02 Educators Role


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

02 Educators Role

  1. 1. The Educator’s Role inSafe Computing<br />Jana Baxter<br />Ann Noonen<br />
  2. 2. The goal of this session is to give educators an overview of cyber security<br />We will examine 3 areas<br />Cyber Security<br />Cyber Ethics<br />Cyber Safety<br />Safe Computing in Education<br />
  3. 3. Definition<br />Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and on-line information against threats<br />Cyber Security<br />
  4. 4. A global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news and opinions<br />http://www.internet.com<br />What is the Internet<br />
  5. 5. Desktop computers<br />Hand-held computers<br />Cell phones<br />Digital cable<br />Satellite television and radio<br />ATM machines<br />Debit cards<br />Credit cards<br />Global positioning devices<br />GPS <br />Technologies Connect to the Internet<br />
  6. 6. Teacher<br />Authority figure<br />Facilitator<br />Mentor<br />Counselor<br />Protector<br />Educators Play Many Roles<br />
  7. 7. It is now the role of the educator to practice safe computing in their classrooms<br />Understand the nature and cause of cyber threats to protect yourself, your students and your school<br />Learn how to fight cyber threats and teach your students and colleagues about cyber security<br />Whose Job is it?<br />
  8. 8. A code of safe and responsible behavior for the Internet Community<br />Understanding the risks of harmful and illegal behavior online<br />How to protect ourselves and other Internet and other Internet users from such behavior<br />Lower Merion School District<br />Cyber Ethics<br />
  9. 9. Piracy <br />Illegal use of copyrighted material such as plagiarism or illegally downloading of music, movies, text, etc.<br />Intrusion<br />Unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer<br />Identity theft<br />computer intruders intent on stealing your personal information to commit fraud or theft<br />Types of Cyber Threats<br />
  10. 10. Predatory behavior<br />Aperson with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc.<br />Virus<br />a self-replicating program that spreads by inserting copies of itself into other computer code or into documents<br />Spam<br />unwanted messages, often automated, sent to multiple users, mailing lists, or email groups<br />Types of Cyber Threats<br />
  11. 11. Worm<br />a self-replicating, self-spreading malicious computer program<br />Trojan horse<br />a malicious program disguised as or hidden in legitimate software<br />Malware<br />software designed to harm your computer<br />Spyware<br />software that sends information from your computer to a third party without your consent<br />Types of Cyber Threats<br />
  12. 12. Illegal download or redistribution of copyrighted material<br />May result in legal fines, job loss, or court action<br />Intrusion into a school network<br />May result in data alteration, identify theft, or destruction of school materials<br />Effects of Cyber Threats<br />
  13. 13. Clicking on pop-up window<br />May result in spam sent to your e-mail address and others in your address book<br />Virus, Malware or Trojan Horse<br />May result in destruction or your data, computer or your school’s entire network<br />Effects of Cyber Threats<br />
  14. 14. Create a strong password<br />Use letters, numbers and special characters<br />Mathew12!goals<br />Lock your computer when not in use<br />Create a unique user identification<br />Always assume your e-mail, chat sessions and text messages are not private<br />Use caution when opening an unexpected e-mail<br />Protect Against Cyber Threats<br />
  15. 15. Regular back-up of data<br />Be wary of file sharing<br />Including sharing your computer with others<br />Update your anti-virus program, virus definitions and anti-spyware software<br />Use and maintain a firewall<br />Protect Against Cyber Threats<br />
  16. 16. Protect Against Cyber Threats<br />Set your Web browser’s security option to a high level of safety<br />
  17. 17. Enable pop-up blockers<br />When idle, disconnect your computer from the Internet<br />Take care when opening attachments<br />E-mail<br />Chat rooms<br />Text messaging<br />Update your computer for the latest security patches for the software and operating system you use<br />Protect Against Cyber Threats<br />
  18. 18. You can incorporate short lessons and techniques about cyber security as you teach various subjects<br />Teaching Cyber Security<br />
  19. 19. Incorporate short lessons or techniques regarding cyber security throughout the curriculum<br />Other ideas???<br />Teaching Cyber Security<br />
  20. 20. http://www.us-cert.gov<br />http://www.mysecurecyberspace.com<br />http://www.webopedia.com<br />http://www.internet.com<br />http://www.csialliance.org<br />References<br />