02 Educators Role

Preview:

Citation preview

The Educator’s Role in

Safe ComputingJana Baxter

Ann Noonen

The goal of this session is to give educators an overview of cyber security

We will examine 3 areas◦ Cyber Security◦ Cyber Ethics◦ Cyber Safety

Safe Computing in Education

Definition◦ Cyber security is a set of principles and practices

designed to teach you how to safeguard your computing assets and online information against threats

Cyber Security

A global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news and opinions◦ http://www.internet.com

What is the Internet

Desktop computers Handheld computers Cell phones Digital cable Satellite television and radio ATM machines

◦ Debit cards◦ Credit cards

Global positioning devices◦ GPS

Technologies Connect to the Internet

Teacher Authority figure Facilitator Mentor Counselor Protector

Educators Play Many Roles

It is now the role of the educator to practice safe computing in their classrooms

Understand the nature and cause of cyber threats to protect yourself, your students and your school

Learn how to fight cyber threats and teach your students and colleagues about cyber security

Whose Job is it?

A code of safe and responsible behavior for the Internet Community

Understanding the risks of harmful and illegal behavior online

How to protect ourselves and other Internet and other Internet users from such behavior

Lower Merion School District

Cyber Ethics

There is a great need for resources for parents, educators and children for staying safe online

Best Practices◦ Dedicate one class to what is expected when going

online from the school before you even go online◦ Avoid letting students search and wander◦ Look out for students turning off monitors quickly◦ Instead of banning everything that the students

enjoy, investigate ways in which you can use these technologies to enhance the teaching and learning experience

Cyber Safety

Piracy ◦ Illegal use of copyrighted material such as

plagiarism or illegally downloading of music, movies, text, etc.

Intrusion◦ Unauthorized individuals trying to gain access to

computer systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer

Identity theft◦ computer intruders intent on stealing your personal

information to commit fraud or theft

Types of Cyber Threats

Predatory behavior◦ A person with malicious intent who targets your

online information to hurt your reputation, compromise your data, intimidate you, etc.

Virus◦ a self-replicating program that spreads by

inserting copies of itself into other computer code or into documents

Spam◦ unwanted messages, often automated, sent to

multiple users, mailing lists, or email groups

Types of Cyber Threats

Worm◦ a self-replicating, self-spreading malicious

computer program Trojan horse

◦ a malicious program disguised as or hidden in legitimate software

Malware◦ software designed to harm your computer

Spyware◦ software that sends information from your

computer to a third party without your consent

Types of Cyber Threats

Illegal download or redistribution of copyrighted material◦ May result in legal fines, job loss, or court action

Intrusion into a school network◦ May result in data alteration, identify theft, or

destruction of school materials

Effects of Cyber Threats

Clicking on pop-up window◦ May result in spam sent to your e-mail address

and others in your address book Virus, Malware or Trojan Horse

◦ May result in destruction of your data, computer or your school’s entire network

Effects of Cyber Threats

Create a strong password◦ Use letters, numbers and special characters◦ Mathew12!goals

Lock your computer when not in use Create a unique user identification Always assume your e-mail, chat sessions

and text messages are not private Use caution when opening an unexpected e-

mail

Protect Against Cyber Threats

Regular back-up of data Be wary of file sharing

◦ Including sharing your computer with others Update your anti-virus program, virus

definitions and anti-spyware software Use and maintain a firewall

Protect Against Cyber Threats

Protect Against Cyber Threats Set your Web

browser’s security option to a high level of safety

Enable pop-up blockers When idle, disconnect your computer from

the Internet Take care when opening attachments

◦ E-mail◦ Chat rooms◦ Text messaging

Update your computer for the latest security patches for the software and operating system you use

Protect Against Cyber Threats

You can incorporate short lessons and techniques about cyber security as you teach various subjects

Teaching Cyber Security

Incorporate short lessons or techniques regarding cyber security throughout the curriculum

Other ideas???

Teaching Cyber Security

http://www.us-cert.govhttp://www.mysecurecyberspace.comhttp://www.webopedia.comhttp://www.internet.comhttp://www.csialliance.orghttp://www.cyber-safety.com

References

Recommended