National Cybersecurity Awareness Campaign CyberWatch C3 Conference October 7, 2011 1.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Cyber Safety Assessment Review
The Internet.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
What you don’t know CAN hurt you!
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN FAMILIES PRESENTATION.
How to keep your kids safe online
Important Facts you should know about the Net
What do I need to know?.   Instant Messages  Social Networking.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Internet Safety for You and Your Students A presentation for the North Woods Partnership By Edie Miles February 7, 2007 The quote below is adapted from.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Information for Students and Families
Youth and the Internet Info for Parents. Internet: Strengths and Weaknesses Internet is the free exchange of ideas Little to no regulation on information.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Company LOGO Internet Safety A Community Approach.
Internet Safety Awareness
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
National Cybersecurity Awareness Campaign: Chatting with Kids About Being Online.
Internet Safety Christopher M. Sattele PLS: SP10 ENGOL P. Hutton.
GUIDANCE LESSON INTERNET SAFETY/NETIQUETTE IF YOU DO NOT WANT IT TO BE TOMORROW’S FRONT PAGE NEWS, DO NOT SEND IT THROUGH TECHNOLOGY!!!
Net Cetera Chatting with Kids About Being Online.
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Internet Safety Guide for Teens Don’t give out personal information about yourself, your family situation, your school, your telephone number, or your.
By: Brandee Burke.  This is an interactive slideshow that is going to teach you all about how to be safe while using the internet and also other kinds.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Online Safety Parent Workshop Helping to keep your children safe online.
Internet Information for Parents. Objectives The Realities Benefits Learn the language Identify concerns and risks Learn strategies to increase safety.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet Safety Safely Navigating Uncharted Waters.
T HINK ! Before You Post A lesson on Internet Safety Source:
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
A Parent’s Guide to Child Safety on the Internet.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN
Creating your online identity
Keeping Children Safe Online
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN
Appropriate Use of Technology
Aim The aims of today's session is to think about what bullying is and how to help yourself or others who are being bullied. To understand what Anti-Bullying.
Follow safety rules so that YOU: Avoid getting HURT.
Personal Safety Online
Internet Safety – Social Media
Presentation transcript:

National Cybersecurity Awareness Campaign CyberWatch C3 Conference October 7,

October is National Cybersecurity Awareness Month This year a different critical cybersecurity issue will be featured each week in October:  Week One emphasizes general cybersecurity awareness with events highlighting the Stop.Think.Connect. Campaign.  Week Two showcases the urgent need to develop cyber education programs to train the next-generation cyber workforce.  Week Three focuses on national and local efforts to prevent identity theft and other cyber crimes.  Week Four highlights strategies small- and medium-sized business owners can use to bolster their own cybersecurity defenses. 2

Stop.Think.Connect. Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the Federal government “initiate a national public awareness and education campaign informed by previous successful campaigns.”  The Stop.Think.Connect. Campaign’s overarching goal is to help Americans understand not only the risks that come with using the Internet, but also the importance of practicing safe online behavior 3

Stop.Think.Connect. Partners 4

Stop.Think.Connect. Public Service Announcement 5

Issues Affecting You 6 Identity Theft Fraud & Phishing CyberbullyingCyber Predators

Cyberbullying 7

Stop.Think.Connect. Public Service Announcement 8

Cyberbullying Cyberbullying is bullying that happens online. It can happen in an , a text message, an online game, or on a social networking site. It might involve rumors or images posted on someone’s profile or passed around for other people to see.  Don’t stand for bullying—online or off. Treat others the way you want to be treated—whether you’re interacting with them online, on your phone or in person.  Speak up. If you see something inappropriate on a social networking site or in a game or chat room, let the website know and tell an adult you trust. Using “Report Abuse” links can help keep sites fun for everyone.  Tell the bully to stop. Most kids don’t bully, and there’s no reason for anyone to put up with it. This mean behavior usually stops pretty quickly when somebody stands up for the person being bullied. 9

Cyber Predators 10

Cyber Predators Cyber predators are people who search online for other people in order to use, control, or harm them in some way.  Cyber predators target teens and young adults – both male and female – on a regular basis, regardless of whether or not the victims are 18 or above.  Social networking sites enhance a predator’s ability to target young Americans, especially if they share personal information in their profile.  91% of young adults say they are social networking “friends” with people they don’t know well*  Protect yourself and your personal information, you never know who is behind the screen  Notify your family and the proper authorities immediately if you are being targeted or harassed online 11 * Source:

Social Media Tips US-CERT* suggests ten steps that you can take to protect yourself on social networks:  Limit the amount of personal information you post  Remember that the internet is a public resource  Be wary of strangers  Be skeptical – Don’t believe everything you read online.  Evaluate your settings – don’t stick with the defaults!  Be wary of third-party applications  Use strong passwords  Check privacy policies  Keep software, particularly your web browser, up to date  Use and maintain anti-virus software 12 * Source: The United States Computer Emergency Readiness Team (US-CERT)

Identity Theft 13

Identity Theft Identity theft is the illegal use of someone else's personal information in order to obtain money or credit.  Every 3 seconds an identity is stolen- so for the length of this training session over 2,400 identities may have been stolen.  Every year, 500,000 kids have their identity stolen.  Here are some simple tips to prevent identity theft: – Don’t use the same password twice. – Choose a password that means someone to you and you only. – If you have been compromised, report it to the Federal Trade Commission. – Lock your computer and cell phone. – Don’t share personal information without knowing exactly who is on the receiving end. 14

Stop.Think.Connect. Public Service Announcement 15

Fraud & Phishing 16

Fraud & Phishing Tips Fraud is the intentional perversion of truth in order to induce another to part with something of value or to surrender a legal right. Phishing is a scam by which an user is duped into revealing personal or confidential information that the scammer can use illicitly or fraudulently.  Most organizations – banks, universities, companies, etc. - don’t ask for your personal information over . Beware of requests to update or confirm your personal information.  Don’t open s from strangers and don’t click on unfamiliar sites; if you think an offer is too good to be true, then it probably is.  Make sure you change your passwords often and avoid using the same password on multiple sites.  Always enter a URL by hand instead of following links.  Reporting of suspicious or unsolicited s from unknown sources is key to preventing and mitigating the impacts of these attacks. Report any suspicious s or links to US- CERT, Internet Crime Complaint Center, and the Federal Trade Commission. 17

Stop.Think.Connect. Website stopthinkconnect 18

Toolkit  Chatting with Kids  Heads Up  Spread the Word  Brochure  Bookmark  Poster  PowerPoint 19

Chatting with Kids About Being Online  Chatting with Kids is a guide that instructs you how to talk to kids about online safety  The guide also covers hot button issues, such as sexting and cyberbullying  Use the guide to talk to kids directly or when you train parents how to talk to their kids. 20

Chatting with Kids About Being Online Tips  Have regular conversations about using the Internet.  Talk to kids about online manners.  Ask kids who they are in touch with online and what sites they visit.  Use parental control options that allow you to block and filter content, filter outgoing content and limit kid’s time online.  Develop computer and cell phone rules, such as no cell phone use at the dinner table, during homework or sleeping hours. 21

Heads Up: Stop.Think.Connect.  Heads Up is an online safety guide you can hand out to kids during cyber safety presentations or within the community – at schools, recreation centers, libraries and other community centers.  Heads Up is designed specifically for kids on how and why to stay safe online, including a word search activity.  The guide provides Do’s and Don’ts of online behavior. 22

Heads Up Tips DO  Stop before you post something and think about how you will feel if your family, teachers, neighbors or coaches see it.  Limit your online friends to people you actually know.  Speak up if you feel uncomfortable or threated by something you see online. DON’T  Reply to text, or pop up messages that ask you for personal information.  Open attachments or click on links that are suspicious or come from strangers.  Stand for bullying – online or off.  Post videos or photos of someone without their approval. 23

Spread the Word: Community Outreach Guide  This guide shows you how to use all of the materials in the Toolkit to give effective presentations on cyber safety.  It also provides tips on how to get the word out about Internet safety – online and offline.  Spread the word to your family, colleagues, and communities. 24

Ice-Breaker Questions For Kids:  Do you sleep with your cell phone in reach?  Raise your hand if you post pictures online. Have you ever posted anything you’ve regretted?  Raise your hand if you or one of your friends have ever received a mean text message.  Have you ever talked to your parents about something that bothered you online? For Parents:  Raise your hand if you think your child knows more about the Internet and technology than you do.  Do your kids have their own computers? Do they have their own cell phones?  Do you set rules for Internet use? If so, what are they?  What are your main concerns about your children using the Internet? 25

Supporting Documents  Stop.Think.Connect. brochure, bookmark and poster included  CD including Chatting with Kids, Spread the Word and Heads Up Guides and PowerPoint presentation  The PowerPoint presentation may be customized to suit your needs  Toolkit materials may also be found on the Stop.Think.Connect. website 26

If you have been exposed to a cyber threat: You can report Internet -related frauds, scams and suspicious activity with the following organizations  National Center for Missing & Exploited Children – This nonprofit organization has a Congressionally-mandated Cyber Tipline as a means for reporting crimes against children. Reports may be made 24-hours a day, 7 days a week online at or by calling www.cybertipline.com  Department of Justice (DOJ) – The DOJ’s Computer Crime & Intellectual Property Section (CCIPS) tells you where to go to report hacking, password trafficking, SPAM, child exploitation and other Internet harassment. For more information visit  The Internet Crime Complaint Center (IC3) – The IC3 ( is a partnership between the FBI, the National White Collar Crime Center, and the Bureau of Justice Assistance, whose mission is to serve as a vehicle to receive, develop, and refer criminal complaints related to cyber crimehttp:// 27

Call to Action  Cybersecurity is a shared responsibility  Visit our website and become a Friend of the Campaign  Use our Toolkit materials at your own cyber safety presentations  Spread the word about Stop.Think.Connect. to your peers 28

Remember to Stop.Think.Connect. Stop Stop hackers from accessing your accounts- set secure passwords Stop sharing too much information- keep your personal information personal Stop- trust your gut, if something doesn’t feel right, stop what you are doing Think Think about the information you want to share before you share it Think how your online actions can affect your offline life Think before you act- don’t automatically click on links Connect Connect over secure networks Connect with people you know Connect with care and be on the lookout for potential threats 29

Securing cyberspace starts with YOU 30