SlideShare a Scribd company logo
The Educator’s Role inSafe Computing Jana Baxter Ann Noonen
The goal of this session is to give educators an overview of cyber security. We will examine three categories: Cyber security Cyber ethics Cyber safety Safe Computing in Education
Definition Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and online information against threats.  Cyber Security
What is the Internet? 	The Internet is a global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news, and opinions. [http://www.internet.com] What kind of technologies are connect to the Internet? Computers Personal digital assistants (PDAs) Cell phones Digital cable or satellite television and radio ATM machines, credit cards, and debit cards Global positioning system (GPS) devices and software Technology Connects Schools to the Internet
Educators assume many roles in the physical and social environment of their schools. Now they need to play these roles in the realm of cyber security. Teacher Authority figure Facilitator Mentor Counselor Protector Educators Play Many Roles
It is now! To avoid teaching and practicing safe computing in their classrooms, many educators use the excuse that computer safety is the responsibility of the school’s technology personnel. We all have to make computing safe. How? Understand the nature and cause of cyber threats to protect yourself, your students, and your school from potential cyber threats. Learn how to fight cyber threats and teach your students, colleagues, and their families about cyber security. “Cyber security is not my job!”
 A code of safe and responsible behavior for the Internet Community Understanding the risks of harmful and illegal behavior online How to protect ourselves and other Internet and other Internet users from such behavior Lower Merion School District Cyber Ethics
There are many types of cyber threats: Piracy  illegal use of copyrighted material such as plagiarism or illegal downloading of music, movies, text, or other types of files Intrusion unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer. (In schools, as in any organization, intruders can be outsiders or insiders.) Identity theft computer intruders intent on stealing your personal information to commit fraud or theft Cyber Threats -1
Predatory behavior a person with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc. Virus a self-replicating program that spreads by inserting copies of itself into other computer code or into documents Spam unwanted messages, often automated, sent to multiple users, mailing lists, or email groups Cyber Threats -2
Worm a self-replicating, self-spreading malicious computer program Trojan horse a malicious program disguised as or hidden in legitimate software Malware software designed to harm your computer Spyware software that sends information from your computer to a third party without your consent Cyber Threats - 3
Illegal download or redistribution of copyrighted material may result in legal fines, job loss, or action against you from law enforcement officers. Intrusion into a school network, whether it is from an insider or outsider may result in data alteration, identity theft, and theft or destruction of test material. Effect of Cyber Threats
Clicking on an advertisement pop-up window may result in spam sent to your email address and to others in your address book. A virus, malware, worm, or Trojan horse received accidentally in your email may result in the destruction of your data, computer, or the school’s entire network. Effect of Cyber Threats - 2
Create a “strong” password such as Mathew12!goals. Lock your computer (an unlocked computer is an invitation to intruders). Create unique user IDs for anyone sharing your computer. Always assume your email, chat sessions, and text messages are not  private. Use caution when opening an unexpected email. Protect against cyber threats -1
Back up your data regularly.  Be wary of file sharing or sharing your computer with others. Update your anti-virus program and virus definitions as well as your anti-spyware software. Use and maintain a firewall. Protect against cyber threats -2
Protect against cyber threats -3 Set your web browser’s security option to a high level of safety.
Enable your “pop-up” blocker. Disconnect your computer from the Internet when you are not using it. Take care when opening any attachment you receive through email, chat rooms, or SMS. Update your computer with the latest security patches for the software and operating system you use. Protect against cyber threats -4
You can incorporate short lessons and techniques about cyber security as you teach various subjects.  Teaching Cyber Security
http://www.us-cert.gov http://www.mysecurecyberspace.com http://www.webopedia.com http://www.internet.com http://www.csialliance.org References

More Related Content

What's hot

Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
Lokesh Bysani
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
JamRivera1
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Ransomware
RansomwareRansomware
Ransomware
Chaitali Sharma
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Ppt
PptPpt
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 

What's hot (20)

Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber security
Cyber securityCyber security
Cyber security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Ransomware
RansomwareRansomware
Ransomware
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Ppt
PptPpt
Ppt
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 

Similar to cyber_security

02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators RoleJana Baxter
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
Smt. Indira Gandhi College of Engineering, Navi Mumbai, Mumbai
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
Theresa Ann Rollins-Fanning
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
ReinIgnacioUrolaza
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
ssusera0b94b
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
Drishti Bhalla
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
tapan_sengupta
 

Similar to cyber_security (20)

02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKINDTHE IMPORTANCE OF CYBERSECURITY TO MANKIND
THE IMPORTANCE OF CYBERSECURITY TO MANKIND
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
cybersecurity-101_4
cybersecurity-101_4cybersecurity-101_4
cybersecurity-101_4
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 

cyber_security

  • 1. The Educator’s Role inSafe Computing Jana Baxter Ann Noonen
  • 2. The goal of this session is to give educators an overview of cyber security. We will examine three categories: Cyber security Cyber ethics Cyber safety Safe Computing in Education
  • 3. Definition Cyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and online information against threats. Cyber Security
  • 4. What is the Internet? The Internet is a global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news, and opinions. [http://www.internet.com] What kind of technologies are connect to the Internet? Computers Personal digital assistants (PDAs) Cell phones Digital cable or satellite television and radio ATM machines, credit cards, and debit cards Global positioning system (GPS) devices and software Technology Connects Schools to the Internet
  • 5. Educators assume many roles in the physical and social environment of their schools. Now they need to play these roles in the realm of cyber security. Teacher Authority figure Facilitator Mentor Counselor Protector Educators Play Many Roles
  • 6. It is now! To avoid teaching and practicing safe computing in their classrooms, many educators use the excuse that computer safety is the responsibility of the school’s technology personnel. We all have to make computing safe. How? Understand the nature and cause of cyber threats to protect yourself, your students, and your school from potential cyber threats. Learn how to fight cyber threats and teach your students, colleagues, and their families about cyber security. “Cyber security is not my job!”
  • 7. A code of safe and responsible behavior for the Internet Community Understanding the risks of harmful and illegal behavior online How to protect ourselves and other Internet and other Internet users from such behavior Lower Merion School District Cyber Ethics
  • 8. There are many types of cyber threats: Piracy illegal use of copyrighted material such as plagiarism or illegal downloading of music, movies, text, or other types of files Intrusion unauthorized individuals trying to gain access to computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer. (In schools, as in any organization, intruders can be outsiders or insiders.) Identity theft computer intruders intent on stealing your personal information to commit fraud or theft Cyber Threats -1
  • 9. Predatory behavior a person with malicious intent who targets your online information to hurt your reputation, compromise your data, intimidate you, etc. Virus a self-replicating program that spreads by inserting copies of itself into other computer code or into documents Spam unwanted messages, often automated, sent to multiple users, mailing lists, or email groups Cyber Threats -2
  • 10. Worm a self-replicating, self-spreading malicious computer program Trojan horse a malicious program disguised as or hidden in legitimate software Malware software designed to harm your computer Spyware software that sends information from your computer to a third party without your consent Cyber Threats - 3
  • 11. Illegal download or redistribution of copyrighted material may result in legal fines, job loss, or action against you from law enforcement officers. Intrusion into a school network, whether it is from an insider or outsider may result in data alteration, identity theft, and theft or destruction of test material. Effect of Cyber Threats
  • 12. Clicking on an advertisement pop-up window may result in spam sent to your email address and to others in your address book. A virus, malware, worm, or Trojan horse received accidentally in your email may result in the destruction of your data, computer, or the school’s entire network. Effect of Cyber Threats - 2
  • 13. Create a “strong” password such as Mathew12!goals. Lock your computer (an unlocked computer is an invitation to intruders). Create unique user IDs for anyone sharing your computer. Always assume your email, chat sessions, and text messages are not private. Use caution when opening an unexpected email. Protect against cyber threats -1
  • 14. Back up your data regularly. Be wary of file sharing or sharing your computer with others. Update your anti-virus program and virus definitions as well as your anti-spyware software. Use and maintain a firewall. Protect against cyber threats -2
  • 15. Protect against cyber threats -3 Set your web browser’s security option to a high level of safety.
  • 16. Enable your “pop-up” blocker. Disconnect your computer from the Internet when you are not using it. Take care when opening any attachment you receive through email, chat rooms, or SMS. Update your computer with the latest security patches for the software and operating system you use. Protect against cyber threats -4
  • 17. You can incorporate short lessons and techniques about cyber security as you teach various subjects. Teaching Cyber Security
  • 18. http://www.us-cert.gov http://www.mysecurecyberspace.com http://www.webopedia.com http://www.internet.com http://www.csialliance.org References