This document discusses the educator's role in promoting safe computing. It examines cyber security, cyber ethics, and cyber safety. The document defines cyber security and lists technologies that connect to the internet. It describes educators' roles and whose responsibility it is to teach cyber security. It outlines types of cyber threats like viruses, spam, and malware. The document recommends best practices for educators to protect against cyber threats and teaches cyber security across different subjects.
E-Mail Electronic mail
A method of exchanging messages in digital form.
E-mail systems are based on a store-and-forward method in which e-mail server accept, forwards, delivers and stores messages on behalf of users.
Users only need to connect to the internet through a computer for the duration of message submission or retrieval
http://phpexecutor.com
E-Mail Electronic mail
A method of exchanging messages in digital form.
E-mail systems are based on a store-and-forward method in which e-mail server accept, forwards, delivers and stores messages on behalf of users.
Users only need to connect to the internet through a computer for the duration of message submission or retrieval
http://phpexecutor.com
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Vulnerabilities
The larger and more complex information systems are, the greater the possibility of error in logic and loopholes in algorithm.
These are weak points that could enable hackers to breach a system and compromise the integrity of information stored. Programmers themselves who are not yet adept in writing software code can unknowingly misuse the code and lead to a vulnerability.
A classic example of vulnerabilities that can be exploited is a weak password or its repeated use on various services or software. There are also websites containing malware that installs automatically once visited. Even legitimate software could be a venue for an exploit due to unknown errors (bugs) generated by the program. The end-user or the human element in information systems is arguably the weakest point that hackers easily utilize.
0-day exploits
0-hour or 0-day attack is the exploitation by outside parties of a security hole in a computer program which is unknown from its developers. The term comes from the premise that the attack unfolds on the “day 0, meaning no awareness as of yet from the developers so there is no opportunity and time to issue a fix for the threat. Zero-day exploits are usually shared among hackers even before the developer knew.
Programmers could use the vulnerabilities via several avenues: on web browsers and email. Web browsers allow for a wider target. Meanwhile, using email, hackers can send a message that includes an executable file on the attachments, set to run once downloaded.
Such 0-day threats are in the time frame where a security hole is exploited up to the time that the program developers issued a patch for it.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Vulnerabilities
The larger and more complex information systems are, the greater the possibility of error in logic and loopholes in algorithm.
These are weak points that could enable hackers to breach a system and compromise the integrity of information stored. Programmers themselves who are not yet adept in writing software code can unknowingly misuse the code and lead to a vulnerability.
A classic example of vulnerabilities that can be exploited is a weak password or its repeated use on various services or software. There are also websites containing malware that installs automatically once visited. Even legitimate software could be a venue for an exploit due to unknown errors (bugs) generated by the program. The end-user or the human element in information systems is arguably the weakest point that hackers easily utilize.
0-day exploits
0-hour or 0-day attack is the exploitation by outside parties of a security hole in a computer program which is unknown from its developers. The term comes from the premise that the attack unfolds on the “day 0, meaning no awareness as of yet from the developers so there is no opportunity and time to issue a fix for the threat. Zero-day exploits are usually shared among hackers even before the developer knew.
Programmers could use the vulnerabilities via several avenues: on web browsers and email. Web browsers allow for a wider target. Meanwhile, using email, hackers can send a message that includes an executable file on the attachments, set to run once downloaded.
Such 0-day threats are in the time frame where a security hole is exploited up to the time that the program developers issued a patch for it.
Overview of hacking techniques used to attack modern web applications focused on application layer. Cross Site Scripting, SQL Injection, Buffer Overflow, Phishing attacks presented.
Today, government organizations, military, finance sector, hospitals etc., deals with lots of confidential data on computers and they use to pass these information to many other networks around the globe. Therefore, these confidential information need to be protected from cyber attacks and cyber security helps keep them out of hackers reach. The main advantages of cyber security are:
This presentation is intended to increase awareness of Extension Agents to the threats of scams and malware on the Internet. In addition it covers some ways to stay protected from such threats.
2. The goal of this session is to give educators an overview of cyber security We will examine 3 areas Cyber Security Cyber Ethics Cyber Safety Safe Computing in Education
3. Definition Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and online information against threats Cyber Security
4. A global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news and opinions http://www.internet.com What is the Internet
5. Desktop computers Handheld computers Cell phones Digital cable Satellite television and radio ATM machines Debit cards Credit cards Global positioning devices GPS Technologies Connect to the Internet
7. It is now the role of the educator to practice safe computing in their classrooms Understand the nature and cause of cyber threats to protect yourself, your students and your school Learn how to fight cyber threats and teach your students and colleagues about cyber security Whose Job is it?
8. A code of safe and responsible behavior for the Internet Community Understanding the risks of harmful and illegal behavior online How to protect ourselves and other Internet and other Internet users from such behavior Lower Merion School District Cyber Ethics
9. There is a great need for resources for parents, educators and children for staying safe online Best Practices Dedicate one class to what is expected when going online from the school before you even go online Avoid letting students search and wander Look out for students turning off monitors quickly Instead of banning everything that the students enjoy, investigate ways in which you can use these technologies to enhance the teaching and learning experience Cyber Safety
10. Piracy Illegal use of copyrighted material such as plagiarism or illegally downloading of music, movies, text, etc. Intrusion Unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer Identity theft computer intruders intent on stealing your personal information to commit fraud or theft Types of Cyber Threats
11. Predatory behavior A person with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc. Virus a self-replicating program that spreads by inserting copies of itself into other computer code or into documents Spam unwanted messages, often automated, sent to multiple users, mailing lists, or email groups Types of Cyber Threats
12. Worm a self-replicating, self-spreading malicious computer program Trojan horse a malicious program disguised as or hidden in legitimate software Malware software designed to harm your computer Spyware software that sends information from your computer to a third party without your consent Types of Cyber Threats
13. Illegal download or redistribution of copyrighted material May result in legal fines, job loss, or court action Intrusion into a school network May result in data alteration, identify theft, or destruction of school materials Effects of Cyber Threats
14. Clicking on pop-up window May result in spam sent to your e-mail address and others in your address book Virus, Malware or Trojan Horse May result in destruction of your data, computer or your school’s entire network Effects of Cyber Threats
15. Create a strong password Use letters, numbers and special characters Mathew12!goals Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions and text messages are not private Use caution when opening an unexpected e-mail Protect Against Cyber Threats
16. Regular back-up of data Be wary of file sharing Including sharing your computer with others Update your anti-virus program, virus definitions and anti-spyware software Use and maintain a firewall Protect Against Cyber Threats
17. Protect Against Cyber Threats Set your Web browser’s security option to a high level of safety
18. Enable pop-up blockers When idle, disconnect your computer from the Internet Take care when opening attachments E-mail Chat rooms Text messaging Update your computer for the latest security patches for the software and operating system you use Protect Against Cyber Threats
19. You can incorporate short lessons and techniques about cyber security as you teach various subjects Teaching Cyber Security
20. Incorporate short lessons or techniques regarding cyber security throughout the curriculum Other ideas??? Teaching Cyber Security