27. It doesn’t have to end here! Find out about DRiVE!

  28. Take Action It’s Easy with the i-Mentor Training Network! Visit the X-BLOCK at www.isafe.orgto learn about the i-Mentor Training Network. It’s all online! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the X-BLOCK of the i-SAFE website at www.isafe.org.

  29. Get the recognition you deserve as an i-SAFE Mentor • Enroll online at www.isafe.org by clicking on Create an Account. • Receive your own Student Toolkit and materials to get started. Take Action www.isafe.org

More Related