Your SlideShare is downloading. ×
0
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
HECCTW11
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

HECCTW11

311

Published on

Published in: Education, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
311
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. HECC Driver’s Education for the Information Highway
    • 2. Driver’s Education for the Information Highway
      • Analogous to driving a car
      • Benefits and risks
      • We work hard to make sure our students have skills and knowledge they need
    • 3. Driver’s Education for the Information Highway What we’ll cover today
      • Protect your vehicle and yourself
        • Major risks we face when working online and using email
        • Ways we can minimize these risks
        • Protect your passwords
      • Stay safe when sharing the road
        • Risks we encounter when using social networking sites (e.g. cyberbullying)
        • What technology and education experts recommend for managing those risks
      • Drive carefully
        • Is information you post really private?
        • When we delete it, is it really gone?
      • Know the rules of the road
        • Verify content accuracy
        • Guard against plagiarism
    • 4. Safe Driving on the Information Highway: Protect your vehicle
      • Risks
        • Unsafe disclosure of personal information
          • Active and passive
        • Malware ( Mal icious Soft ware )
    • 5. Safe Driving on the Information Highway: Protect your vehicle
    • 6. Safe Driving on the Information Highway: Protect your vehicle
      • Unsafe disclosure of personal information
        • What
          • Usernames
          • Passwords
          • Social Security numbers
          • Credit card numbers
          • PIN numbers
          • Information that can be used to locate you, like address, phone number, etc.
    • 7. Safe Driving on the Information Highway: Protect your vehicle
      • Unsafe disclosure of personal information
        • How
          • You reveal
            • Social engineering
            • Unintentional sharing
          • Stolen by malware
    • 8. Safe Driving on the Information Highway: Protect your vehicle
      • Social engineering
        • Art of manipulating people into performing actions or divulging confidential information
          • Phishing
          • Baiting
      Kevin Mitnick
    • 9. Safe Driving on the Information Highway: Protect your vehicle
      • Phishing
        • Email appears legitimate
        • Urgent
        • Site requests information
        • Often contains malware
    • 10. Safe Driving on the Information Highway: Protect your vehicle
      • Phishing
        • Seems obvious, but people reply
    • 11. Safe Driving on the Information Highway: Protect your vehicle
      • Phishing: How to protect yourself
        • Be aware and make sure students are aware no legitimate business or organization will EVER ask you to send personal information via email or unsecured site
        • Never click on a link in an email unless you know source
        • Whenever entering information in a site, look carefully at url
        • Use anti-virus program that has phishing filter
    • 12. Safe Driving on the Information Highway: Protect your vehicle
    • 13. Safe Driving on the Information Highway: Protect your vehicle
      • Baiting
        • Attacker leaves malware infected media in location sure to be found
        • Makes label enticing
        • Malware loaded when media inserted into computer
    • 14. Safe Driving on the Information Highway: Protect your vehicle
      • How to protect yourself from baiting
        • Simple. Never insert a flash drive, cd etc into your computer that is not yours or from a source you trust
    • 15. Safe Driving on the Information Highway Protect your vehicle
      • Unintentional sharing: What is it?
        • Photos with identifying information
        • Public messages (Myspace wall) with identifying information
    • 16. Safe Driving on the Information Highway Protect your vehicle
      • Unintentional sharing: How to avoid
        • Carefully look at and coach your students to carefully look at and think through all information they post online
    • 17. Safe Driving on the Information Highway Protect your vehicle
      • Malware
        • Once loaded can work 24 hours a day
          • Transmitting your personal information
          • Downloading advertisements
        • Hijack your computer for its own use
    • 18. Safe Driving on the Information Highway Protect your vehicle
      • How malware gets installed
        • Trick you into clicking link
          • File download
          • Active X
        • Sometimes act of canceling or trying to close pop up will activate installation
        • Trojan in freeware
          • Screensavers, etc.
    • 19. Safe Driving on the Information Highway Protect your vehicle
      • How to protect yourself from malward
        • Anytime you are installing freeware
          • Read license agreement carefully
          • Check publisher’s website carefully
          • Do web search with keywords: name of program, adware, spyware
        • Install pop up blocker
        • If you click on link and see install dialog box don’t hit yes unless you are sure of source
    • 20. Safe Driving on the Information Highway Protect your vehicle
      • Protect your passwords
        • Use strong passwords
          • 8-13 characters
          • Letters and numbers or special characters
          • Not complete words
            • First letter or each word in a phrase
        • Hard to guess. Easy to remember.
    • 21. Safe Driving on the Information Highway Protect your vehicle
      • Don’t use
        • “ password” “passcode” “admin” etc.
        • Anything people would know about you
          • Pets name, child’s name, birthday, etc.
        • Swear word
    • 22. Safe Driving on the Information Highway Protect your vehicle
      • Protect your passwords
        • Never share it
        • Never write it down
    • 23. Safe Driving on the Information Highway Protect your vehicle
      • Summary
        • Don’t open email if you don’t know who it is from
        • Don’t click on a link in email unless you trust source
        • Don’t open an attachment or download a file unless you trust source
        • If you ever do click on a link in an email, carefully check url
    • 24. Safe Driving on the Information Highway Protect your vehicle
      • Point your browser to http://hecctw11.ning.com/
      • Click sign up
      • Upload your photo if you brought one and fill out your profile
      • Click on “My Settings” and edit/add to “About me,” “Privacy,” and “Email.”
      • Under privacy, for today’s purposes, I recommend letting anyone view and comment on your pages.
    • 25. Driver's Education for the Information Highway Stay safe when sharing the road
      • Myspace = 200 million
      • Facebook = 39 million
    • 26.
      • 93% of American teens use internet (12-17) 1
      • 96% of students with online access report they have used Driver's Education for the Information Highway 2
      • 51% of boys, 58% of girls created profiles on social networking sites 3
      • 9-17 year olds spend about 9 hours a week on social networking activities 1
      Driver's Education for the Information Highway Stay safe when sharing the road
    • 27.
      • How do teens use social networking sites?
      Driver's Education for the Information Highway Stay safe when sharing the road
    • 28.
      • Social networking sites: Risks
        • Unsafe disclosure of personal information 1
        • Cyberthreats 1
        • Risky sexual behavior 1
        • Dangerous communities 1
        • Addiction 1
        • Anonymity 2
        • Cyberbullying 1 (let’s take a closer look)
      Driver's Education for the Information Highway Stay safe when sharing the road 1 Source: Nancy E. Willard, A Briefing for Educators: Online Social Networking Communities and Youth Risk. 2006. http://csriu.org/cyberbully/docs/youthriskonlinealert.pdf 2 Source: Magid, Larry, and Collier Anne. MySpace Unraveled: a Parent's Guide to Teen Social Networking. Berkeley, CA: Peachpit Press, 2007
    • 29.
      • Cyberbullying: What is it?
        • Flaming
        • Harassment
        • Denigration
        • Impersonation
        • Outing
        • Trickery
        • Exclusion
        • Cyberstalking
      Driver's Education for the Information Highway Stay safe when sharing the road Source: Nancy E. Willard. “Educator’s Guide to Cyberbullying and Cyberthreats. April 2007. http://www.cyberbully.org/cyberbully/docs/cbcteducator.pdf
    • 30. Driver's Education for the Information Highway Stay safe when sharing the road
      • Cyberbullying: What’s different?
        • 24/7 and the invasion of home/personal space
        • The audience can be very large and reached rapidly
        • People who cyberbully may attempt to remain anonymous
      Source: Childnet International. 2007. http://safesocialnetworking.com/img/safety/Cyberbullying_1.pdf
    • 31. Driver's Education for the Information Highway Stay safe when sharing the road
      • Cyberbullying: What to do?
        • No single solution
        • Five key areas
          • Understand and talk about cyberbullying
          • Update existing policies and practices
          • Make reporting cyberbullying easier
          • Promote the positive use of technology
      Source: Childnet International. 2007. http://safesocialnetworking.com/img/safety/Cyberbullying_1.pdf
    • 32. Driver's Education for the Information Highway Stay safe when sharing the road
      • Social networking sites: Safety resources
    • 33. Driver's Education for the Information Highway Stay safe when sharing the road
      • Social networking sites: Safety resources
    • 34.
      • Guide students to:
        • Be kind to others online. 1
        • Think before you post. Not private. 1
        • Report to an adult if someone posts threats of violence to self/others. 1
        • Develop “stranger danger” detection skills. 1
        • Report to adult if you think you’ve been contacted by predator. 1
        • Do not check “remember box” on public computer. 2
        • Don’t post personal information that will make you vulnerable. 2
        • Never share your password. 2
      Driver's Education for the Information Highway Stay safe when sharing the road 1 Nancy E. Willard. “The MySpace Phenomenon” www.Galeschools.com 2 Source: Magid, Larry, and Collier Anne. MySpace Unraveled: a Parent's Guide to Teen Social Networking. Berkeley, CA: Peachpit Press, 2007
    • 35.
      • “ For the most part, these (MySpace users) are just average everyday, good kids . . . and this is part of their social life.”
      • Detective Frank Danahey 15 year veteran Youth Division police officer in Rocky Hill, Connecticut
      • Source: MySpace Unraveled: A Parent’s Guide to Teen Social Networking , Larry Magid and Anne Collier (p16)
      Driver's Education for the Information Highway Stay safe when sharing the road
    • 36.
      • Educate staff, students, and parents about safe and responsible internet use
      • Using a filter to block social networking sites is not an effective strategy
      • Set guidelines the direct students not to access social networking sites at school
      • Know terms of site Use Agreement and use them
      • Incorporate online speech into School threat assessment and suicide prevention plans
      • Define process to effectively respond to misuse reports
      Driver's Education for the Information Highway Stay safe when sharing the road Source: Willard, Nancy E.. “A Briefing for Educators: Online Social Networking Communities and Youth Risk” (2006) Recommendations for schools
    • 37. Driver's Education for the Information Highway Stay safe when sharing the road
      • NSBA report
        • Explore social networking sites
        • Consider using social networking for staff communications and professional development
        • Find ways to harness the educational value of social networking
        • Ensure equitable access
        • Reexamine social networking policies
          • Safety policies remain important, as does teaching students about online safety and responsible online expression — but students may learn these lessons better while they’re actually using social networking tools
    • 38. Driver's Education for the Information Highway Stay safe when sharing the road
      • Exercise
    • 39. Social Networking Technologies Drive carefully
      • Public
      • Access through friend of a friend
      • Hacking
      • Permanent
      • Caching
      • Wayback
      Make sure students understand everything they post online is Mitrano, Tracy. Thoughts on Facebook. April, 2006. Cornell University. Ithica, NY <http://www.cit.cornell.edu/policy/memos/facebook.html>
    • 40. Social Networking Technologies Drive carefully
      • Exercise
    • 41. Social Networking Technologies Know the rules of the road Magid, Larry and Collier Anne. MySpace Unraveled: A Parent’s Guide to Teen Social Networking
    • 42. Social Networking Technologies Know the rules of the road Magid, Larry and Collier Anne. MySpace Unraveled: A Parent’s Guide to Teen Social Networking
    • 43. Social Networking Technologies Drive carefully
      • Exercise
    • 44. Social Networking Technologies Drive carefully
      • Exercise
    • 45.
      • Thank you!

    ×