cyber_security

18
The Educator’s Role in Safe Computing Jana Baxter Ann Noonen

Upload: jana-baxter

Post on 15-Jan-2015

1.502 views

Category:

Documents


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: cyber_security

The Educator’s Role in

Safe ComputingJana Baxter

Ann Noonen

Page 2: cyber_security

The goal of this session is to give educators an overview of cyber security.We will examine three categories:

◦ Cyber security◦ Cyber ethics◦ Cyber safety

Safe Computing in Education

Page 3: cyber_security

DefinitionCyber security is a set of principles and practices designed to teach you how to safeguard your computing assets and online information against threats.

Cyber Security

Page 4: cyber_security

What is the Internet?The Internet is a global network that connects over one billion people and more than 600 million computers. More than 100 countries are linked into exchanges of data, news, and opinions. [http://www.internet.com]

What kind of technologies are connect to the Internet?

◦ Computers◦ Personal digital assistants (PDAs)◦ Cell phones◦ Digital cable or satellite television and radio◦ ATM machines, credit cards, and debit cards◦ Global positioning system (GPS) devices and software

Technology Connects Schools to the Internet

Page 5: cyber_security

Educators assume many roles in the physical and social environment of their schools. Now they need to play these roles in the realm of cyber security.

◦ Teacher◦ Authority figure◦ Facilitator◦ Mentor◦ Counselor◦ Protector

Educators Play Many Roles

Page 6: cyber_security

It is now!To avoid teaching and practicing safe computing in their classrooms, many educators use the excuse that computer safety is the responsibility of the school’s technology personnel.

We all have to make computing safe. How?Understand the nature and cause of cyber threats to protect yourself, your students, and your school from potential cyber threats.

Learn how to fight cyber threats and teach your students, colleagues, and their families about cyber security.

“Cyber security is not my job!”

Page 7: cyber_security

A code of safe and responsible behavior for the Internet Community

Understanding the risks of harmful and illegal behavior online

How to protect ourselves and other Internet and other Internet users from such behavior

Lower Merion School District

Cyber Ethics

Page 8: cyber_security

There are many types of cyber threats:◦Piracy

illegal use of copyrighted material such as plagiarism or illegal downloading of music, movies, text, or other types of files

◦Intrusion unauthorized individuals trying to gain access to computer

systems in order to steal information, corrupt files, illegitimately view data, or gain control of the computer. (In schools, as in any organization, intruders can be outsiders or insiders.)

◦Identity theft computer intruders intent on stealing your personal

information to commit fraud or theft

Cyber Threats -1

Page 9: cyber_security

◦Predatory behavior a person with malicious intent who targets your

online information to hurt your reputation, compromise your data, intimidate you, etc.

◦Virus a self-replicating program that spreads by

inserting copies of itself into other computer code or into documents

◦Spam unwanted messages, often automated, sent to

multiple users, mailing lists, or email groups

Cyber Threats -2

Page 10: cyber_security

◦Worm a self-replicating, self-spreading malicious

computer program◦Trojan horse

a malicious program disguised as or hidden in legitimate software

◦Malware software designed to harm your computer

◦Spyware software that sends information from your

computer to a third party without your consent

Cyber Threats - 3

Page 11: cyber_security

Illegal download or redistribution of copyrighted material

◦may result in legal fines, job loss, or action against you from law enforcement officers.

Intrusion into a school network, whether it is from an insider or outsider

◦may result in data alteration, identity theft, and theft or destruction of test material.

Effect of Cyber Threats

Page 12: cyber_security

Clicking on an advertisement pop-up window

◦may result in spam sent to your email address and to others in your address book.

A virus, malware, worm, or Trojan horse received accidentally in your email

◦may result in the destruction of your data, computer, or the school’s entire network.

Effect of Cyber Threats - 2

Page 13: cyber_security

Create a “strong” password such as Mathew12!goals.Lock your computer (an unlocked computer is an invitation to intruders).Create unique user IDs for anyone sharing your computer.Always assume your email, chat sessions, and text messages are not private.Use caution when opening an unexpected email.

Protect against cyber threats -1

Page 14: cyber_security

Back up your data regularly. Be wary of file sharing or sharing your computer with others.Update your anti-virus program and virus definitions as well as your anti-spyware software.Use and maintain a firewall.

Protect against cyber threats -2

Page 15: cyber_security

Protect against cyber threats -3

Set your web browser’s security option to a high level of safety.

Page 16: cyber_security

Enable your “pop-up” blocker.Disconnect your computer from the Internet when you are not using it.Take care when opening any attachment you receive through email, chat rooms, or SMS.Update your computer with the latest security patches for the software and operating system you use.

Protect against cyber threats -4

Page 17: cyber_security

You can incorporate short lessons and techniques about cyber security as you teach various subjects.

Teaching Cyber Security

Page 18: cyber_security

http://www.us-cert.govhttp://www.mysecurecyberspace.comhttp://www.webopedia.comhttp://www.internet.comhttp://www.csialliance.org

References