Davina Pruitt-Mentle Educational Technology Policy, Research and Outreach College of Education University of Maryland Cyberethics, Cybersafety, and Cybersecurity.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
The Internet.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Breaking Trust On The Internet
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Computer Viruses.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
COE Faculty Technology Institute05/24/04 1 Educational Technology Outreach Business Collaboration Cyber Issues.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher (Part 1) University of Maryland Educational Technology Policy,
Digital Citizenship By: Miranda Scorver.
 Netiquette- manners for how to use computer networks, including the internet. Do’sDon’ts - Make a presence online- Submit before you think - Check your.
Copyright © Allyn & Bacon 2008 Using Technology in the Classroom Gary G. Bitter & Jane M. Legacy Chapter Five This multimedia product and its contents.
Digital Citizenship Jessica L. Webb ED 505. Netiquette Netiquette Social Media- interactive dissemination of information through the internet. Netiquette-
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Security Issues, Ethics, & Emerging Technologies in Education
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Just What Are Worms, Adware, Spyware, and Phishing Expeditions?
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Davina Pruitt-Mentle Educational Technology Outreach College of Education University of Maryland Cyberethics, Cybersafety, and Cybersecurity (C3): Implications.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Computer Skills and Applications Computer Security.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Digital Citizen Project By: Frances Murphey Technology and Education.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Laws and Rules That Govern Internet Safety Ashley Martin.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Issues for Computer Users, Electronic Devices, Computer and Safety.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Computer Security Keeping you and your computer safe in the digital world.
Acceptable Use Policy (Draft)
Protect Your Computer Against Harmful Attacks!
Computer Security.
The Issues with Technology in education
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Davina Pruitt-Mentle Educational Technology Policy, Research and Outreach College of Education University of Maryland Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 2 Overview Introductions Cyber Awareness Overview and & Resources Cybersafety Cyberethics Cybersecurity Questions/Closure

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 3 Maryland Teacher Technology Standards Maryland Teacher Technology Standards

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 4 III. Legal, Social and Ethical Issues Demonstrate an understanding of the legal, social and ethical issues related to technology use 1.Identify ethical and legal issues using technology. 2.Analyze issues related to the uses of technology in educational settings. 3.Establish classroom policies and procedures that ensure compliance with copyright law, Fair Use guidelines, security, privacy and student online protection. 4.Use classroom procedures to manage an equitable, safe and healthy environment for students. MTTS Developed from Maryland’s Preparing Tomorrow’s Teachers to Use Technology (PT3), USDOE Catalyst Grant, May Performance assessment materials to be available for each standard on the PT3 website: Any use of these materials should credit Maryland’s PT3 Catalyst Grant P342A What is your Interpretation?

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 5 III. Legal, Social and Ethical Issues Demonstrate an understanding of the legal, social and ethical issues related to technology use MTTS Developed from Maryland’s Preparing Tomorrow’s Teachers to Use Technology (PT3), USDOE Catalyst Grant, May Performance assessment materials to be available for each standard on the PT3 website: Any use of these materials should credit Maryland’s PT3 Catalyst Grant P342A What is your Interpretation? 1.Identify ethical and legal issues using technology. Digital and Urban Divide Access Issues Cultural Differences in Multimedia AT and 508/Comar Regulations508/Comar

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 6 III. Legal, Social and Ethical Issues Demonstrate an understanding of the legal, social and ethical issues related to technology use MTTS Developed from Maryland’s Preparing Tomorrow’s Teachers to Use Technology (PT3), USDOE Catalyst Grant, May Performance assessment materials to be available for each standard on the PT3 website: Any use of these materials should credit Maryland’s PT3 Catalyst Grant P342A What is your Interpretation? 2.Analyze issues related to the uses of technology in educational settings. Evaluation of Content Goal of Technology Use

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 7 III. Legal, Social and Ethical Issues Demonstrate an understanding of the legal, social and ethical issues related to technology use MTTS Developed from Maryland’s Preparing Tomorrow’s Teachers to Use Technology (PT3), USDOE Catalyst Grant, May Performance assessment materials to be available for each standard on the PT3 website: Any use of these materials should credit Maryland’s PT3 Catalyst Grant P342A What is your Interpretation? 3.Establish classroom policies and procedures that ensure compliance with copyright law, Fair Use guidelines, security, privacy and student online protection. Expectations and ProceduresExpectations and Procedures Disability Statement Proper Citation Copyright Law Fair Use FERPA/ Teach Act Acceptable Use Policies Privacy and Netiquette

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 8 III. Legal, Social and Ethical Issues Demonstrate an understanding of the legal, social and ethical issues related to technology use MTTS Developed from Maryland’s Preparing Tomorrow’s Teachers to Use Technology (PT3), USDOE Catalyst Grant, May Performance assessment materials to be available for each standard on the PT3 website: Any use of these materials should credit Maryland’s PT3 Catalyst Grant P342A What is your Interpretation? 4.Use classroom procedures to manage an equitable, safe and healthy environment for students. Ergonomics Assistive Technology Equitable Access Cybersafety Filters

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 9 Past Focus Copyright and Intellectual Property Issues in the Digital Environment Internet Citizenship Fair Use Checklist Safety and Security Online Safety for Kids What Do You Know?/What Have You Done?! Hoax s Plagiarism in the 21st Century: Paper Mills, Cybercheating, and Internet Detectives in the Electronic Age

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 10 Performance Assessment Outline Performance Assessment Outline See Handout

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 11 Case Study And Questions Case Study And Questions See Handout/Read Through

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 12 Answers Can be found at Maryland PT3 Performance Task site pt3/TaskIII.htmhttp:// pt3/TaskIII.htm

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 13 Top Ten Educator Awareness Problems Passwords Backing Ups Files/Patches/Anti-Virus Protection Copyright Cyberbullying Issues w/ New technology (social networking/blogs/cell phones) Hoaxes Attachments 508 knowledge Plagiarism/Modeling (correct citation) Equity Issues

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 14 C3™:New Directions Cybersecurity Cybersafety Cyberethics

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 15 UMCP Efforts C3™ InstituteC3™ Institute Electronic Portal Workshops PT3 pre-service module (part of undergraduate course) Online 3 credit graduate courseOnline 3 credit graduate course April is Cyber- Awareness Month!April is Cyber- Awareness Month! October is Cyber Security Awareness Month!October is Cyber Security Awareness Month! C3 Conference (October 4 & 5, 2007)C3 Conference (October 4 & 5, 2007)

Cybersafety

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 17 Curricula iKeepSafe NetSmartZ iSAFE CyberSmart StaySafeOnline MANY others ToolKit See Handouts

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 18 Social Networking Sites & Activities FTC NetSmartZ StaySafeOnline.org Social Networking Sites orkingenviron orkingenviron More

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 19 Internet Filtering Children's Internet Protection Act. (CIPA) Child Online Protection Act (COPA). –Any school or library that receives discounted rates for telecommunications services under the E-Rate program, or receives funding through the Library Services & Technology Act or Title III, in order to purchase computers used to access the Internet, or to pay for direct costs associated with accessing the Internet, must comply with federal mandate.

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 20 COPA? CIPA? The U.S. Federal Trade Commission (FTC) has the responsibility for enforcing COPA and the Federal Communications Commission (FCC) regulates CIPA COPA requires U.S.-based Web-sites that collect personal information from people under the age of 13 to obtain permission from parents or guardians before asking for such data. CIPA requires schools and libraries prove that Internet access to objectionable material is not available to any user under 17 years of age.

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 21 Cyber bullying Take the Cyber bullying ames/javascript/cyberbullying_quiz_1/in dex.html ames/javascript/cyberbullying_quiz_1/in dex.html Cyber bullying erbullying/ erbullying/ Other savvy Resources berbuve.html berbuve.html

Cyberethics

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 23 Copyright and Intellectual Property Issues Copyright and Intellectual Property Issues in the Digital Environment University of Maryland Guidelines for the Acceptable Use of Computing ResourcesAcceptable Use

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 24 The Educator's Guide to Copyright and Fair Use Copyright Quiz Hall Davidson's /10/copyright_quiz.html /10/copyright_quiz.html See Handout

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 25 The Educator's Guide to Copyright and Fair Use Copyright Primer

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 26 Maryland Technology Performance Task III See Handout Source: pt3/TaskSummaries.htmhttp:// pt3/TaskSummaries.htm

Tutorials

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle Big Myths About Copyright Explained Brad Templeton

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 29  Primer UMUC

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 30 Getting Started University of Texas m.edu/copyright/ m.edu/copyright/

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 31 Copyright Tutorial cont. Source: deep link- pol2.htm#test pol2.htm#test

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 32 Bruin Success with Less Stress UCLA

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 33 Purdue Copyright Management Center

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 34 A Visit to Copyright Bay: Fair Use Harbor Laura Gasaway, University of St. Francis y/fairuse.htm

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 35 The Educator's Guide to Copyright and Fair Use: A five-part series

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 36 Copyright Snippets: Warm-ups Place in Order Article in an Internet-only newsletter Monitor/oct Workplace.html Videocounseling for families of rural teens with epilepsy -- Project update. Telehealth News, Glueckauf, R. L., Whitton, J., Baxter, J., Kain, J., Vogelgesang, S., Hudson, M., et al. 2(2). ewslettr4a.html1 Retrieved from (1998, July).

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 37 Article in an Internet-only newsletter Glueckauf, R. L., Whitton, J., Baxter, J., Kain, J., Vogelgesang, S., Hudson, M., et al. (1998, July). Videocounseling for families of rural teens with epilepsy -- Project update. Telehealth News,2(2). Retrieved from a.html1 a.html1 APA style format

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 38 Components of URL

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 39 Internet Citizenship each.umd.edu/cyberet hicsseminar.htmlhttp:// each.umd.edu/cyberet hicsseminar.html Presentation by Karen Reuter

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 40 Other Netiquette Snippets: Warm-ups Take the Core Rules Netiquette Quiz – m/netiquette/corerule s.htmlhttp:// m/netiquette/corerule s.html

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 41 Emoticons and Jargon Go to esources/dictionary/emoticons.h tml esources/dictionary/emoticons.h tm Online Lingo edu/ArchivedWebsites/USMilw/ onlinelingo.pdf edu/ArchivedWebsites/USMilw/ onlinelingo.pdf –Which ones are you familiar with? –Which ones have you used? –Reflect on why it is important to understand the jargon (or at least where to go to find out) as a parent? –As an educator?

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 42 Online Translator Using an online slang translator hp (talks about what it is) translate the following message –John: gg.wth were they thinking? –Steve: Tnx. imho we pwned them. –John: I agree – rotflmao. –Steve: They need to rtfm. –John: ttyl What was the message? Was this online slang translator helpful? Why or why not? emoticons, jargon, slang and leet.

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 43 Plagiarism Plagiarism in the 21st Century: Paper Mills, Cyber-cheating, and Internet Detectives in the Electronic Age cyberethicsseminar.htmlhttp:// cyberethicsseminar.html

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 44 Plagiarism Snippets: Warm-ups Examine paper-mill sites - some of them are listed below (you do not have to look at them all) –A-1 Term Papers - –Academic Term papers - –Top 100 Essay sites - –Pink Monkey - –School Sucks - –Cheat House - Discuss the quality of a few of the sites above and the materials gained. How easy were the sites to navigate? What levels were the sites targeting? Were you able to find papers/materials that met your specific needs? Rate the quality of the materials located. How easy would it be for a student to access the materials?

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 45 Plagiarism Snippets: Warm-ups See Handouts

Cybersafety

Just What Are Worms, Adware, Spyware, and Phishing Expeditions?

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 48 Definitions Worm: a self-replicating computer program, similar to a computer virus. It is self-contained and does not need to be part of another program to propagate itself. –Example: Sobig and Mydoom. Virus: attaches itself to, and becomes part of, another executable program; –Macro viruses are written in the scripting languages for Microsoft programs such as Word and Excel. In general, a virus cannot propagate by itself whereas worms can. A worm uses a network to send copies of itself to other systems and it does so without any intervention. In general, worms harm the network and consume bandwidth, whereas viruses infect or corrupt files on a targeted computer. Viruses generally do not affect network performance, as their malicious activities are mostly confined within the target computer itself. From Wikipedia -

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 49 Definitions Trojan Horse: A malicious program that is disguised as legitimate software –These are often those attachments to that entice you to open them Malware: Software designed to infiltrate or damage a computer system, without the owner's consent –Includes computer viruses, Trojan horses, spyware and adware

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 50 What to do Signs of infection –May seem sluggish or slow down significantly –Might ‘lock up’ more often than usual –Browser program may not work correctly –Pop-up ads –Unusual hard drive activity Ways to get rid of –Use your anti-virus software (you have one right!!!) Scan all your drives –Use Microsoft Malicious Software Removal Tool ecurity/malwareremove/def ault.mspxhttp:// ecurity/malwareremove/def ault.mspx –McAfee: teID=1&resolution=1280x10 24&rurl=vrContactOptions.a sp teID=1&resolution=1280x10 24&rurl=vrContactOptions.a sp –Symantec: m/sscv6/default.asp?produc tid=symhome&langid=ie&ve nid=sym m/sscv6/default.asp?produc tid=symhome&langid=ie&ve nid=sym

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 51 Chain Letter Hoax Definition: An which urges the recipient to forward the to other people DEAR SIR, URGENT AND CONFIDENTIAL BUSINESS PROPOSAL I AM MARIAM ABACHA, WIDOW OF THE LATE NIGERIAN HEAD OF STATE, GEN. SANI ABACHA. AFTER HE DEATH OF MY HUSBAND WHO DIED MYSTERIOUSLY AS A RESULT OF CARDIAC ARREST, I WAS INFORMED BY OUR LAWYER, BELLO GAMBARI THAT, MY HUSBAND WHO AT THAT TIME WAS THE PRESIDENT OF NIGERIA, CALLED HIM AND CONDUCTED HIM ROUND HIS APARTMENT AND SHOWED HIM FOUR METAL BOXES CONTAINING MONEY ALL IN FOREIGN EXCHANGE AND HE EQUALLY MADE HIM BELIEVE THAT THOSE BOXES ARE FOR ONWARD TRANSFER TO HIS OVERSEAS COUNTERPART FOR PERSONAL INVESTMENT. ALONG THE LINE, MY HUSBAND DIED AND SINCE THEN THE NIGERIAN GOVERNMENT HAS BEEN AFTER US, MOLESTING, POLICING AND FREEZING OUR BANK ACCOUNTS AND EVEN MY ELDEST SON RIGHT NOW IS IN DETENTION. MY FAMILY ACCOUNT IN SWITZERLAND WORTH US$22,000, AND 120,000, DUTCH MARK HAS BEEN CONFISCATED BY THE GOVERNMENT. THE GOVERNMENT IS INTERROGATING HIM (MY SON MOHAMMED) ABOUT OUR ASSET AND SOME VITAL DOCUMENTS. IT WAS IN THE COURSE OF THESE, AFTER THE BURIAL RITE AND CUSTOMS, THAT OUR LAWYER SAW YOUR NAME AND ADDRESS FROM THE PUBLICATION OF THE NIGERIAN BUSINESS PROMOTION AGENCY. THIS IS WHY I AM USING THIS OPPORTUNITY TO SOLICIT FOR YOUR CO-OPERATION AND ASSISTANCE TO HELP ME AS A VERY SINCERE RESPONSIBLE PERSON. I HAVE ALL THE TRUST IN YOU AND I KNOW THAT YOU WILL NOT SIT ON THIS MONEY.

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 52 More Definitions Adware: Software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. Spyware: designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user.

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 53 What to do Signs of infection –An affected computer can rapidly become infected with large numbers of spyware components. –Pop-up advertisements –Unwanted behavior and degradation of system performance. –Significant unwanted CPU activity, disk usage, and network traffic Slows down other programs Stability issues— application or system Ways to get rid of or protect –Anti-spyware programs OptOut Ad-Aware SE Spybot - Search & Destroy

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 54 Definitions Spamming –Sending of unsolicited bulk unsolicited and received by multiple recipients Solutions –Source-based blocking solutions prevent receipt of spam –Content filtering solutions identify spam after it’s been received –Disposable identities Spoofing –one person or program successfully pretends to be another by falsifying data and thereby gains an illegitimate advantage –“Webpage spoofing," : a legitimate web page such as a bank's site is reproduced in "look and feel" on another server under control of the attacker. They fool users into thinking they are connected to a trusted site, to gather user names and passwords.

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 55 Identity Theft Phishing –Phishing is a popular and growing method of identity theft, typically performed either through or through the creation of a Web site that appears to represent a legitimate company. Victims are asked to provide personal information such as passwords and credit card numbers in a reply or at the bogus Web site. “Spear phishing” the practice of targeting an attack to a specific group is gaining in sophistication and frequency. Pharming –A scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure."

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 56 Identity Theft The Federal Trade Commission reports that identity theft now affects more than 10 million people every year representing an annual cost to the economy of $50 billion

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 57 Activities James Mason's Computer Security Awareness tutorial page – - George Mason University's IT Security Quiz – STAYSAVEONLINE.org – Carnegie Mellon's Home Computer Security tutorial siteCarnegie Mellon's Home Computer Security tutorial Microsoft Spyware Quiz part 1 and part

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 58 Activities Humorous video on Passwords at George Mason’s Security Website The University of Arizona’s Security Awareness Posters and the University of Michigan’s posters (my favorite).

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 59 C3™ Institute C3™ Institute

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 60 Electronic Portal Cyberethics, Cybersafety, and Cybersecurity (C3) treach.umd.edu/C3I nstitute/c3resources.htmlhttp:// treach.umd.edu/C3I nstitute/c3resources.html

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 61 C3™ Conference C3™ Conference

MICCA 2007 Baltimore, MDCopyright 2007: Davina Pruitt-Mentle 62 April/October Cyber- Awareness Month!

End slide Contact Information: Davina Pruitt-Mentle Director: Educational Technology Policy, Research and OutreachEducational Technology Policy, Research and Outreach University of Maryland 2127 TAWES College Park, MD (301) Questions