Why Safe Computing? Doug Walters Coordinator of Transportation Southern York County School District Safe Computing Workshop October.

Slides:



Advertisements
Similar presentations
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Advertisements

Digital Citizenship in the Classroom
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Company LOGO Internet Safety A Community Approach.
1 Ben Woelk RIT Information Security Office Advancing Digital Self Defense Establishing a Culture of Security Awareness at the Rochester Institute of Technology.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Security for Seniors SeniorNet Help Desk
Information Security Technological Security Implementation and Privacy Protection.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Marketing of Information Security Products. The business case for Information Security Management.
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Digital Citizenship. Digital Citizen  A person using IT in order to engage in society, politics, and government expectations.  “Those who use the internet.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Pembroke Pines Charter Middle School Central Campus Proudly Presents Technology Night 2013.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Information Systems Services How to Protect Yourself On-Line (Keeping Safe At Work) Kevin Darley, IT Security Co-ordinator 7 th March 2013.
Why is it important to back up your work/information? If you do not back up your work or information then your data might be lost when your computer clashes.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety & Digital Citizenship Awareness and Education Larry Magid Co-director, ConnectSafely.org Founder, Safekids.com CBS News/CNET Lynette Owens.
Bring Your Own Technology Janet Sanders Harris County High School Media Center.
Internet Dangers Technology Communication Tools E-Literate.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Cybersecurity Test Review Introduction to Digital Technology.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing Practices. What is behind a cyber attack? 1.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
2017 Products with Multi-Device Licensing
Hotspot Shield Protect Your Online Identity
Cabarrus County schools SECURITY, Social Media POLICY AND BYOT
Lecture 5. Security Threats
Digital Citizenship.
McAfee Activate  McAfee offers advanced security solutions to the computer users across the globe.  It offers a wide selection of antivirus and internet.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Mcafee.com/activate - To get more data about download, introduce and actuate the McAfee antivirus programming, visit on utilizing.
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Presentation transcript:

Why Safe Computing? Doug Walters Coordinator of Transportation Southern York County School District Safe Computing Workshop October 21, 2013

Safe Computing Night Why Safe Computing? Technology gives children access to a vast spectrum of knowledge and exposes them to different cultures and ways of life. Just the same, technology can be used in a way that exposes children to various threats. Parenting in this digital age can be very difficult.

Systems & Data Bruce Mickey Coordinator of Technology Southern York County School District Safe Computing Workshop October 21, 2013

Safe Computing Workshop: Safeguarding Your Computer Be aware of the following terms and activities: Malware and virus protection. Automatic updates for your operating system. Secure your wireless network with a complex password. Regularly backup your computer to an external USB drive or an online service.

Protecting Identity Mark Rill Coordinator of Marketing and Public Information Southern York County School District Safe Computing Workshop October 21, 2013

Safe Computing Workshop Identity theft Protection from phishing and other scams Transaction security, certificates, and encryption Geolocation and other location services Be aware of the following terms and activities:

Protecting Reputation Ben Louey Technology Integration Specialist Digital Academy Coordinator Southern York County School District Safe Computing Workshop October 21, 2013

Be aware of the following terms and activities: Digital Citizenship: the norms of appropriate, responsible behavior when communicating and collaborating in an online environment. What is being communicated? What devices can be used to communicate? Responsibilities of children. Responsibilities of parents.

Safe Computing Workshop: Safeguarding Your Computer

District Court Information Hon. Jeff Joy Magisterial District Judge District (717) Southern York County School District Drug Awareness Workshop October 21, 2013

Be aware of the following terms and activities: Always assume that you are on camera Truancy Traffic cases Tobacco on school property Under-age drinking Retail theft Drug or drug paraphernalia possession

Court records search at Clicking on “Court Record Search” will take you to a web portal where you can search through court records