02 educators role
TRANSCRIPT
The Educator’s Role in
Safe ComputingJana Baxter
Ann Noonen
The goal of this session is to give educators an overview of cyber security
We will examine 3 areas◦ Cyber Security◦ Cyber Ethics◦ Cyber Safety
Safe Computing in Education
Definition◦ Cyber security is a set of principles and practices
designed to teach you how to safeguard your computing assets and online information against threats
Cyber Security
A global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news and opinions◦ http://www.internet.com
What is the Internet
Desktop computers Handheld computers Cell phones Digital cable Satellite television and radio ATM machines
◦ Debit cards◦ Credit cards
Global positioning devices◦ GPS
Technologies Connect to the Internet
Teacher Authority figure Facilitator Mentor Counselor Protector
Educators Play Many Roles
It is now the role of the educator to practice safe computing in their classrooms
Understand the nature and cause of cyber threats to protect yourself, your students and your school
Learn how to fight cyber threats and teach your students and colleagues about cyber security
Whose Job is it?
A code of safe and responsible behavior for the Internet Community
Understanding the risks of harmful and illegal behavior online
How to protect ourselves and other Internet and other Internet users from such behavior
Lower Merion School District
Cyber Ethics
There is a great need for resources for parents, educators and children for staying safe online
Best Practices◦ Dedicate one class to what is expected when going
online from the school before you even go online◦ Avoid letting students search and wander◦ Look out for students turning off monitors quickly◦ Instead of banning everything that the students
enjoy, investigate ways in which you can use these technologies to enhance the teaching and learning experience
Cyber Safety
Piracy ◦ Illegal use of copyrighted material such as
plagiarism or illegally downloading of music, movies, text, etc.
Intrusion◦ Unauthorized individuals trying to gain access to
computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer
Identity theft◦ computer intruders intent on stealing your personal
information to commit fraud or theft
Types of Cyber Threats
Predatory behavior◦ A person with malicious intent who targets your
online information to hurt your reputation, compromise your data, intimidate you, etc.
Virus◦ a self-replicating program that spreads by
inserting copies of itself into other computer code or into documents
Spam◦ unwanted messages, often automated, sent to
multiple users, mailing lists, or email groups
Types of Cyber Threats
Worm◦ a self-replicating, self-spreading malicious
computer program Trojan horse
◦ a malicious program disguised as or hidden in legitimate software
Malware◦ software designed to harm your computer
Spyware◦ software that sends information from your
computer to a third party without your consent
Types of Cyber Threats
Illegal download or redistribution of copyrighted material◦ May result in legal fines, job loss, or court action
Intrusion into a school network◦ May result in data alteration, identify theft, or
destruction of school materials
Effects of Cyber Threats
Clicking on pop-up window◦ May result in spam sent to your e-mail address
and others in your address book Virus, Malware or Trojan Horse
◦ May result in destruction of your data, computer or your school’s entire network
Effects of Cyber Threats
Create a strong password◦ Use letters, numbers and special characters◦ Mathew12!goals
Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions
and text messages are not private Use caution when opening an unexpected e-
Protect Against Cyber Threats
Regular back-up of data Be wary of file sharing
◦ Including sharing your computer with others Update your anti-virus program, virus
definitions and anti-spyware software Use and maintain a firewall
Protect Against Cyber Threats
Protect Against Cyber Threats Set your Web
browser’s security option to a high level of safety
Enable pop-up blockers When idle, disconnect your computer from
the Internet Take care when opening attachments
◦ E-mail◦ Chat rooms◦ Text messaging
Update your computer for the latest security patches for the software and operating system you use
Protect Against Cyber Threats
You can incorporate short lessons and techniques about cyber security as you teach various subjects
Teaching Cyber Security
Incorporate short lessons or techniques regarding cyber security throughout the curriculum
Other ideas???
Teaching Cyber Security
http://www.us-cert.govhttp://www.mysecurecyberspace.comhttp://www.webopedia.comhttp://www.internet.comhttp://www.csialliance.orghttp://www.cyber-safety.com
References