Cybersecurity and Economics

Slides:



Advertisements
Similar presentations
Johnson Logistics Solutions Office of Systems and Information Technology.
Advertisements

Using the Moodle site  Go to:  Log in (top right):  User name = your address (all lower.
K-2. Today’s Objective: I will create a strong, private password.
Strong Passwords How to make your passwords work for you…. Linda A. LeBlanc IT Security Support IS&T.
Today’s Objective: I will create a strong, private password.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
STRONG PASSWORDS Common Sense Unit 2-Lesson 1 (Cross-Curricular Categories) Privacy and Security.
LRHSD GOOGLE ACCOUNTS STEP 1 – go to docs.google.com and log in with your school (if you don’t know if you have an account, click on “CANNOT ACCESS.
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
1 Safely Using Shared Computers Amanda Grady December 2013.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Review of Lesson One Material From Start To Finish Review.
Web-based It’s free and easy Gmail – Yahoo – Hotmail By Marta Murvosh.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
How to Register for Apprenticeship Vacancies. 1.Visit 2.Click on ‘Search for vacancies’. 3.Click.
Textual Password How to use the Textual Authentication Model (AC)
By Moani Revoir.  8 or more characters long.  Longer passwords are harder to hack however, if your password is too long, it is easy to miss spell or.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
How to use the Mnemonic Authentication Model (AC).
2 nd Grade.  ______ make passwords eight or more characters long.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
OhioMeansJobs K-12 November OhioMeansJobs.com Getting Started User Registration 1.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
Passwords Keep Your Information Secure. Online Lives need Good Locks “A password is like a toothbrush: Choose a good one and don’t share it.”
Catherine Metcalf | Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals The FSA ID – Resources for Assisting.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
CREATING A STRONG PASSWORD. PASSWORD DON’TS Single dictionary words (skydiving) Less than 8 characters (rj1977) Personal words/dates (samantha, ,
Communicating safely and appropriately online. Why do we need passwords?
Internet Safety.
Communicating safely and appropriately online
How to Do a Book Talk.
Choosing A Username and Password
Dove science academy Cyber Club
Protecting What’s Yours: Your Identity
How to use the internet safely and How to protect my personal data?
Password Protection: How Safe Are Your Passwords?
Creating an Account on Wikieducator
Information Systems Desktop Support
Safe Internet Mechatronika Budapest.
Welcome to Week 3 in the computer lab
Goldilocks and the Three Bears.
Protecting your personal information and privacy
OhioMeansJobs K-12 November 2014.
STOP. THINK. CONNECT. Online Safety Quiz.
DOVE SCIENCE ACADEMY CYBER CLUB
Cybersecurity and Personal Finance
Peer Review through Blog Postings and Exam Reviews
Setting up an online account
Introduction to UltiPro
Cybersecurity and Personal Finance
Safer Internet Day 2017 Be the change: unite for a better internet
Lesson 2: Epic Security Considerations
Imperative Form.
Computer Usage.
Cybersecurity & Economics
Student Experience It’s your education.
Keep It Safe! Secure Your Secrets
start to finish – November 20181
Imperative Form.
Digital Citizen.
Cornell Notes.
Jump Rope For Heart Animation by Tyler Morgan
Company Name | Phone Number | Website | Address
Indeed.com Creating an account.
String Handling.
Keeping your passwords safe
Presentation transcript:

Cybersecurity and Economics Goldi and the Three Passwords Lesson Slides By: Deborah Kozdras, Ph.D.

Goldilocks and the Three Passwords Visual 1: Image of a Lock Goldilocks and the Three Passwords www.EconEdLink.org

Goldilocks and the Three Passwords Visual 2: Email Log In Goldilocks and the Three Passwords www.EconEdLink.org

Handout 1: Password Graphic Organizer What is a too-easy password? What is a just-right password? What is a too-hard password? Goldilocks and the Three Passwords www.EconEdLink.org

Handout 2: Baby Bear’s Suggestions for Just-Right Passwords Password Do’s Password Don’ts At least eight characters Use upper- and lower-case letters Use numbers and symbols (&%$#) Change passwords regularly Should only be shared with a parent or guardian in case you forget it. Don’t use your email address Don’t use private information Should not be the same on all sites Don’t share with friends Goldilocks and the Three Passwords www.EconEdLink.org

Making Stronger Passwords Adding new values can make your password much stronger. See how long the time to guess Goldi’s password can be just by adding more characters, or numbers: Goldi – 26 Seconds GoldiPlays – 300 Years GoldiPlays! – 6,000 years GoldiPlays!Hockey5 – Over a Million Years Goldilocks and the Three Passwords www.EconEdLink.org

Handout 3: Instructions for a Public Service Announcement You are a consulting company providing information to others about the importance of creating good passwords. Who are you? (Use a name that reflects what you are doing) _______________________________________________ We are here to tell you about: _______________________________________________ Why should you create strong passwords? (Discuss: costs, benefits, and risks in your statement) ____________________________________________________________________________________________________________ Here are some tips for creating good passwords: (each student provides one tip) ____________________________________ So remember: (end with a short slogan or saying) _________________________________________________. Goldilocks and the Three Passwords www.EconEdLink.org

Goldilocks and the Three Passwords Visual 3 Mnemonic Passwords A Mnemonic password is created when you create a sentence and use the first letter of every word and include number words as characters. For example: My Friend Jane Eats 2 Apples Every Day To Stay Very Healthy! = MFJE2AEDTSVH! Goldilocks and the Three Passwords www.EconEdLink.org