Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Mayfield Intermediate
Let’s Talk About Cyber Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
Internet Safety Review Focus: Community A Literacy-Based Teaching and Learning Activity Level 5.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
Community Level 7. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Cyber Bullying Grade 3.
Cyber Bullying Level 5.
Cyber Bullying Level 7.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
This is group I have made.  Deleted all the s we didn’t need to clear out our .  Then created folders for the s we would receive.
+ An Introduction to Safety on the Internet 1 Material and Advice provided by:
Cyber Bullying Level 8.
Intellectual Property
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE. i-SAFE is concerned with teaching you how to.
Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Information guide.
Cyber Security Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Security Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
IT security By Tilly Gerlack.
Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Internet Safety Dangers and Netiquette Trust No One You Don’t Know! A shark is a predator. Predators swim around looking for victims. The ocean is beautiful.
Personal Safety Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Student Mentors Know the Rules of the Road Tell others about Internet safety Plan Internet Safety Activities and Events outside the classroom Teach i-SAFE.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Intellectual Property Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE America. i- SAFE is concerned with teaching.
Personal Safety Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
EHS Computer Network Review. Hey Everybody! My name is Tek. I ’ m going to be your guide today!
Internet Safety Review Focus: Personal Information A Literacy-Based Teaching and Learning Activity Level 8.
Copyright and Fair Use. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Let’s Get Savvy about Technology Mrs. George Dondero School.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Internet Safety Review Focus: Cyber Security A Literacy-Based Teaching and Learning Activity Level 6.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Gosbecks E-Safety Guide
Internet Safety How to stay safe online.
Unit 4 IT Security.
Follow safety rules so that YOU: Avoid getting HURT.
Web Logs: A Positive Approach to Blogging
Safe Website Design.
Presentation transcript:

Cyber Security Level 6

Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i- SAFE with others.

All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.

So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at – Click on the link to contests and Incentives. Empowerment is the Key to Learning!

The Plan Today you will be learning about viruses and malicious code. For this lesson you will be developing a top ten list of rules to follow along with a slogan.

All Right – Let’s Get Started Today we’re going to start with a game – The Match-Up Game

Here are the Rules! We are going to play a short game about communication. You will be given either a vocabulary word or an letter by your teacher. You are to try to find your match – each vocabulary word has an letter with an example of it in it. You aren’t expected to know all the terms – just do your best! Teacher - please pass out either a vocabulary word or an letter to each student at this time. Then allow them to begin.

Please Return to Your Seats at this Time Ok – now we’re going to learn more about these terms and why they are important. Each of those vocabulary terms has something to do with communication. Let’s see who got what right! *Teacher please see answer key for correct answers.

Let’s Learn! Just as you communicated in the activity, is a form of communication. However, it has its own set of rules. Some reasons for this are harmful items like computer viruses.

Time for Discussion How many of you have ever had your computer crash because of a virus? Does anyone know how viruses are spread? What are some viruses you have heard of?

Think About It! What are your experiences with ? What are some common issues or annoyances you have run into with ?

Teacher’s choice: For a classroom with computers, return to the Cyber Community folder on the CD and select HTML Activities. Follow the link: “Begin Here”. Students should work in groups. When completed - Return here to Slide 25 to continue. Otherwise – let’s continue on…

Etiquette is part of being a good cyber citizen. is different than phone conversations, letters, or face-to-face meetings. These differences cause a new set of problems associated with this communication. Educate yourself on these no no’s. This material can be found on activity pages #3-4

Because is written and instantaneous, people find it easier to say things they might not otherwise say. Flaming is when you send a mean or hurtful . Flaming tends to happen frequently on the net because it's easy to write things without thinking them through. Flaming can easily get out of control - If you get a flame message from someone, tell your parents or just delete it. Also, before you send an , think carefully about what you have said. Some things can be taken the wrong way – use emoticons to show people when you are joking.

Spam is considered to be garbage. It is all that stuff you get and have to delete. Spamming is when you send junk mail such as jokes, hoaxes, urban legends, etc. to many people at once. You should never this type of material to people you do not know. And typically, even your friends don’t want this stuff cluttering up their box.

Forwarding: Think before you forward. 1.When you forward , you are giving out personal information such as the addresses of the person who sent it to you. If you do have to forward it – delete previous addresses and BCC it to everyone – that way no addresses show but yours. 2. Forwarding can also be considered spamming. Make sure the you send has a point.

There are a lot of stories, rumors, and urban legends circulating out there. Realize that not everything you receive in is true. Some examples are the s that tell you to forward to ten friends and you’ll receive money/gift certificates from a favorite store. Another harmful example is the that claims a virus may have been installed on your computer and you should delete a certain file. Often this file is a necessary one for your computer. Make sure you delete these types of hoax s and don’t pass them on.

A Virus is a program that spreads itself by infecting files. Viruses are dangerous and can shut your computer down. While there are many ways to get a virus, the most common is through attachments. Viruses

Here are ways you can keep your own computer safe, and make sure it doesn’t threaten other computers: 1. Install a firewall on you computer. A firewall protects information from entering your computer without your permission. 2. Keep you computer updated (download updates for your operating system regularly) 3. Install virus protection software on your computer, keep it updated and USE it. 4. Don’t open s if you don’t know who they are from. 5. Another red flag is when is forwarded “FW:” or it has an attachment with the suffix of “.exe,” “.scr,” or “.vsb.” 6. If you do want to open an attachment, scan it through the virus software first. Sometimes even your friends can pass on viruses unintentionally. To do this save all attachments before opening them. There are consequences for creating or spreading a virus. You can be prosecuted as a criminal.

Acronyms: BCNUBe Seeing You BTWBy the Way FWIWFor What it’s Worth FAQFrequently asked questions F2FFace to Face FYIFor your information ROTFLRolling on the floor laughing Emoticons: :-)Smiley face/ Happy ;-)Wink :-(Sad Face/ Unhappy :-OYelling Some Fun with

Malicious code is a computer program code that is written with the intent to harm, destroy, or annoy. Viruses are malicious code. They attach to and carry out their programming which causes problems and money.

Worms are also malicious code. Worms work through networks. They travel through shared files and programs and can bring down an entire system.

Trojan horses are another type of malicious code. These are programs that claim to do one thing but actually do another when downloaded. For example, you download a game but the program wipes your hard drive.

Sometimes you may receive s from a business asking for personal information. You should never reply to these type of s. They are usually from people trying to steal your information for illegal reasons. They are “fishing” for information – thus the term phishing.

A program running in the background to monitor your computer activities. Frequently downloaded without you knowing it, they can monitor your web browsing and cause pop- ups.

I hope you learned something I know I did! All right – let’s get into groups. Your teacher will divide you up for our next activity.

All right – Everyone in Groups? Good! Your task today is to think back over what you have learned and create a top ten list of rules for use. Then develop a slogan to help remember safe and responsible use. You can put your list on paper or on a poster board!

So Get Started! Do your best on these slogans and lists! Once you are finished your group will present your list and slogan to the rest of the class and discuss what you have learned. And once you’re finished, check out i-SAFE’s contests! Click on the link to Contests and Incentives at

So How Do you Know When You’re Done? Have you: 1. Completed your Top Ten list and Slogan? 2. Shared your list and slogan with your class? 3. Discussed as a class what you have learned about etiquette and safety? 4. Checked out the Contests and Incentives link at

It doesn’t have to end here! Find out about DRiVE!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at Visit the Kids and Teens section at to learn about the i-Mentor Training Network. It’s all online!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.

1.Enroll online at by clicking on Create an Account. 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action