internet security & safety. overview what is information security? what is information safety?...
Post on 22-Dec-2015
214 Views
Preview:
TRANSCRIPT
Internet Security & Safety
Overview
• What is information security?
• What is information safety?
• Things to remember…
• Scytale Activity
Guess That Celebrity’s Name
Sources: madamenoire.com , People.com , omg.yahoo.com, biography.com, acesshowbiz.com, fanpop.com
Internet Security
What Is Internet Security?
• Internet security is all of the things you should do to protect yourself against internet-based attacks
• Attacks can come from bad guys using technology as well as social encounters with people over the internet
Faux Paw’s Adventure on the Internet
• http://www.ikeepsafe.org/videos/?vid=fauxpaw_video
The Internet, Why Do We Use It?
• The internet offers an endless amount of things to see• Some online activities most people enjoy:
– Check email– Skype– Play games– Chat– Watch YouTube videos– Research – Read the news– Facebook– Twitter– Watch TV shows
• What activities do you enjoy?
Internet Pros
• Changed the way we live our personal lives• Changed the way business’s operate• Provides a wealth of information on an uncountable
number of topics. • It allows us to play games • Allows us to connect with family• Allows us to share our experiences, thoughts, and ideas
Internet Cons
• Changed the way crimes occur • Provides a gateway for illegal and unethical activity• Can be a counterproductive tool
Guess That Celebrity’s Name
Sources: zimbio.com, theaberration.com, justjared.com, metrolyrics.com, salon.com , projects.washingtonpost.com
Criminals, What Do They Want?
• Criminals want the information that you have in your mind and on your computer
• They can use your parents and your information to make money
• It is estimated that internet crimes generated $54 Billion dollar in profits in 2008 (Schwartz, 2013)
• Some criminals use the internet to gain access to you
Bottom Line: They want your information!
Can you think of any ways bad guys can steal your information online?
Sources: ("Money as motivator," 2012)
Use of Technology to Steal Your Information
• Criminals want to get viruses, worms, and malicious software on your computer.
• They want you to enter your information into fake websites.
• They want you to open emails from familiar and unfamiliar people, and then click on the hyperlinks provided.
Sources: (Waterson , 2012)
Using Social Encounters
• People might try and get you to give out User Ids and Passwords
• Tell them where you live and personal details about your life
• Visit websites or click on links• Get you to buy things using your parent’s credit
card– Deals that are too good to be true
• Try and set up meetings with you
Sources: ("Kids rules for," ), (Hayes, 2006)
Internet Safety
What is Internet Safety?• Internet safety means protecting yourself and your
personal information while your on-line. • On-line criminals can use details such as your
Sources: (“Definition," 2013)
• Full Name• Address• Telephone Number• Birth Date and/or Social Security
• Bullying that takes place using electronic technology • Some things that are considered Cyberbullying
– Pretending to be someone else– Spreading lies and rumors– Tricking people to reveal personal information– Sending or forwarding mean messages– Posting pictures of victims without their consent
What is Cyberbullying?
Sources: ("Cyberbullying," 2013)
Remember that are consequences for cyberbullying
Did you know…
• http://www.aps.edu/about-us/policies-and-procedural-directives/procedural-directives/j.-students/bullying-prevention
APS has rules against cyberbullying
Cyberbulliyng - Ways to Protect Yourself
– Walk away from the computer or phone and get a parent
– Don’t respond to the threats
– Avoid sites or places that bullies hang out
– Never give out personal information
– Always tell your parent if you feel uncomfortable or threatened in any way
Sources: ("Bullies: Online bullying," 2005)
What do these Celebrities have in Common?
Celebrity Hacking
• All of these celebrities have been hacked and have been victims of cyberbullying
• Hackers took:– Financial information– Credit score information– Personal pictures– Addresses– Family information– Cell phone numbers
• Usually this information is posted to a website to cause embarrassment
• If Michelle Obama’s information was not safe, then how can we protect ourselves
Sources: (abc.com)
Things to Remember…
How to Protect your Computer
• Do not open files/links that are in email messages or instant messages.
• Create and use strong passwords.– Do not tell your friends what your password is.
• Use strong secret questions.– Make sure they are not easy for people that know you to guess
• Use Anti-Virus Software– Talk to your parents and see if they have anti-virus software on
your computers at home
Sources: (Larson)
How to Protect Yourself
• Do not tell online friends anything personal about you or your family
• Never agree to meet an online friend in person
• Tell an adult if someone is being mean to you or is asking personal questions
Tip: Before posting ask yourself, “Am I ok with my mom finding out?”
Sources: ("Kids rules for," )
Scytale Activity
Encryption and Scytale
• The Scytale is one of the first encryption devices ever created
• Scytale means “baton” in Greek• This technology was first used in Ancient Greece by the
military about 9,000 years ago• The military would use the device to create secret messages • The secret messages were important in military strategy• This technology encrypts messages through the use of
Transposition Ciphering, which means rearranging your message
Sources: ("Scytale," 2013)
How The Scytale Works• Some take a long stick that is the same thickness and cut it into two
pieces• The sticks are given out to the people that want to communicate• One person will take a thin strip of paper and wrap it around the stick• The person will then write there message across the paper• Each section of the paper should only have one letter of the
message on it• The message is then sent to the other person with the matching stick• The receiver will wrap the thin strip around the their stick and read
the message• Only someone with a stick of the same thickness could decrypt the
messageSources: ("Scytale," 2013)
Create Your Own Secret Message
You should have your own Scytale on your desk. Please use these steps to create your own secret message.
1. Write a simple message across the stick without adding spaces. Be sure to only place one letter on each section of paper. If get to the end of the stick, rotatae it and continue writing.
2. When Finished, remove the tape from end of you stick and unravel
3. Remove the next piece of tape you find and pass your message to a friend
Decrypting Your Friend’s Message
All students should have strip of paper with letter on it. This is a secret message that you must decrypt. Please use these steps to decrypt your friend’s secret message.
1. Connect the strip of paper to your stick using tape. The paper should have the letter facing towards you
2. Wrap the paper tightly around the stick until you reach the end.
3. Tape the end of the paper to the stick
4. Read the secret message
Questions
Sources Cited
Bullies: Online bullying. (2005). Retrieved from http://pbskids.org/itsmylife/friends/bullies/article8.html
Cyberbullying. (2013, April 03). Retrieved from http://en.wikipedia.org/wiki/Cyberbullying
Schwartz, M. (2011, October 24). Does cyber crime pay?. Retrieved from http://www.informationweek.com/security/vulnerabilities/does-cybercrime-pay/231901431
Larson , T. (n.d.). Internet security tips: Tech tips. Retrieved from http://techtips.salon.com/internet-security-tips-13400.html
Scytale. (2013, February 23). Retrieved from http://en.wikipedia.org/wiki/Scytale
[Web log message]. (2012, December 07). Retrieved from http://blog.kaspersky.com/what-motivates-cybercriminals-money-of-course/
Waterson , D. (2012, December 07). [Web log message]. Retrieved from http://dwaterson.com/2012/12/07/hello-world/
Sources Cited Cont..
Hayes, E. US-Cert, (2006). Playing it safe: Avoiding online gaming risks. Retrieved from US-Cert website: http://www.us-
Definition of Internet Safety, (2012 ), retrieved from http://www.ehow.com/about_6577504_definition-internet-safety.html
Resources
• NetSmartzWorkshop
• Stay Safe Online
• Cyber Safety Tips for Parents
• bytecrime.org
• NetFamilyNews.org
top related