SlideShare a Scribd company logo
1 of 13
Download to read offline
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
UNIT TWO
Cyber Ethics and Online Safety
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
SECTION ONE
Cyber Ethics
1
© Air Force Association
Commonly accepted rules of how to behave online
2
Netiquette
• Do not spam forums, chat rooms, or
social media sites with useless or
repeated information
• Do not pretend to be someone else
• Do not post or distribute illegal
material
• Do not use abusive or threatening
language
• Do not try to obtain personal info
about someone
H00psF@N89: Did you guys see the game last
night?
B@ll3r4Lyfe: I did! Miami did alright on D, but
they have to work on their 3pt game
L3br0nJ@mes: THE CELTICS SUCK! GO
MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
L3br0nJ@mes: THE CELTICS SUCK! GO
MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
L3br0nJ@mes: THE CELTICS SUCK! GO
MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
L3br0nJ@mes: THE CELTICS SUCK! GO
MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
© Air Force Association
• Affects 29.2% of students
every year and the number
is growing
• Forms:
‐ Insulting texts or emails
‐ Rumors sent via email or
social networking sites
‐ Fake profiles
‐ Embarrassing photos or videos
• Why it’s harmful:
‐ Anonymous
‐ Can be done 24/7
3
Cyberbullying
An0nym0us1234: OMG.
Did u see Jane’s skirt
today?? What color was
that??! puke green???
N0n@me1234:
I know!!!!! She’s totally
uggo.
Source: http://www.stopbullying.gov/cyberbullying/
© Air Force Association
• Do not respond to any
messages, posts or emails
• Block offenders
• Document and report the
behavior so it can be
addressed
• Flag the content so other
people aren’t hurt by it
4
Cyberbullying: If it Happens to You
Source: http://www.stopbullying.gov/cyberbullying/
© Air Force Association
• To schools:
• Inform your school of any cyberbullying as you would with
other types of bullying
• Provide screenshots or records of bullying
• To your parents and law enforcement, especially if
it involves any of the following:
• Threats of violence
• Explicit messages or photos
• Taking a photo or video of someone in a place where he or
she would expect privacy
• Stalking and hate crimes
5
Cyberbullying: Report It
© Air Force Association
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization
or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.
6
The 10 Commandments of Computer Ethics
Source: The Computer Ethics Institute, http://computerethicsinstitute.org/
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
SECTION TWO
Online Safety
7
© Air Force Association
• Chat only with trusted, verified individuals
• Never publically share these things online:
‐ Passwords
‐ Social Security number
‐ Student ID number
‐ Other Personally Identifiable
Information (PII)
• Never share your password
• Always log out when you are done
• Never post anything you do not want public
‐ You might think you’re being safe and limiting
your posts to only friends, but anything you
post can be easily copied and pasted and sent
to someone else
8
Safety Online: The Basics
© Air Force Association
• Online Shopping
• Social Media
• Any other website that
requires Personally Identifiable
Information (PII)
• These sites are enjoyable and
useful. Just make sure you are
being extra careful when
visiting them.
9
Risk Sites
© Air Force Association
https://login.microsoftonline.com/
• Do not use public Wi-Fi to access risk sites
• Check the address for spoofs
• Use a secure website, especially when submitting PII
‐ Look for an "s" after “http” in the web address
‐ Look for a ‘padlock’ in the browser address bar
‐ Look for a green background or green text
10
Safe Browsing
http://bank0famerica.com
© Air Force Association
• Use automatic updates
• Use and regularly update built-in safety features
‐ Pop-up blockers
‐ Anti-spyware
‐ Anti-virus
‐ Anti-phishing
• Do not use “Save Password” or “Remember Me” functions
• Internet Explorer is more frequently targeted and has
more security flaws than any other browser
11
Browser Tools
© Air Force Association
• Be picky
‐ Only accept or follow friends you know if real life
• Do not post your location
• Be careful with apps
‐ Games and geo-tracking apps may give away your
location or other PII
• Assume everything you post online is
permanent
‐ Colleges and employers check social media
accounts
• Don’t over-share
‐ Just because a site asks for information doesn’t
mean it’s required to set up an account
• Customize and update your security settings
‐ Default settings are weak
12
Social Media Tips
?
Source: play.google.com

More Related Content

What's hot

Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
New internet security
New internet securityNew internet security
New internet security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Internet security
Internet securityInternet security
Internet security
 
internet security
internet securityinternet security
internet security
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Combatting cyberterrorism
Combatting cyberterrorismCombatting cyberterrorism
Combatting cyberterrorism
 

Similar to Unit+two+ +cyber+ethics+and+online+safety

Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
lcnemedez
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
lahill16
 
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptTechnological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.ppt
ssuserc4a497
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
CatherineBagaan
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
AnasHabib23
 

Similar to Unit+two+ +cyber+ethics+and+online+safety (20)

Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
L1-WEEK-1-2-Second.pptx
L1-WEEK-1-2-Second.pptxL1-WEEK-1-2-Second.pptx
L1-WEEK-1-2-Second.pptx
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptTechnological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.ppt
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
social networking .pptx
social networking .pptxsocial networking .pptx
social networking .pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
 

More from Erdo Deshiant Garnaby

More from Erdo Deshiant Garnaby (16)

Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
Org Design
Org DesignOrg Design
Org Design
 
HOS Talent management presentation
HOS Talent management presentationHOS Talent management presentation
HOS Talent management presentation
 
Talent management
Talent managementTalent management
Talent management
 
Unit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resourcesUnit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resources
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+securityUnit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
 
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringUnit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
 
microsoft+windows+security
microsoft+windows+securitymicrosoft+windows+security
microsoft+windows+security
 
Unit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machinesUnit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machines
 
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+securityUnit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurityUnit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurity
 
introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityintroduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 

Recently uploaded

Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
mbmh111980
 

Recently uploaded (20)

AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCAOpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
 
Odoo vs Shopify: Why Odoo is Best for Ecommerce Website Builder in 2024
Odoo vs Shopify: Why Odoo is Best for Ecommerce Website Builder in 2024Odoo vs Shopify: Why Odoo is Best for Ecommerce Website Builder in 2024
Odoo vs Shopify: Why Odoo is Best for Ecommerce Website Builder in 2024
 
AI Hackathon.pptx
AI                        Hackathon.pptxAI                        Hackathon.pptx
AI Hackathon.pptx
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
Naer Toolbar Redesign - Usability Research Synthesis
Naer Toolbar Redesign - Usability Research SynthesisNaer Toolbar Redesign - Usability Research Synthesis
Naer Toolbar Redesign - Usability Research Synthesis
 
The Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion ProductionThe Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion Production
 
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
A Python-based approach to data loading in TM1 - Using Airflow as an ETL for TM1
 
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdfThe Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
The Evolution of Web App Testing_ An Ultimate Guide to Future Trends.pdf
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
how-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdfhow-to-download-files-safely-from-the-internet.pdf
how-to-download-files-safely-from-the-internet.pdf
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 

Unit+two+ +cyber+ethics+and+online+safety

  • 1. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org UNIT TWO Cyber Ethics and Online Safety
  • 2. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org SECTION ONE Cyber Ethics 1
  • 3. © Air Force Association Commonly accepted rules of how to behave online 2 Netiquette • Do not spam forums, chat rooms, or social media sites with useless or repeated information • Do not pretend to be someone else • Do not post or distribute illegal material • Do not use abusive or threatening language • Do not try to obtain personal info about someone H00psF@N89: Did you guys see the game last night? B@ll3r4Lyfe: I did! Miami did alright on D, but they have to work on their 3pt game L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
  • 4. © Air Force Association • Affects 29.2% of students every year and the number is growing • Forms: ‐ Insulting texts or emails ‐ Rumors sent via email or social networking sites ‐ Fake profiles ‐ Embarrassing photos or videos • Why it’s harmful: ‐ Anonymous ‐ Can be done 24/7 3 Cyberbullying An0nym0us1234: OMG. Did u see Jane’s skirt today?? What color was that??! puke green??? N0n@me1234: I know!!!!! She’s totally uggo. Source: http://www.stopbullying.gov/cyberbullying/
  • 5. © Air Force Association • Do not respond to any messages, posts or emails • Block offenders • Document and report the behavior so it can be addressed • Flag the content so other people aren’t hurt by it 4 Cyberbullying: If it Happens to You Source: http://www.stopbullying.gov/cyberbullying/
  • 6. © Air Force Association • To schools: • Inform your school of any cyberbullying as you would with other types of bullying • Provide screenshots or records of bullying • To your parents and law enforcement, especially if it involves any of the following: • Threats of violence • Explicit messages or photos • Taking a photo or video of someone in a place where he or she would expect privacy • Stalking and hate crimes 5 Cyberbullying: Report It
  • 7. © Air Force Association 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. 6 The 10 Commandments of Computer Ethics Source: The Computer Ethics Institute, http://computerethicsinstitute.org/
  • 8. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org SECTION TWO Online Safety 7
  • 9. © Air Force Association • Chat only with trusted, verified individuals • Never publically share these things online: ‐ Passwords ‐ Social Security number ‐ Student ID number ‐ Other Personally Identifiable Information (PII) • Never share your password • Always log out when you are done • Never post anything you do not want public ‐ You might think you’re being safe and limiting your posts to only friends, but anything you post can be easily copied and pasted and sent to someone else 8 Safety Online: The Basics
  • 10. © Air Force Association • Online Shopping • Social Media • Any other website that requires Personally Identifiable Information (PII) • These sites are enjoyable and useful. Just make sure you are being extra careful when visiting them. 9 Risk Sites
  • 11. © Air Force Association https://login.microsoftonline.com/ • Do not use public Wi-Fi to access risk sites • Check the address for spoofs • Use a secure website, especially when submitting PII ‐ Look for an "s" after “http” in the web address ‐ Look for a ‘padlock’ in the browser address bar ‐ Look for a green background or green text 10 Safe Browsing http://bank0famerica.com
  • 12. © Air Force Association • Use automatic updates • Use and regularly update built-in safety features ‐ Pop-up blockers ‐ Anti-spyware ‐ Anti-virus ‐ Anti-phishing • Do not use “Save Password” or “Remember Me” functions • Internet Explorer is more frequently targeted and has more security flaws than any other browser 11 Browser Tools
  • 13. © Air Force Association • Be picky ‐ Only accept or follow friends you know if real life • Do not post your location • Be careful with apps ‐ Games and geo-tracking apps may give away your location or other PII • Assume everything you post online is permanent ‐ Colleges and employers check social media accounts • Don’t over-share ‐ Just because a site asks for information doesn’t mean it’s required to set up an account • Customize and update your security settings ‐ Default settings are weak 12 Social Media Tips ? Source: play.google.com