02 educators role

21
The Educator’s Role in Safe Computing Jana Baxter Ann Noonen

Upload: jana-baxter

Post on 15-May-2015

414 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 02 Educators Role

The Educator’s Role in

Safe ComputingJana Baxter

Ann Noonen

Page 2: 02 Educators Role

The goal of this session is to give educators an overview of cyber security

We will examine 3 areas◦ Cyber Security◦ Cyber Ethics◦ Cyber Safety

Safe Computing in Education

Page 3: 02 Educators Role

Definition◦ Cyber security is a set of principles and practices

designed to teach you how to safeguard your computing assets and online information against threats

Cyber Security

Page 4: 02 Educators Role

A global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news and opinions◦ http://www.internet.com

What is the Internet

Page 5: 02 Educators Role

Desktop computers Handheld computers Cell phones Digital cable Satellite television and radio ATM machines

◦ Debit cards◦ Credit cards

Global positioning devices◦ GPS

Technologies Connect to the Internet

Page 6: 02 Educators Role

Teacher Authority figure Facilitator Mentor Counselor Protector

Educators Play Many Roles

Page 7: 02 Educators Role

It is now the role of the educator to practice safe computing in their classrooms

Understand the nature and cause of cyber threats to protect yourself, your students and your school

Learn how to fight cyber threats and teach your students and colleagues about cyber security

Whose Job is it?

Page 8: 02 Educators Role

A code of safe and responsible behavior for the Internet Community

Understanding the risks of harmful and illegal behavior online

How to protect ourselves and other Internet and other Internet users from such behavior

Lower Merion School District

Cyber Ethics

Page 9: 02 Educators Role

There is a great need for resources for parents, educators and children for staying safe online

Best Practices◦ Dedicate one class to what is expected when going

online from the school before you even go online◦ Avoid letting students search and wander◦ Look out for students turning off monitors quickly◦ Instead of banning everything that the students

enjoy, investigate ways in which you can use these technologies to enhance the teaching and learning experience

Cyber Safety

Page 10: 02 Educators Role

Piracy ◦ Illegal use of copyrighted material such as

plagiarism or illegally downloading of music, movies, text, etc.

Intrusion◦ Unauthorized individuals trying to gain access to

computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer

Identity theft◦ computer intruders intent on stealing your personal

information to commit fraud or theft

Types of Cyber Threats

Page 11: 02 Educators Role

Predatory behavior◦ A person with malicious intent who targets your

online information to hurt your reputation, compromise your data, intimidate you, etc.

Virus◦ a self-replicating program that spreads by

inserting copies of itself into other computer code or into documents

Spam◦ unwanted messages, often automated, sent to

multiple users, mailing lists, or email groups

Types of Cyber Threats

Page 12: 02 Educators Role

Worm◦ a self-replicating, self-spreading malicious

computer program Trojan horse

◦ a malicious program disguised as or hidden in legitimate software

Malware◦ software designed to harm your computer

Spyware◦ software that sends information from your

computer to a third party without your consent

Types of Cyber Threats

Page 13: 02 Educators Role

Illegal download or redistribution of copyrighted material◦ May result in legal fines, job loss, or court action

Intrusion into a school network◦ May result in data alteration, identify theft, or

destruction of school materials

Effects of Cyber Threats

Page 14: 02 Educators Role

Clicking on pop-up window◦ May result in spam sent to your e-mail address

and others in your address book Virus, Malware or Trojan Horse

◦ May result in destruction of your data, computer or your school’s entire network

Effects of Cyber Threats

Page 15: 02 Educators Role

Create a strong password◦ Use letters, numbers and special characters◦ Mathew12!goals

Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions

and text messages are not private Use caution when opening an unexpected e-

mail

Protect Against Cyber Threats

Page 16: 02 Educators Role

Regular back-up of data Be wary of file sharing

◦ Including sharing your computer with others Update your anti-virus program, virus

definitions and anti-spyware software Use and maintain a firewall

Protect Against Cyber Threats

Page 17: 02 Educators Role

Protect Against Cyber Threats Set your Web

browser’s security option to a high level of safety

Page 18: 02 Educators Role

Enable pop-up blockers When idle, disconnect your computer from

the Internet Take care when opening attachments

◦ E-mail◦ Chat rooms◦ Text messaging

Update your computer for the latest security patches for the software and operating system you use

Protect Against Cyber Threats

Page 19: 02 Educators Role

You can incorporate short lessons and techniques about cyber security as you teach various subjects

Teaching Cyber Security

Page 20: 02 Educators Role

Incorporate short lessons or techniques regarding cyber security throughout the curriculum

Other ideas???

Teaching Cyber Security

Page 21: 02 Educators Role

http://www.us-cert.govhttp://www.mysecurecyberspace.comhttp://www.webopedia.comhttp://www.internet.comhttp://www.csialliance.orghttp://www.cyber-safety.com

References