SlideShare a Scribd company logo
1 of 13
Download to read offline
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
UNIT TWO
Cyber Ethics and Online Safety
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
SECTION ONE
Cyber Ethics
1
© Air Force Association
Commonly accepted rules of how to behave online
2
Netiquette
• Do not spam forums, chat rooms, or
social media sites with useless or
repeated information
• Do not pretend to be someone else
• Do not post or distribute illegal
material
• Do not use abusive or threatening
language
• Do not try to obtain personal info
about someone
H00psF@N89: Did you guys see the game last
night?
B@ll3r4Lyfe: I did! Miami did alright on D, but
they have to work on their 3pt game
L3br0nJ@mes: THE CELTICS SUCK! GO
MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
L3br0nJ@mes: THE CELTICS SUCK! GO
MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
L3br0nJ@mes: THE CELTICS SUCK! GO
MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
L3br0nJ@mes: THE CELTICS SUCK! GO
MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
© Air Force Association
• Affects 29.2% of students
every year and the number
is growing
• Forms:
‐ Insulting texts or emails
‐ Rumors sent via email or
social networking sites
‐ Fake profiles
‐ Embarrassing photos or videos
• Why it’s harmful:
‐ Anonymous
‐ Can be done 24/7
3
Cyberbullying
An0nym0us1234: OMG.
Did u see Jane’s skirt
today?? What color was
that??! puke green???
N0n@me1234:
I know!!!!! She’s totally
uggo.
Source: http://www.stopbullying.gov/cyberbullying/
© Air Force Association
• Do not respond to any
messages, posts or emails
• Block offenders
• Document and report the
behavior so it can be
addressed
• Flag the content so other
people aren’t hurt by it
4
Cyberbullying: If it Happens to You
Source: http://www.stopbullying.gov/cyberbullying/
© Air Force Association
• To schools:
• Inform your school of any cyberbullying as you would with
other types of bullying
• Provide screenshots or records of bullying
• To your parents and law enforcement, especially if
it involves any of the following:
• Threats of violence
• Explicit messages or photos
• Taking a photo or video of someone in a place where he or
she would expect privacy
• Stalking and hate crimes
5
Cyberbullying: Report It
© Air Force Association
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization
or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and
respect for your fellow humans.
6
The 10 Commandments of Computer Ethics
Source: The Computer Ethics Institute, http://computerethicsinstitute.org/
AIR FORCE ASSOCIATION’S
NATIONAL YOUTH CYBER EDUCATION PROGRAM
CYBERPATRIOT
www.uscyberpatriot.org
SECTION TWO
Online Safety
7
© Air Force Association
• Chat only with trusted, verified individuals
• Never publically share these things online:
‐ Passwords
‐ Social Security number
‐ Student ID number
‐ Other Personally Identifiable
Information (PII)
• Never share your password
• Always log out when you are done
• Never post anything you do not want public
‐ You might think you’re being safe and limiting
your posts to only friends, but anything you
post can be easily copied and pasted and sent
to someone else
8
Safety Online: The Basics
© Air Force Association
• Online Shopping
• Social Media
• Any other website that
requires Personally Identifiable
Information (PII)
• These sites are enjoyable and
useful. Just make sure you are
being extra careful when
visiting them.
9
Risk Sites
© Air Force Association
https://login.microsoftonline.com/
• Do not use public Wi-Fi to access risk sites
• Check the address for spoofs
• Use a secure website, especially when submitting PII
‐ Look for an "s" after “http” in the web address
‐ Look for a ‘padlock’ in the browser address bar
‐ Look for a green background or green text
10
Safe Browsing
http://bank0famerica.com
© Air Force Association
• Use automatic updates
• Use and regularly update built-in safety features
‐ Pop-up blockers
‐ Anti-spyware
‐ Anti-virus
‐ Anti-phishing
• Do not use “Save Password” or “Remember Me” functions
• Internet Explorer is more frequently targeted and has
more security flaws than any other browser
11
Browser Tools
© Air Force Association
• Be picky
‐ Only accept or follow friends you know if real life
• Do not post your location
• Be careful with apps
‐ Games and geo-tracking apps may give away your
location or other PII
• Assume everything you post online is
permanent
‐ Colleges and employers check social media
accounts
• Don’t over-share
‐ Just because a site asks for information doesn’t
mean it’s required to set up an account
• Customize and update your security settings
‐ Default settings are weak
12
Social Media Tips
?
Source: play.google.com

More Related Content

What's hot

Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Andrew Morris
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer VandalismAditya Singh
 
Combatting cyberterrorism
Combatting cyberterrorismCombatting cyberterrorism
Combatting cyberterrorismkelvingg
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
New internet security
New internet securityNew internet security
New internet security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Internet security
Internet securityInternet security
Internet security
 
internet security
internet securityinternet security
internet security
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Computer Vandalism
Computer VandalismComputer Vandalism
Computer Vandalism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Combatting cyberterrorism
Combatting cyberterrorismCombatting cyberterrorism
Combatting cyberterrorism
 

Similar to Unit+two+ +cyber+ethics+and+online+safety

Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in ComputingAnkit Malviya
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technologylcnemedez
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxjennyJey2
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavierMo Han
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentationlahill16
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Velma
 
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptTechnological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptssuserc4a497
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxCatherineBagaan
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas HabibAnasHabib23
 

Similar to Unit+two+ +cyber+ethics+and+online+safety (20)

Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
the lesson about the information and communication to technology
the lesson about the information and communication to technologythe lesson about the information and communication to technology
the lesson about the information and communication to technology
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
L1-WEEK-1-2-Second.pptx
L1-WEEK-1-2-Second.pptxL1-WEEK-1-2-Second.pptx
L1-WEEK-1-2-Second.pptx
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Your e image presentation
Your e image presentationYour e image presentation
Your e image presentation
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptTechnological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.ppt
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
social networking .pptx
social networking .pptxsocial networking .pptx
social networking .pptx
 
NETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptxNETIQUgggggggggggggggggggggyyyyETTE.pptx
NETIQUgggggggggggggggggggggyyyyETTE.pptx
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Computer Ethics By Anas Habib
Computer Ethics By Anas HabibComputer Ethics By Anas Habib
Computer Ethics By Anas Habib
 

More from Erdo Deshiant Garnaby

More from Erdo Deshiant Garnaby (16)

Hackers Cracker Network Intruder
Hackers Cracker Network IntruderHackers Cracker Network Intruder
Hackers Cracker Network Intruder
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
Org Design
Org DesignOrg Design
Org Design
 
HOS Talent management presentation
HOS Talent management presentationHOS Talent management presentation
HOS Talent management presentation
 
Talent management
Talent managementTalent management
Talent management
 
Unit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resourcesUnit+nine+ +additional+topics+and+resources
Unit+nine+ +additional+topics+and+resources
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+securityUnit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
 
Unit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoringUnit+six+ +windows+file+protections+and+monitoring
Unit+six+ +windows+file+protections+and+monitoring
 
microsoft+windows+security
microsoft+windows+securitymicrosoft+windows+security
microsoft+windows+security
 
Unit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machinesUnit+three+ +computer+basics+and+virtual+machines
Unit+three+ +computer+basics+and+virtual+machines
 
Unit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+securityUnit+eight+ +ubuntu+security
Unit+eight+ +ubuntu+security
 
Unit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntuUnit+seven+ +introduction+to+linux+and+ubuntu
Unit+seven+ +introduction+to+linux+and+ubuntu
 
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurityUnit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurity
 
introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityintroduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 

Recently uploaded

Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 

Recently uploaded (20)

Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 

Unit+two+ +cyber+ethics+and+online+safety

  • 1. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org UNIT TWO Cyber Ethics and Online Safety
  • 2. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org SECTION ONE Cyber Ethics 1
  • 3. © Air Force Association Commonly accepted rules of how to behave online 2 Netiquette • Do not spam forums, chat rooms, or social media sites with useless or repeated information • Do not pretend to be someone else • Do not post or distribute illegal material • Do not use abusive or threatening language • Do not try to obtain personal info about someone H00psF@N89: Did you guys see the game last night? B@ll3r4Lyfe: I did! Miami did alright on D, but they have to work on their 3pt game L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! L3br0nJ@mes: THE CELTICS SUCK! GO MIAMI!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
  • 4. © Air Force Association • Affects 29.2% of students every year and the number is growing • Forms: ‐ Insulting texts or emails ‐ Rumors sent via email or social networking sites ‐ Fake profiles ‐ Embarrassing photos or videos • Why it’s harmful: ‐ Anonymous ‐ Can be done 24/7 3 Cyberbullying An0nym0us1234: OMG. Did u see Jane’s skirt today?? What color was that??! puke green??? N0n@me1234: I know!!!!! She’s totally uggo. Source: http://www.stopbullying.gov/cyberbullying/
  • 5. © Air Force Association • Do not respond to any messages, posts or emails • Block offenders • Document and report the behavior so it can be addressed • Flag the content so other people aren’t hurt by it 4 Cyberbullying: If it Happens to You Source: http://www.stopbullying.gov/cyberbullying/
  • 6. © Air Force Association • To schools: • Inform your school of any cyberbullying as you would with other types of bullying • Provide screenshots or records of bullying • To your parents and law enforcement, especially if it involves any of the following: • Threats of violence • Explicit messages or photos • Taking a photo or video of someone in a place where he or she would expect privacy • Stalking and hate crimes 5 Cyberbullying: Report It
  • 7. © Air Force Association 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. 6 The 10 Commandments of Computer Ethics Source: The Computer Ethics Institute, http://computerethicsinstitute.org/
  • 8. AIR FORCE ASSOCIATION’S NATIONAL YOUTH CYBER EDUCATION PROGRAM CYBERPATRIOT www.uscyberpatriot.org SECTION TWO Online Safety 7
  • 9. © Air Force Association • Chat only with trusted, verified individuals • Never publically share these things online: ‐ Passwords ‐ Social Security number ‐ Student ID number ‐ Other Personally Identifiable Information (PII) • Never share your password • Always log out when you are done • Never post anything you do not want public ‐ You might think you’re being safe and limiting your posts to only friends, but anything you post can be easily copied and pasted and sent to someone else 8 Safety Online: The Basics
  • 10. © Air Force Association • Online Shopping • Social Media • Any other website that requires Personally Identifiable Information (PII) • These sites are enjoyable and useful. Just make sure you are being extra careful when visiting them. 9 Risk Sites
  • 11. © Air Force Association https://login.microsoftonline.com/ • Do not use public Wi-Fi to access risk sites • Check the address for spoofs • Use a secure website, especially when submitting PII ‐ Look for an "s" after “http” in the web address ‐ Look for a ‘padlock’ in the browser address bar ‐ Look for a green background or green text 10 Safe Browsing http://bank0famerica.com
  • 12. © Air Force Association • Use automatic updates • Use and regularly update built-in safety features ‐ Pop-up blockers ‐ Anti-spyware ‐ Anti-virus ‐ Anti-phishing • Do not use “Save Password” or “Remember Me” functions • Internet Explorer is more frequently targeted and has more security flaws than any other browser 11 Browser Tools
  • 13. © Air Force Association • Be picky ‐ Only accept or follow friends you know if real life • Do not post your location • Be careful with apps ‐ Games and geo-tracking apps may give away your location or other PII • Assume everything you post online is permanent ‐ Colleges and employers check social media accounts • Don’t over-share ‐ Just because a site asks for information doesn’t mean it’s required to set up an account • Customize and update your security settings ‐ Default settings are weak 12 Social Media Tips ? Source: play.google.com