information security boot camp: survival techniques for teaching teachers and students information...
TRANSCRIPT
![Page 1: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/1.jpg)
Information Security Boot Camp:
Survival Techniques for Teaching Teachers and Students Information
Security Basics
Melissa Dark
K-12 Outreach Coordinator
CERIAS, Purdue University
http://www.cerias.purdue.edu/education/K-12
![Page 2: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/2.jpg)
Introductions Name Home School Position First or Favorite Technology Use What do you hope to get out of this
workshop?
![Page 3: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/3.jpg)
If you don’t know where you’re
going….
You’ll probably end up somewhere else.
---Yogi Berra
![Page 4: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/4.jpg)
North Star Activity Are we preparing kids for yesterday,
today, or tomorrow?
Do our schools currently focus upon the skills of the past---or the skills of the future?
![Page 5: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/5.jpg)
What is Information Security?
Refers to the protection of Data, Programs, and Information stored on disks, networks, hard drives, etc.
Includes the issues of: – Privacy– Ethics– Loss Prevention
![Page 6: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/6.jpg)
How do You Protect Your Home?
Brainstorming Activity…..
![Page 7: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/7.jpg)
ANALOGY:
Information Security is very similar to the physical security
of your home.
![Page 8: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/8.jpg)
How do You Protect Your Computer?
Brainstorming Activity…..
![Page 9: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/9.jpg)
IASEP Video
Joint Project Purdue’s School of Education and CERIAS
Video is shown nationwide Provides a quick overview of the
security concerns that teachers face.
![Page 10: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/10.jpg)
Information Security: The Basics
Physical Issues Software Practices Password Protection Encryption E-mail Protocol Integrating the Internet Safely Privacy Primer for Educators
![Page 11: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/11.jpg)
Software Security
![Page 12: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/12.jpg)
The Case of the Snappy Screen Saver
Download and install a screensaver. Computer stops working afterwards.
The Case of Surfing the Net
Download “free” software from the Web.
Later named in a law suit for distributing student data.
![Page 13: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/13.jpg)
Software Security:(Viruses, Trojans, Unwanted Access)
Only install necessary and trusted software.
Beware of *free* games, screen savers, and
graphics.
Run and UPDATE anti-virus software!!
Keep a hard copy of the copyright release
for all “free” products!
![Page 14: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/14.jpg)
1988: Less than 10 known viruses 1990: New virus found every day 1993: 10-30 new viruses per week 1999: 45,000 viruses and variants
Source: McAfee
Virus Growth
0
10000
20000
30000
40000
50000
60000
1988 1990 1993 1999
![Page 15: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/15.jpg)
Pikachu Virus: A K-12 Nightmare
![Page 16: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/16.jpg)
This dialog box appears after the
PIKACHUPOKEMON.EXE file has been activated. Worm:
• Accesses Outlook Address Book
• Embeds code to delete Windows and Windows Subfolders upon Restart.
• +: Does ask for permission to delete files with a “Y” command.
![Page 17: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/17.jpg)
Viruses, Malicious Code,& Other Nasty Stuff
![Page 18: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/18.jpg)
Examples of Nasty Stuff:
Viruses Trojan Horses Worms Logic Bomb Trapdoors
![Page 19: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/19.jpg)
Restrict Incoming and Outgoing Information Provides you with control over your system. Physical Firewalls v. Software-based
Firewalls Zone Alarm: http://www.zonealarm.com
– FREE– VERY Effective– Easy to Use– Blocks Incoming/Outgoing
Firewalls:
![Page 20: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/20.jpg)
Valuable Resources:
http://www.zonealarm.com
http://www.urbanlegends.com
http://www.vil.mcaffee.com
http://www.cerias.purdue.edu/K-12
![Page 21: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/21.jpg)
Physical Security
![Page 22: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/22.jpg)
The Case of No Backups
Hard Drive Replaced...erased all of your data. No Back-ups are available.
The Case of the Stolen LaptopLaptop is stolen.
No Backups are available.
Unprotected confidential information.
![Page 23: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/23.jpg)
Physical Security Practices
(File Management, Lost Information, Lost Equipment)
Try not to advertise secure spots. Minimize external access:
– Maintain appropriate locks– Additional security features if necessary
Keep a “safe” climate– Fix the temp. between 50-80F
![Page 24: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/24.jpg)
Physical cont’d…
Protect cables, wires, etc. from feet!
Lock laptops when not in use.
Use a log in for general Windows use.
Keep drinks and food away from
equipment!
![Page 25: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/25.jpg)
Physical Security cont’d….
MAKE BACK-Ups!!!!!!!
– Store on a separate disk!
– Keep the disk in a separate location!
– Keep a hard copy of critical information.
– Pay attention to where you are saving documents.
– Clearly label disks and files.
– Keep all magnets away from equipment.
![Page 26: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/26.jpg)
Encryption
![Page 27: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/27.jpg)
The Case of the Sniffer
Email grades/files between school-home.
Parent notifies that they have been denied insurance.
The Case of Prying EyesSupport staff gains access to student data by using your POSTED password.
![Page 28: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/28.jpg)
Encryption(Protecting sensitive information)
Encoding information– Secret Code Ring– Cryptoquip– Pig Latin
*Most* common applications offer password protection.
Confidential (not critical)---USE ENCRYPTION!!!!
NEVER send HIGHLY SENSITIVE information through email. (email should *never* be considered secure!)
![Page 29: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/29.jpg)
Encryption Practice
![Page 30: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/30.jpg)
PGP: Pretty Good Privacy(approx. $20 per unit)
Requires use of Public Keys
Sample PGP encrypted email:
![Page 31: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/31.jpg)
Without the proper keys...
the message is unreadable.
![Page 32: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/32.jpg)
Sample Encrypted Document:
![Page 33: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/33.jpg)
Key Component to Encryption:
![Page 35: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/35.jpg)
Password Protection
1. Do not post or store your password near your computer.
2. Require passwords to be at least 8 characters long.
3. Use non-alpha characters and capital letters.
Boiler*makeR Iam@1016 KaTis15 Ge+>Smar+
4. Do not use easy to guess selections.password 123456 computer hello love
![Page 36: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/36.jpg)
Passwords Continued…
5. Use non-personal selections.Avoid: name, spouse’s name, kids, ss#
6. Maintain zero tolerance for password sharing.
7. Warn users not to type their passwords when someone is watching.
8. Urge users to change passwords. (2-3 weeks!)
9. Always remember to log out!
10. Constantly reinforce the importance of password security.
![Page 37: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/37.jpg)
Password PracticeWrite a “smart” password for the following fictional
teacher. Be sure to follow all of the recommendations!
Samuel W. MillerGreentown High SchoolSocial Studies TeacherHarvard GraduateLikes to play golfHas four children1 wife named BettyEnjoys woodworking
![Page 38: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/38.jpg)
BREAK!!!!!
![Page 39: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/39.jpg)
E-mail Basics E-mail is similar to a postcard. E-mail is *not* secure—nor is it private. Encryption is the only way to help in
preventing others from reading your e-mail.
![Page 40: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/40.jpg)
Email Security Fundamentals
Question Unsolicited Documents.
Use attachments only when necessary.
Question ALL executable programs received via email.
Notify the sender of infected emails!
Pay attention to file extensions...
![Page 41: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/41.jpg)
Common File Extensions
Great Resource:http://www.matisse.net/files/formats.html
Extension Type
.html .htm Webpage
.doc Word Document
.gif .jpg Graphic
.exe Program—self extracting (*caution!)
![Page 42: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/42.jpg)
Make sure that this box is *not* checked.
Finding File Extensions in
Windows-based machines:
1. Click on START.
2. Select SETTINGS
3. Select CONTROL PANEL
4. Select FOLDER OPTIONS
5. Select VIEW
![Page 43: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/43.jpg)
SPAM
Internet “Junk” Mail Unsolicited email—usually sent to
many people According to the Gartner Group, a
research firm, about 90% of email users receive spam.
![Page 44: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/44.jpg)
The Pros and Cons of Spam
A Brainstorming Activity….
![Page 45: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/45.jpg)
Why Should I be Concerned about
Spam? Costs Money.
– Recipient of the advertisement pays for the connection time, disk space, bandwidth, etc. Lost Productivity.
– Time, Time, Time Clogged Email.
– May be prevent receipt of important messages. Discourages Internet Use.
– May discourage others from seeing the benefits of the WWW.
![Page 46: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/46.jpg)
Types of Spam
Chain Letters: – A message that urges readers to pass the letter on in order to
receive a reward. Hoaxes:
– Chain letter that is based upon a fictitious scenario or circumstance. Urban Legends:
– Email messages providing “safety” messages or warnings.
![Page 47: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/47.jpg)
Resources to Find the Truth About
Spam:
http://www.urbanlegends.com
http://www.urbanmyths.com
http://www.earthlink.net/internet/security/spam
http://www.mcs.com/~jcr/junkmail.html
http://www.junkbusters.com
![Page 48: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/48.jpg)
Ways to Reduce Your Daily Intake of
Spam Use a “dummy” account for online promotions, games, etc. Request that your information be removed from Internet “white
pages”. Be sure to HIDE your information when joining a listserv or mailing
list. Cut and Paste funny stories, poems, etc.
– Encourage others to do the same!
![Page 49: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/49.jpg)
Acceptable Use Policies
Link to the CERIAS AUP website.
![Page 50: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/50.jpg)
Develop Classroom Technology Guidelines
Supplement to overall AUPs Details expectations of the students Opens dialogue on infosec issues Protects the teacher---responsibility is
placed upon the choices made by students
![Page 51: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/51.jpg)
Reducing “RISK” of Internet Use
Guide students on the Internet---keep them on track and task orientated.
ALWAYS supervise students using the WWW! Remember that a filter cannot be 100% secure Beware of “FREEBIE” offers! Never open attachments that you do not expect
OR that are from someone you do not know! Update your anti-virus software frequently!
![Page 52: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/52.jpg)
Recommended Search Engines---for teachers or
secondary students
Google Yahoo Lycos AltaVista Dogpile (meta search engine)
![Page 53: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/53.jpg)
Kid-Friendly Search Engines
Yahooligans KidsClick Ask Jeeves for Kids Awesome Library Supersnooper Searchopolis
All available online @ CERIAS’ K-12 Site!
![Page 54: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/54.jpg)
Practice: Regular Search Engine v. Kid-Friendly Search
Engine
Keyword: MERMAIDS Try it in: Lycos or Google
– http://www.lycos.com– http://www.google.com
And then, in Yahooligans:– http://www.yahooligans.com
![Page 55: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/55.jpg)
![Page 56: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/56.jpg)
![Page 57: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/57.jpg)
General Searching Tips for Teachers:
Think about ALL of the different words to describe your topic. (ex. Technology Resource Center)
Use as many keywords as possible. Watch for mispelled words!
If you are unsuccessful with one search engine, try using a metasearch engine.
Become familiar with one search engine---and read its list of suggestions!
![Page 58: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/58.jpg)
![Page 59: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/59.jpg)
![Page 60: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/60.jpg)
Why Should I Use Scavenger Hunts?
Excellent technique to guide students on the Internet.
Increases student time on task. Lessons can be used repeatedly with
a small amount of modification. Provides students with an opportunity
to increase their technical skills. Increased student motivation!
![Page 61: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/61.jpg)
How Can Scavenger Hunts be Used?
Individual Assignment Small Group Activity Whole Class Activity Enrichment Activities
![Page 62: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/62.jpg)
Important Elements to Include:
Introduction Specific Task (written or verbal) Clearly Defined Steps Set of Information Source (WWW or
other) Evaluation Conclusion (remind them what they’ve learned!)
![Page 63: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/63.jpg)
Level 1 Sample:
Using this site: http://www.contemplator.com/america/index.html
Answer the following question: Legend has it that Henry VIII wrote the song Greensleeves for whom?
![Page 64: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/64.jpg)
Level 2 Sample:
Find the answers to the following question by accessing the websites listed below: What is the motto of the National Wildlife Federation?
• http://www.volcano.und.edu • http://www.nhm.ac.uk/interactive.html • http://www.nwf.org
![Page 65: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/65.jpg)
Level 3 Sample:
Find the answer to the following question.
Be sure to include the answer and the URL of the website where you found the answer:
Where did Neil Armstrong earn his Bachelor's Degree?
![Page 66: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/66.jpg)
Privacy Primer
![Page 67: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/67.jpg)
What is Privacy?
Privacy refers to “the ability to control the degree to which people and institutions impinge upon one’s life” (Hildreth & Hoyt, 1981)
Also, privacy refers to “the right claimed by an individual to control the disclosure of personal information about themselves” (Adams, 2000)
![Page 68: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/68.jpg)
Privacy Concerns... Privacy issues out ranked world war,
terrorism, global warning, economic depression, racial tensions, guns, and overpopulation as the main concern for Americans as they entered the 21st century. (Adams, 2000)
![Page 69: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/69.jpg)
Online Methods of Collecting Personal Information:
Direct Data Collection: online users voluntarily complete surveys or information requests in exchange for a benefit.
Indirect Data Collection: Web site owners obtain information by depositing “cookies” onto your hard drive. These cookies are small files that could include any of the following: name of your ISP, the “specs” of your machine, passwords, past online purchases, last site visited, areas viewed on current site, etc.
![Page 70: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/70.jpg)
Online Privacy Rights:
Notice: consumers have the right to be notified that data are being collected, how the data will be used, and to whom it will be disclosed.
Choice: consumers should be able to limit the use of information beyond what is needed to complete the transaction
Access: consumers should have a timely and inexpensive way to view data gathered about them and contest its accuracy
Security: organizations that gather data from consumers must reasonably ensure that the information they keep is secure against loss of unauthorized use
Enforcement: effective enforcement against privacy violators is critical to the protection of personal information
![Page 71: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/71.jpg)
Privacy Legislation for Educators
FERPA:– Family Educational Rights and Privacy
Act (1974) requires that educators demeonstrate “due diligence” in protecting student data, information, records, and other sensitive information.
– Teachers can be personally held liable for failing to maintain the integrity of such data.
![Page 72: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/72.jpg)
Legislation continued... COPPA:
– Children’s Online Privacy Protection Act (1998) requires that commercial Web sites targeted at children under the age of 13 must follow a detailed series of procedures (including obtaining parental permission and review) prior to gathering data.
– In a school setting, teacher may grant such permission for educational purposes.
![Page 73: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/73.jpg)
Practical Privacy Techniques for Teachers:
1. Practice Proper Information
Security Techniques
1. E-Mail Awareness
2. Download Precautions
3. Close the Cookie Jar
4. Read Privacy Statements
5. Set up a Second Online Account
![Page 74: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/74.jpg)
Collection of Children’s Information
1999 Survey: 16 million children ---14% of US citizens under the age of 18 regularly use the Internet. (1999)
Study conducted by Cai and Gantz (2000) indicated that the majority of Web sites targeted at children collect personal information from their under-age users.
Children also readily provide personal data in return for a “great prize” (Carlson, 2000)
![Page 75: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/75.jpg)
Dissemination of Privacy Practices to Students:
Fundamentals of protecting privacy is a “new” skill that schools should address (Willard, 2000)
Privacy issues need to be embedded within the curriculum as readily as technical skills (FTC, 2001)
Short lessons and natural teaching moments work well for identifying the topic.
Teachers must serve as a role model for privacy protection practices.
![Page 76: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/76.jpg)
Need for Additional Research:
Few studies have been conducted to determine the current status quo of privacy protection within the K-12 environment.
Institutions of educational research should readily explore the issues surrounding technology integration as well as its effectiveness in the schools.
![Page 77: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/77.jpg)
Privacy Conclusion:
As technology is introduced into schools, it is critical to combine the technical skills with the soft (ethical) skills surrounding the media.
Attention needs to given to both teachers and students upon this topic.
Teachers must practice privacy techniques daily---to protect the information and serve as a positive role model.
![Page 78: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/78.jpg)
Applying this workshop to YOUR world...
Working in groups...
Identify at least 5 ideas, concepts, or activities that you will be able apply to your school environment.
![Page 79: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/79.jpg)
Methods of Professional Development
Share creative methods of motivating teachers.
How do you fit professional development into an already busy school day?
What are some critical elements involved with professional development?
![Page 80: Information Security Boot Camp: Survival Techniques for Teaching Teachers and Students Information Security Basics Melissa Dark K-12 Outreach Coordinator](https://reader036.vdocuments.site/reader036/viewer/2022062516/56649e125503460f94afe19d/html5/thumbnails/80.jpg)
Questions???