shannon morris pdlm presentation

24
NETS.T VI.D Promote Safe and Healthy Use of Technology Resources NETS.S 2 Students understand the ethical, cultural, and societal issues related to technology. Students practice responsible use of technology systems, information, and software. Network Security By Shannon Morris

Upload: shannoncmorris

Post on 25-May-2015

180 views

Category:

Education


2 download

DESCRIPTION

Digital Security in the classroom

TRANSCRIPT

Page 1: Shannon Morris PDLM presentation

NETS.T VI.D• Promote Safe and

Healthy Use of Technology Resources

NETS.S 2• Students understand

the ethical, cultural, and societal issues related to technology.

• Students practice responsible use of technology systems, information, and software.

• Students develop positive attitudes toward technology uses that support lifelong learning, collaboration, personal pursuits, and productivity.

Network Security

By Shannon Morris

Page 2: Shannon Morris PDLM presentation

• How can educators and students protect their technology?

• What should students do to help keep the school’s technology resources secure?

• What user behaviors pose a threat

to network security?

Network SecurityFocus

questions

Page 3: Shannon Morris PDLM presentation

is to make students aware that their school’s network needs to be protected from outside threats.

Our objective

Page 5: Shannon Morris PDLM presentation

http://www.youtube.com/watch?v=c34QwtYI40g

Page 6: Shannon Morris PDLM presentation

What is it about using computers that you cannot

live without?• School assignments

• Socialize

• Find out more about yourself and the world

• Have fun

Page 7: Shannon Morris PDLM presentation

Scenarios

Page 8: Shannon Morris PDLM presentation

High School HackerAn 18-year-old high school senior enters theschool building after school hours. He usespasswords stolen from teachers to hack into theschool network, changing his grades and changing the grades of some of his friends as well. He installs malware, or malicious code, that allows him to re-enter the network from any computer outside school. Instead of attending his high school graduation, he sits consulting with his lawyer, charged with crimes that, added up, could possibly result in a 38-year prison sentence.

Page 9: Shannon Morris PDLM presentation

What’s the Problem?

• What actions did the young man take that were wrong, broke school rules, and may have been illegal?

• Who was affected by these actions?

• What if you were a student at that school—how might his actions affect you?

Page 10: Shannon Morris PDLM presentation

In the first scenario, an 18-year-old high school senior hacks his school network to change his grades. The charges in this true story included

• Burglary• identity theft• changing public records

—all federal offenses. The fact that he was 18 meant that he could be charged as an adult. His actions were certainly in violation of the school's acceptable use policies.

Page 11: Shannon Morris PDLM presentation

Malicious IMs

A 19-year-old hacker creates malwarethat spreads itself through instant

messages. The messages, which looklike they are from a buddy, invite thevictim to look at a photo on a socialnetworking profile. In reality, the link

leads to a phony Web site that installsthe malicious code on the victim’s

computer. As a result, all the information

stored on the computer, including credit

card numbers, can be viewed andcopied by the hacker.

Page 12: Shannon Morris PDLM presentation

What’s the Problem?

What could be the consequences for the victims of this young hacker’s actions?

Page 13: Shannon Morris PDLM presentation

• In the second scenario, the 19-year-old teen pled guilty to accessing protected computers to commit fraud.

• The consequences for the victims were all the problems associated with identity theft, which can affect their ability to use credit cards or borrow money.

Page 14: Shannon Morris PDLM presentation

Roaming Robots

An American employee of a company that sells kitchenware turns his company’s computers into a network of virtual robots that earn him extra money while he sleeps. He uses his botnet to infect personal computers all over Europe with malware that displays pop-up ads on command.

A second company, an advertising company in the Netherlands pays him for each software installation. His trial results in a sentence of three and a half years in prison.

Page 15: Shannon Morris PDLM presentation

What’s the Problem?

• How did this person’s actions affect his employer?

• How could they affect the people who owned the computers he infected?

Page 16: Shannon Morris PDLM presentation

In the third scenario, the employee

• Violated his company's computer use policies.

• His malware could affect the ability of his company to carry on its business.

• The malware could damage or destroy files on the victims' personal computers.

Page 17: Shannon Morris PDLM presentation

Think About It

Every day different parts of the Internet are routinely scanned. There are many reasons people do these scans:

• to understand the Internet better

• to invent ways to make it work more efficiently for their business

• to look for computers to attack.

Page 18: Shannon Morris PDLM presentation

The attacks can come from • lone teenage hackers

• organized crime rings

• Political organizations

Page 19: Shannon Morris PDLM presentation

Some do it for • the bragging rights• to promote a cause• To attack others’ homeland networks• To make money• To steal money from others.

Page 20: Shannon Morris PDLM presentation

The Internet is a two-way street

Page 21: Shannon Morris PDLM presentation

Imagine…

Page 22: Shannon Morris PDLM presentation

Email attachments

Know what your are opening

File-sharing settings

Back-ups

Passwords

No remembering logins

Sign out

Snoops

Clear history

Starting point for your cyber security planning.

Page 23: Shannon Morris PDLM presentation

Let’s Review What are some sources of security threats to

personal and public computers?

How can you stay informed about cyber security?

What are some essential cyber security actions that you can take?

Page 24: Shannon Morris PDLM presentation

Sources

Ribble, M., & Bailey, G. (2007). Digital citizenship in schools. (1 ed., Vol. 1, p. 120). Eugene, OR: International Society for Technology in Education.

Common Sense Media. (2012). Safeguarding your stuff, my stuff, our stuff. Retrieved from http://cybersmartcurriculum.org/safetysecurity/lessons/9-12/safeguarding_your_stuff_my_stuff_our_stuff/

Pro-Active Computing. (Designer). (2012). Threats. [Web Graphic]. Retrieved from http://pro-activecomputing.com/2973/index.html