HECCTW11

478 views

Published on

Published in: Education, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
478
On SlideShare
0
From Embeds
0
Number of Embeds
24
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • HECCTW11

    1. 1. HECC Driver’s Education for the Information Highway
    2. 2. Driver’s Education for the Information Highway <ul><li>Analogous to driving a car </li></ul><ul><li>Benefits and risks </li></ul><ul><li>We work hard to make sure our students have skills and knowledge they need </li></ul>
    3. 3. Driver’s Education for the Information Highway What we’ll cover today <ul><li>Protect your vehicle and yourself </li></ul><ul><ul><li>Major risks we face when working online and using email </li></ul></ul><ul><ul><li>Ways we can minimize these risks </li></ul></ul><ul><ul><li>Protect your passwords </li></ul></ul><ul><li>Stay safe when sharing the road </li></ul><ul><ul><li>Risks we encounter when using social networking sites (e.g. cyberbullying) </li></ul></ul><ul><ul><li>What technology and education experts recommend for managing those risks </li></ul></ul><ul><li>Drive carefully </li></ul><ul><ul><li>Is information you post really private? </li></ul></ul><ul><ul><li>When we delete it, is it really gone? </li></ul></ul><ul><li>Know the rules of the road </li></ul><ul><ul><li>Verify content accuracy </li></ul></ul><ul><ul><li>Guard against plagiarism </li></ul></ul>
    4. 4. Safe Driving on the Information Highway: Protect your vehicle <ul><li>Risks </li></ul><ul><ul><li>Unsafe disclosure of personal information </li></ul></ul><ul><ul><ul><li>Active and passive </li></ul></ul></ul><ul><ul><li>Malware ( Mal icious Soft ware ) </li></ul></ul>
    5. 5. Safe Driving on the Information Highway: Protect your vehicle
    6. 6. Safe Driving on the Information Highway: Protect your vehicle <ul><li>Unsafe disclosure of personal information </li></ul><ul><ul><li>What </li></ul></ul><ul><ul><ul><li>Usernames </li></ul></ul></ul><ul><ul><ul><li>Passwords </li></ul></ul></ul><ul><ul><ul><li>Social Security numbers </li></ul></ul></ul><ul><ul><ul><li>Credit card numbers </li></ul></ul></ul><ul><ul><ul><li>PIN numbers </li></ul></ul></ul><ul><ul><ul><li>Information that can be used to locate you, like address, phone number, etc. </li></ul></ul></ul>
    7. 7. Safe Driving on the Information Highway: Protect your vehicle <ul><li>Unsafe disclosure of personal information </li></ul><ul><ul><li>How </li></ul></ul><ul><ul><ul><li>You reveal </li></ul></ul></ul><ul><ul><ul><ul><li>Social engineering </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Unintentional sharing </li></ul></ul></ul></ul><ul><ul><ul><li>Stolen by malware </li></ul></ul></ul>
    8. 8. Safe Driving on the Information Highway: Protect your vehicle <ul><li>Social engineering </li></ul><ul><ul><li>Art of manipulating people into performing actions or divulging confidential information </li></ul></ul><ul><ul><ul><li>Phishing </li></ul></ul></ul><ul><ul><ul><li>Baiting </li></ul></ul></ul>Kevin Mitnick
    9. 9. Safe Driving on the Information Highway: Protect your vehicle <ul><li>Phishing </li></ul><ul><ul><li>Email appears legitimate </li></ul></ul><ul><ul><li>Urgent </li></ul></ul><ul><ul><li>Site requests information </li></ul></ul><ul><ul><li>Often contains malware </li></ul></ul>
    10. 10. Safe Driving on the Information Highway: Protect your vehicle <ul><li>Phishing </li></ul><ul><ul><li>Seems obvious, but people reply </li></ul></ul>
    11. 11. Safe Driving on the Information Highway: Protect your vehicle <ul><li>Phishing: How to protect yourself </li></ul><ul><ul><li>Be aware and make sure students are aware no legitimate business or organization will EVER ask you to send personal information via email or unsecured site </li></ul></ul><ul><ul><li>Never click on a link in an email unless you know source </li></ul></ul><ul><ul><li>Whenever entering information in a site, look carefully at url </li></ul></ul><ul><ul><li>Use anti-virus program that has phishing filter </li></ul></ul>
    12. 12. Safe Driving on the Information Highway: Protect your vehicle
    13. 13. Safe Driving on the Information Highway: Protect your vehicle <ul><li>Baiting </li></ul><ul><ul><li>Attacker leaves malware infected media in location sure to be found </li></ul></ul><ul><ul><li>Makes label enticing </li></ul></ul><ul><ul><li>Malware loaded when media inserted into computer </li></ul></ul>
    14. 14. Safe Driving on the Information Highway: Protect your vehicle <ul><li>How to protect yourself from baiting </li></ul><ul><ul><li>Simple. Never insert a flash drive, cd etc into your computer that is not yours or from a source you trust </li></ul></ul>
    15. 15. Safe Driving on the Information Highway Protect your vehicle <ul><li>Unintentional sharing: What is it? </li></ul><ul><ul><li>Photos with identifying information </li></ul></ul><ul><ul><li>Public messages (Myspace wall) with identifying information </li></ul></ul>
    16. 16. Safe Driving on the Information Highway Protect your vehicle <ul><li>Unintentional sharing: How to avoid </li></ul><ul><ul><li>Carefully look at and coach your students to carefully look at and think through all information they post online </li></ul></ul>
    17. 17. Safe Driving on the Information Highway Protect your vehicle <ul><li>Malware </li></ul><ul><ul><li>Once loaded can work 24 hours a day </li></ul></ul><ul><ul><ul><li>Transmitting your personal information </li></ul></ul></ul><ul><ul><ul><li>Downloading advertisements </li></ul></ul></ul><ul><ul><li>Hijack your computer for its own use </li></ul></ul>
    18. 18. Safe Driving on the Information Highway Protect your vehicle <ul><li>How malware gets installed </li></ul><ul><ul><li>Trick you into clicking link </li></ul></ul><ul><ul><ul><li>File download </li></ul></ul></ul><ul><ul><ul><li>Active X </li></ul></ul></ul><ul><ul><li>Sometimes act of canceling or trying to close pop up will activate installation </li></ul></ul><ul><ul><li>Trojan in freeware </li></ul></ul><ul><ul><ul><li>Screensavers, etc. </li></ul></ul></ul>
    19. 19. Safe Driving on the Information Highway Protect your vehicle <ul><li>How to protect yourself from malward </li></ul><ul><ul><li>Anytime you are installing freeware </li></ul></ul><ul><ul><ul><li>Read license agreement carefully </li></ul></ul></ul><ul><ul><ul><li>Check publisher’s website carefully </li></ul></ul></ul><ul><ul><ul><li>Do web search with keywords: name of program, adware, spyware </li></ul></ul></ul><ul><ul><li>Install pop up blocker </li></ul></ul><ul><ul><li>If you click on link and see install dialog box don’t hit yes unless you are sure of source </li></ul></ul>
    20. 20. Safe Driving on the Information Highway Protect your vehicle <ul><li>Protect your passwords </li></ul><ul><ul><li>Use strong passwords </li></ul></ul><ul><ul><ul><li>8-13 characters </li></ul></ul></ul><ul><ul><ul><li>Letters and numbers or special characters </li></ul></ul></ul><ul><ul><ul><li>Not complete words </li></ul></ul></ul><ul><ul><ul><ul><li>First letter or each word in a phrase </li></ul></ul></ul></ul><ul><ul><li>Hard to guess. Easy to remember. </li></ul></ul>
    21. 21. Safe Driving on the Information Highway Protect your vehicle <ul><li>Don’t use </li></ul><ul><ul><li>“ password” “passcode” “admin” etc. </li></ul></ul><ul><ul><li>Anything people would know about you </li></ul></ul><ul><ul><ul><li>Pets name, child’s name, birthday, etc. </li></ul></ul></ul><ul><ul><li>Swear word </li></ul></ul>
    22. 22. Safe Driving on the Information Highway Protect your vehicle <ul><li>Protect your passwords </li></ul><ul><ul><li>Never share it </li></ul></ul><ul><ul><li>Never write it down </li></ul></ul>
    23. 23. Safe Driving on the Information Highway Protect your vehicle <ul><li>Summary </li></ul><ul><ul><li>Don’t open email if you don’t know who it is from </li></ul></ul><ul><ul><li>Don’t click on a link in email unless you trust source </li></ul></ul><ul><ul><li>Don’t open an attachment or download a file unless you trust source </li></ul></ul><ul><ul><li>If you ever do click on a link in an email, carefully check url </li></ul></ul>
    24. 24. Safe Driving on the Information Highway Protect your vehicle <ul><li>Point your browser to http://hecctw11.ning.com/ </li></ul><ul><li>Click sign up </li></ul><ul><li>Upload your photo if you brought one and fill out your profile </li></ul><ul><li>Click on “My Settings” and edit/add to “About me,” “Privacy,” and “Email.” </li></ul><ul><li>Under privacy, for today’s purposes, I recommend letting anyone view and comment on your pages. </li></ul>
    25. 25. Driver's Education for the Information Highway Stay safe when sharing the road <ul><li>Myspace = 200 million </li></ul><ul><li>Facebook = 39 million </li></ul>
    26. 26. <ul><li>93% of American teens use internet (12-17) 1 </li></ul><ul><li>96% of students with online access report they have used Driver's Education for the Information Highway 2 </li></ul><ul><li>51% of boys, 58% of girls created profiles on social networking sites 3 </li></ul><ul><li>9-17 year olds spend about 9 hours a week on social networking activities 1 </li></ul>Driver's Education for the Information Highway Stay safe when sharing the road
    27. 27. <ul><li>How do teens use social networking sites? </li></ul>Driver's Education for the Information Highway Stay safe when sharing the road
    28. 28. <ul><li>Social networking sites: Risks </li></ul><ul><ul><li>Unsafe disclosure of personal information 1 </li></ul></ul><ul><ul><li>Cyberthreats 1 </li></ul></ul><ul><ul><li>Risky sexual behavior 1 </li></ul></ul><ul><ul><li>Dangerous communities 1 </li></ul></ul><ul><ul><li>Addiction 1 </li></ul></ul><ul><ul><li>Anonymity 2 </li></ul></ul><ul><ul><li>Cyberbullying 1 (let’s take a closer look) </li></ul></ul>Driver's Education for the Information Highway Stay safe when sharing the road 1 Source: Nancy E. Willard, A Briefing for Educators: Online Social Networking Communities and Youth Risk. 2006. http://csriu.org/cyberbully/docs/youthriskonlinealert.pdf 2 Source: Magid, Larry, and Collier Anne. MySpace Unraveled: a Parent's Guide to Teen Social Networking. Berkeley, CA: Peachpit Press, 2007
    29. 29. <ul><li>Cyberbullying: What is it? </li></ul><ul><ul><li>Flaming </li></ul></ul><ul><ul><li>Harassment </li></ul></ul><ul><ul><li>Denigration </li></ul></ul><ul><ul><li>Impersonation </li></ul></ul><ul><ul><li>Outing </li></ul></ul><ul><ul><li>Trickery </li></ul></ul><ul><ul><li>Exclusion </li></ul></ul><ul><ul><li>Cyberstalking </li></ul></ul>Driver's Education for the Information Highway Stay safe when sharing the road Source: Nancy E. Willard. “Educator’s Guide to Cyberbullying and Cyberthreats. April 2007. http://www.cyberbully.org/cyberbully/docs/cbcteducator.pdf
    30. 30. Driver's Education for the Information Highway Stay safe when sharing the road <ul><li>Cyberbullying: What’s different? </li></ul><ul><ul><li>24/7 and the invasion of home/personal space </li></ul></ul><ul><ul><li>The audience can be very large and reached rapidly </li></ul></ul><ul><ul><li>People who cyberbully may attempt to remain anonymous </li></ul></ul>Source: Childnet International. 2007. http://safesocialnetworking.com/img/safety/Cyberbullying_1.pdf
    31. 31. Driver's Education for the Information Highway Stay safe when sharing the road <ul><li>Cyberbullying: What to do? </li></ul><ul><ul><li>No single solution </li></ul></ul><ul><ul><li>Five key areas </li></ul></ul><ul><ul><ul><li>Understand and talk about cyberbullying </li></ul></ul></ul><ul><ul><ul><li>Update existing policies and practices </li></ul></ul></ul><ul><ul><ul><li>Make reporting cyberbullying easier </li></ul></ul></ul><ul><ul><ul><li>Promote the positive use of technology </li></ul></ul></ul>Source: Childnet International. 2007. http://safesocialnetworking.com/img/safety/Cyberbullying_1.pdf
    32. 32. Driver's Education for the Information Highway Stay safe when sharing the road <ul><li>Social networking sites: Safety resources </li></ul>
    33. 33. Driver's Education for the Information Highway Stay safe when sharing the road <ul><li>Social networking sites: Safety resources </li></ul>
    34. 34. <ul><li>Guide students to: </li></ul><ul><ul><li>Be kind to others online. 1 </li></ul></ul><ul><ul><li>Think before you post. Not private. 1 </li></ul></ul><ul><ul><li>Report to an adult if someone posts threats of violence to self/others. 1 </li></ul></ul><ul><ul><li>Develop “stranger danger” detection skills. 1 </li></ul></ul><ul><ul><li>Report to adult if you think you’ve been contacted by predator. 1 </li></ul></ul><ul><ul><li>Do not check “remember box” on public computer. 2 </li></ul></ul><ul><ul><li>Don’t post personal information that will make you vulnerable. 2 </li></ul></ul><ul><ul><li>Never share your password. 2 </li></ul></ul>Driver's Education for the Information Highway Stay safe when sharing the road 1 Nancy E. Willard. “The MySpace Phenomenon” www.Galeschools.com 2 Source: Magid, Larry, and Collier Anne. MySpace Unraveled: a Parent's Guide to Teen Social Networking. Berkeley, CA: Peachpit Press, 2007
    35. 35. <ul><li>“ For the most part, these (MySpace users) are just average everyday, good kids . . . and this is part of their social life.” </li></ul><ul><li>Detective Frank Danahey 15 year veteran Youth Division police officer in Rocky Hill, Connecticut </li></ul><ul><li>Source: MySpace Unraveled: A Parent’s Guide to Teen Social Networking , Larry Magid and Anne Collier (p16) </li></ul>Driver's Education for the Information Highway Stay safe when sharing the road
    36. 36. <ul><li>Educate staff, students, and parents about safe and responsible internet use </li></ul><ul><li>Using a filter to block social networking sites is not an effective strategy </li></ul><ul><li>Set guidelines the direct students not to access social networking sites at school </li></ul><ul><li>Know terms of site Use Agreement and use them </li></ul><ul><li>Incorporate online speech into School threat assessment and suicide prevention plans </li></ul><ul><li>Define process to effectively respond to misuse reports </li></ul>Driver's Education for the Information Highway Stay safe when sharing the road Source: Willard, Nancy E.. “A Briefing for Educators: Online Social Networking Communities and Youth Risk” (2006) Recommendations for schools
    37. 37. Driver's Education for the Information Highway Stay safe when sharing the road <ul><li>NSBA report </li></ul><ul><ul><li>Explore social networking sites </li></ul></ul><ul><ul><li>Consider using social networking for staff communications and professional development </li></ul></ul><ul><ul><li>Find ways to harness the educational value of social networking </li></ul></ul><ul><ul><li>Ensure equitable access </li></ul></ul><ul><ul><li>Reexamine social networking policies </li></ul></ul><ul><ul><ul><li>Safety policies remain important, as does teaching students about online safety and responsible online expression — but students may learn these lessons better while they’re actually using social networking tools </li></ul></ul></ul>
    38. 38. Driver's Education for the Information Highway Stay safe when sharing the road <ul><li>Exercise </li></ul>
    39. 39. Social Networking Technologies Drive carefully <ul><li>Public </li></ul><ul><li>Access through friend of a friend </li></ul><ul><li>Hacking </li></ul><ul><li>Permanent </li></ul><ul><li>Caching </li></ul><ul><li>Wayback </li></ul>Make sure students understand everything they post online is Mitrano, Tracy. Thoughts on Facebook. April, 2006. Cornell University. Ithica, NY <http://www.cit.cornell.edu/policy/memos/facebook.html>
    40. 40. Social Networking Technologies Drive carefully <ul><li>Exercise </li></ul>
    41. 41. Social Networking Technologies Know the rules of the road Magid, Larry and Collier Anne. MySpace Unraveled: A Parent’s Guide to Teen Social Networking
    42. 42. Social Networking Technologies Know the rules of the road Magid, Larry and Collier Anne. MySpace Unraveled: A Parent’s Guide to Teen Social Networking
    43. 43. Social Networking Technologies Drive carefully <ul><li>Exercise </li></ul>
    44. 44. Social Networking Technologies Drive carefully <ul><li>Exercise </li></ul>
    45. 45. <ul><li>Thank you! </li></ul>

    ×