Cyber Security Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Mayfield Intermediate
Internet Safety Tips: Viruses. Computer Virus When you have a virus, you feel sick, tired, and yucky. You dont feel like working or playing.
Developed by Technology Services 1:1 Laptop Initiative
Let’s Talk About Cyber Security
Internet Safety May 2014 – KS3 AIMS  To find out what you know about staying safe online  To improve on your knowledge on internet safety  To be clear.
Internet Safety Review Focus: Community A Literacy-Based Teaching and Learning Activity Level 5.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
The 5 Senses HELLO STUDENTS! This is an interactive PowerPoint about the 5 senses! You are in charge of how you go through and finish this PowerPoint.
Community Level 7. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Cyber Bullying Grade 3.
Cyber Bullying Level 5.
Cyber Bullying Level 7.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Safety on the Internet MSTI 131 4/16/2009 Kelsey Chappell Corinne Thompson Keith Libolt Amanda Lax Sao Ching.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
E-Safety Quiz Keeping safe online! A guide for parents & children.
 Definition:  Internet safety is when you are safe and mindful of all the dangers of the internet.  Internet safety is also not getting harassed or.
Cyber Bullying Level 8.
Intellectual Property
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE. i-SAFE is concerned with teaching you how to.
Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Cyber Security Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Personal Safety Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Digital Citizen Project Katie Goodall Educational Technology 505.
Tablet Camp 2015 Resource Guide for Students at Klein ISD 1:1 Campuses.
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Copyright and Fair Use. Today you will be exercising your knowledge about copyright and fair use. You will be working with scenarios to determine how.
Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Student Mentors Know the Rules of the Road Tell others about Internet safety Plan Internet Safety Activities and Events outside the classroom Teach i-SAFE.
Cyber Safety and Digital Citizenship Keeping kids safe from harm.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Intellectual Property Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE America. i- SAFE is concerned with teaching.
Personal Safety Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
ASHLEIGH LENTYCH CYBER BULLYING AND INTERNET SAFETY.
EHS Computer Network Review. Hey Everybody! My name is Tek. I ’ m going to be your guide today!
Internet Safety Review Focus: Personal Information A Literacy-Based Teaching and Learning Activity Level 8.
Copyright and Fair Use. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Digital Citizenship By: William Rickman Digital Citizenship is the knowledge for children and other computer users to know how to appropriately use the.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
EducateEmpowerMobilize. Why iSafe?  In an eloquent letter to educators, Teri Schroeder, the president of I- Safe America describes why Los Angeles Unified.
MSTI 131 November 6, 2008 Meghan Hynes Katy Kincade Nichole Enos Brittany Hollenbeck Samantha Hook.
Let’s Get Savvy about Technology Mrs. George Dondero School.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Click here to begin Internet Safety Keeping Kids Safe On-Line.
Internet Safety Review Focus: Cyber Security A Literacy-Based Teaching and Learning Activity Level 6.
INTERNET SAFETY, NETIQUETTE, AND COPYRIGHT LAWS By Alex Pagliaro.
Introduction Task Process Evaluation Conclusion Teacher Page.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Homeland Security: Computer Protection
What should our class behavior system look like?
Working to Keep our Children Safe in a World Filled with Technology
Risk of the Internet At Home
Web Logs: A Positive Approach to Blogging
Safe Website Design.
Presentation transcript:

Cyber Security Level 8

Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i- SAFE with others.

All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.

So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at – Click on the link to contests and Incentives. Empowerment is the Key to Learning!

The Plan For this lesson you will be learning about cyber security. You will be completing a KEWL chart to evaluate what you know, want to know, need to know, and have learned!

KEWL Stands for what we KNOW Stands for Expanding our knowledge Stands for What we want to learn Stands for Leading others in Learning

KEWL Chart – Cyber Security K Know E Expand Knowledge W What was Learned L Lead others in Learning KEWL Chart – Cyber Security This is what the chart looks like. You can copy it on your paper. You can also complete it as a class on an overhead

All Right – Let’s Get Started First we brainstorm!!!

What do we know about viruses, worms and Trojan horses? List your answers in the K column of the chart. This column forms a foundation of what you currently know about harmful viruses, worms, and Trojan horses. Hopefully you are somewhat familiar with viruses and able to give basic information. Sample questions and answers: Q. What is a virus? What is a computer virus?

Ok – so now that we have figured out what we know – time to find out what else we need to know! This information goes in the expanding your knowledge column

Expand Your Knowledge Where is your knowledge lacking? What more do you feel you should know about viruses, worms, and Trojan horses to protect yourselves and your computers? Sample questions to go in this column: 1.How can I prevent getting my computer “sick”? 2.What are worms? 3.What are Trojan horses? 4.Why should I care?

Teacher’s choice: For a classroom with computers, return to the Cyber Community folder on the CD and select HTML Activities. Follow the link: “Begin Here”. When complete, continue here with Slide 15 to finish the chart. Otherwise – let’s continue on

Now it’s time to learn a little about and malicious code All right – let’s get into groups. Your teacher will divide you up for our next activity.

Group Directions 1.Each group should have the activity pages which describe etiquette and virus terms, and the mock scenario. 2.In your small groups, read and discuss the information on computer viruses and malicious code. 3.After you have read over and discussed the material, each group should come to a consensus on what they believe is the correct answer to the scenario they have.

Ok – Returning to our Chart Hmmm, What comes next? Oh yes, What have we learned about security???

What have we learned? Now that we have covered viruses, worms, and Trojan horses, what have you learned from your information sheet and the scenarios. Check the “what you want to know” questions to ensure you have answered them all! Sample question and answer: Q. What do we know worms, viruses, and Trojan horses? A. Viruses can be gained by downloading attachments. Worms affect computer networks. It isn’t safe to download items on the Internet without proof – they can be Trojan horses.

And Last, but not Least We have to come up with some empowerment activities. This means brainstorming how we can help others learn about security.

Leading Others in Learning This section allows you to identify ways to own the knowledge you have learned. By spreading knowledge to others, you continue your own learning. In this column brainstorm ways to spread knowledge. Sample questions and answers: Q. How can we spread what we have learned? A. Talk to parents about what learned. Give presentations to others, design posters, incorporate peer-to-peer communication.

One Last Activity Just a fun exercise to review all we have learned – your teacher has copies of a crossword puzzle for you to complete. It’s a fun way to make sure you’ve got it all down pat!

All right – Everyone Finished? Good! I hope you’ve learned something today about using wisely and preventing the spread of malicious code. Now let’s see if we’re finished.

So How Do you Know When You’re Done? Have you: 1. Read the information sheets and completed your scenarios? 2. Shared your scenario and answer with your class? 3. Discussed as a class what you have learned about security? 4. Completed the KEWL chart? 5. Completed the Crossword puzzle 6. Checked out the Contests and Incentives link at

It doesn’t have to end here! Find out about DRiVE!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at Visit the Kids and Teens section at to learn about the i-Mentor Training Network. It’s all online!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.

1.Enroll online at by clicking on Create an Account. 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action