Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m...

33
Cyber Security Level 6

Transcript of Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m...

Page 1: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Cyber Security

Level 6

Page 2: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Hey Everybody!My name is Tek.

I’m going to be your guide today! I’m a part of i-SAFE America, and we are concerned with helping you to be safe online.

We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i-SAFE with others.

 

Page 3: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

All right – Let’s talk Empowerment

Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.

Page 4: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

So not only are you learning and sharing, you are getting rewarded for doing so!

i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes.

Check it out at www.isafe.org – Click on the link to contests and Incentives.

Empowerment is the Key to Learning!

Page 5: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

The Plan

Today you will be learning about viruses and malicious code.

For this lesson you will be developing a top ten list of e-mail rules to follow along with a slogan.

Page 6: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

All Right – Let’s Get Started

Today we’re going to start with a game –

The Match-Up Game

Page 7: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Here are the Rules!We are going to play a short game about communication.You will be given either a vocabulary word or an email

letter by your teacher.You are to try to find your match – each vocabulary word

has an email letter with an example of it in it.You aren’t expected to know all the terms – just do your

best!

Teacher - please pass out either a vocabulary word or an e-mail letter to each student at this time. Then allow them to begin.

Page 8: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Please Return to Your Seats at this Time   

• Ok – now we’re going to learn more about these terms and why they are important.

• Each of those vocabulary terms has something to do with email communication.

• Let’s see who got what right!

*Teacher please see answer key for correct answers.

Page 9: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Let’s Learn!

Just as you communicated in the activity, e-mail is a form of communication. However, it has its own set of rules. Some reasons for this are harmful items like computer viruses.

Page 10: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Time for Discussion

How many of you have ever had your computer crash because of a virus?

Does anyone know how viruses are spread?

What are some viruses you have heard of?

Page 11: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Think About It!

What are your experiences with e-mail?

What are some common issues or annoyances you have run into with e-mail?

Page 12: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Teacher’s choice:For a classroom with computers, return to the

Cyber Community folder on the CD and select HTML Activities. Follow the link: “Begin Here”. Students should work in groups.

When completed -Return here to Slide 25 to continue.

Otherwise – let’s continue on…

Page 13: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

E-mail Etiquette is part of being a good cyber citizen.

E-mail is different than phone conversations, letters, or face-to-face meetings. These differences cause a new set of problems associated with this communication. Educate yourself on these e-mail no no’s.

•This material can be found on activity pages #3-4

Page 14: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Because e-mail is written and instantaneous, people find it easier to say things they might not otherwise say. Flaming is when you send a mean or hurtful e-mail.

Flaming tends to happen frequently on the net because it's easy to write things without thinking them through. Flaming can easily get out of control - If you get a flame message from someone, tell your parents or just delete it.

Also, before you send an e-mail, think carefully about what you have said. Some things can be taken the wrong way – use emoticons to show people when you are joking.

Page 15: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Spam is considered to be e-mail garbage. It is all that stuff you get and have to delete. Spamming is when you send junk mail such as jokes, hoaxes, urban legends, etc. to many people at once. You should never e-mail this type of material to people you do not know. And typically, even your friends don’t want this stuff cluttering up their e-mail box.

Page 16: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Forwarding: Think before you forward.

1. When you forward e-mail, you are giving out personal information such as the e-mail addresses of the person who sent it to you. If you do have to forward it – delete previous addresses and BCC it to everyone – that way no e-mail addresses show but yours.

2. Forwarding e-mail can also be considered spamming. Make sure the e-mail you send has a point.

Page 17: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

There are a lot of stories, rumors, and urban legends circulating out there. Realize that not everything you receive in e-mail is true. Some examples are the e-mails that tell you to forward to ten friends and you’ll receive money/gift certificates from a favorite store.

Another harmful example is the e-mail that claims a virus may have been installed on your computer and you should delete a certain file. Often this file is a necessary one for your computer. Make sure you delete these types of hoax e-mails and don’t pass them on.

Page 18: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

 

A Virus is a program that spreads itself by infecting files. Viruses are dangerous and can shut your computer down. While there are many ways to get a virus, the most common is through email attachments.

Viruses

Page 19: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Here are ways you can keep your own computer safe, and make sure it doesn’t threaten other computers:

1.       Install a firewall on you computer. A firewall protects information from entering your computer without your permission.

2.      Keep you computer updated (download updates for your operating system regularly)

3.      Install virus protection software on your computer, keep it updated and USE it.

4.      Don’t open e-mails if you don’t know who they are from.

5.      Another red flag is when e-mail is forwarded “FW:” or it has an attachment with the suffix of “.exe,” “.scr,” or “.vsb.”

6. If you do want to open an attachment, scan it through the virus software first. Sometimes even your friends can pass on viruses unintentionally. To do this save all attachments before opening them. There are consequences for creating or

spreading a virus. You can be prosecuted as a criminal.

Page 20: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Acronyms:

BCNU Be Seeing You

BTW By the Way

FWIW For What it’s Worth

FAQ Frequently asked questions

F2F Face to Face

FYI For your information

ROTFL Rolling on the floor laughing

Emoticons:

:-) Smiley face/ Happy

;-) Wink

:-( Sad Face/ Unhappy

:-O Yelling

:-@ Screaming

Some Fun with Email

Page 21: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Malicious code is a computer program code that is written with the intent to harm, destroy, or annoy. Viruses are malicious code. They attach to e-mail and carry out their programming which causes problems and money.

Page 22: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Worms are also malicious code. Worms work through networks. They travel through shared files and programs and can bring down an entire system.

Page 23: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Trojan horses are another type of malicious code. These are programs that claim to do one thing but actually do another when downloaded. For example, you download a game but the program wipes your hard drive.

Page 24: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Sometimes you may receive emails from a business asking for personal information. You should never reply to these type of emails. They are usually from people trying to steal your information for illegal reasons. They are “fishing” for information – thus the term phishing.

Page 25: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

A program running in the background to monitor your computer activities. Frequently downloaded without you knowing it, they can monitor your web browsing and cause pop-ups.

Page 26: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

I hope you learned something I know I did!

All right – let’s get into groups. Your teacher will divide you up for our next activity.

Page 27: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

All right – Everyone in Groups?

Good! Your task today is to think back over what you have learned and create a top ten list of rules for e-mail use. Then develop a slogan to help remember safe and responsible e-mail use.

You can put your list on paper or on a poster board!

Page 28: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

So Get Started!

Do your best on these slogans and lists! Once you are finished your group will present your list and slogan to the rest of the class and discuss what you have learned.

And once you’re finished, check out i-SAFE’s contests! Click on the link to Contests and Incentives at www.isafe.org.

Page 29: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

So How Do you Know When You’re Done?

Have you:1. Completed your Top Ten list and

Slogan?2. Shared your list and slogan with your class?3. Discussed as a class what you have learned about e-mail etiquette and safety?4. Checked out the Contests and Incentives link at www.isafe.org?

Page 30: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

It doesn’t have to end here!

Find out about DRiVE!

Page 31: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Take ActionTake Action It’s Easy with the i-Mentor Training Network!

The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community.

To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at www.isafe.org.

Visit the Kids and Teens section at www.isafe.org to learn about the i-Mentor Training Network. It’s all online!

Page 32: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Take ActionTake Action It’s Easy with the i-Mentor Training Network!The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. 

By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i-Parent Programs and Community Leaders Meetings. 

Page 33: Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

www.isafe.org

1. Enroll online at www.isafe.org by clicking on Create an Account.

2. Go to the Kids and Teens Section and Submit the Online Mentor Menu.

3. Receive your own Student Toolkit and materials to get started.

Get the recognition you deserve Get the recognition you deserve as an i-SAFE Mentoras an i-SAFE Mentor

Take ActionTake Action