Intro & Ethics Cyber Security.

Slides:



Advertisements
Similar presentations
Are you being a safe and successful digital citizen? E-safety
Advertisements

Bring Your Own Device This is a boring PowerPoint, but an exciting new opportunity!
Welcome to the Island! Student Information.
This week is anti-bullying week.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Are you being a safe and successful digital citizen?
Do you know how to keep yourself safe?
The Ant.com Toolbar: Tube Downloader & VLC Media Player Or So, you want to download a you tube video and convert it into an mp3… A presentation by Brett.
CYBERSAFETY Presentations Keeping Safe on the Internet.
Nick Stoneman Simon Moules.  I was a police officer  I was born on 7 th July 1970  I live at 167 Victoria Road, Rayleigh  I have three pets, a dog,
Social Media Perry seikhon Per 7 March 11,2014. What is social media?  I think social media is talking to others or sharing pictures online, such as.
Unit 1 – Improving Productivity Josh Sherriff Instructions ~ 100 words per box.
Student Information. Q: What is Study Island?? A. An island kids are sent to when they don’t do their homework B. A place where students go when daydreaming.
Sometimes we can tell how people are feeling by looking at them. How are they feeling?
Go to your school’s web locker site school name.schoolweblockers.com) Your user name is the first letter of your first name, the first four.
Common Sense Media Unit 3 – Lesson 1 Category: Privacy & Security.
Portable interactive white board(wireless) by: Andrea Maldonado.
WHY I SHOULD GET AN IPHONE 4S BY: MATTHEW BLOODGOOD.
Setting up and getting going with…. MIT App Inventor.
Cyberbullying 8/14/2013. Learning Target I can learn how to protect myself from cyberbullies. Success Criterion: – I can identify 3 types of cyberbullying.
Talk to your child about what they’re up to online. Be a part of their online life; involve the whole family and show an interest. Find out what sites.
 Someone might say that They are a certain age but people lie.
Website for our class. The information is updated at the end of each.
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
Carlos Andres Palacios THE NEW iPad. What is an iPad? “Is the first table computer from apple” This iPad uses the same Operating System that an iPhone.
FLHS TECHNOLOGY SURVIVAL GUIDE A QUICK GUIDE FOR STUDENTS.
Now that I have established who my target audience are it is useful,as part of my secondary audience to research media habits of teenagers; this helps.
You must study this PowerPoint, play the Rags to Riches game and take and pass the quiz before continuing with class assignments.
By Evan Stevens   I know now that I should never talk to any strangers online and that I should be a good online citizen and to never swear or talk.
Your Planner! Friend or Foe? The 4 Ws and 1 H of Planners Who? What? When? Where? How?
Internet Safety By Blair Number 1 Use a nickname not your real name.
By: Alina. If I’m signing up for a job the people who might hire me have to search on the internet if I’m mature or capable of having a job because if.
Things We Cherish Jaydon Leonardo Alexander Hannan Group 6.
Welcome to Week 2 in the computer lab. Last week you learned step 1 of the morning routine. Today we will learn how to complete the entire routine!
Internet Acceptable Use Policy
How to stay safe using the internet & App’s
CHROMEBOOKs Are not Magic Teachers Are!
Safer Internet Day.
How to stay safe using the internet and app’s?
Chance Chance Community Chest JOB SEEKER Community Chest JOB SEEKER
E-Safety – Staying Safe On-line
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
Question 1 What are students graded based on?
PYLUSD Edweb.
Welcome to Week 3 in the computer lab
Mr. Vela Period 4.
Acceptable Use Policy for Pupils
STOP. THINK. CONNECT. Online Safety Quiz.
Introduction to Computer Basics Part 2
CHROMEBOOKs Are not Magic Teachers Are!
Cyber Security School Challenge
R E A D What is cyber bullying? Hall
Future Developments in ICT
PART 2.
Socials 10 Story Telling.
Digital Literacy and Internet Safety
KEEP SAFE I will NOT give out personal information: Name -- create a screen name Address Phone number Password School address Pictures.
Using your Verizon iPad
Bethesda Cybersecurity Club
Tech Review Questions End of Year Exam 2.
Cyber Security School Challenge
Uppingham Community College
Social Media Dangers.
How To Finish The School Year Strong
Welcome Future Wolfe Warriors!
Uppingham Community College
INTERNET SPEED TEST IRELAND - CHECK BROADBAND SPEEDS.
Students’ Tutorial Ms. Pullen.
Grammar 2/1.
Online Safety Evening 2019.
Presentation transcript:

Intro & Ethics Cyber Security

Scenario 1 A student has a homework assignment that requires research on the internet. Currently, they do not have access to internet at their house. The student’s neighbor does not have a password for their wifi so they use their neighbor’s internet.

Scenario 1 What would you do? Did the people involve act ethically? Who was harmed in this interaction, who is the victim?

Scenario 2 A friend of mine told me about a new musician I might like. I checked to see if their music was available streaming but it was not. I went to a file sharing site and downloaded their most recent album without paying. As it turns out, I really like the artist and have since purchased other albums and attended a concert.

Scenario 2 What would you do? Did the people involve act ethically? Who was harmed in this interaction, who is the victim?

Scenario 3 In my Cyber Security class, we learned about breaking into a MasterLock lock. I wanted to show my friends how easy it was. I opened their locker and showed them all of their stuff I was able to remove without them knowing.

Scenario 3 What would you do? Did the people involve act ethically? Who was harmed in this interaction, who is the victim?

Scenario 4 The school blocks sites like YouTube for students but not for teachers. My teacher knows that I am doing work for class that requires YouTube. If I ask, they always type in their password so I can access the video. Chrome asked if I wanted to “remember password” after they left, so now I can access YouTube without asking.

Scenario 4 What would you do? Did the people involve act ethically? Who was harmed in this interaction, who is the victim?

Scenario 5 I really like Game of Thrones. I don’t want to pay for HBO. I use a password from a friend to access their subscription to HBO. In turn, I give my friend my password for HULU. Dragons are awesome!

Scenario 5 What would you do? Did the people involve act ethically? Who was harmed in this interaction, who is the victim?