Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.

Slides:



Advertisements
Similar presentations
Internet Safety and Cyber Bullying All info came from
Advertisements

Mayfield Intermediate
Northside I.S.D. Acceptable Use Policy
Chapter 7 Resolving Conflicts and Preventing Violence Lesson 3
Let’s Talk About Cyber Security
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Internet Safety Review Focus: Community A Literacy-Based Teaching and Learning Activity Level 5.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
Community Level 7. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Cyber Bullying Grade 3.
Cyber Bullying Level 5.
Cyber Bullying Level 7.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Cyber Bullying Level 8.
Internet Safety By Kim Hensley. Non-profit organization dedicated to educating and empowering youth about internet safety One of the leading.
Intellectual Property
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE. i-SAFE is concerned with teaching you how to.
MSTI 131 April 16, 2009 Kahley Stalteri, Alex Suto, Pete Balaji, Joey Yager, John Sullivan.
Submitted by: Abhashree Pradhan CA (1)
Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Lesson 2 Keeping Schools Safe Is your school a safe place? Violence in schools threatens the safety of everyone in the school community. You can help.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Cyber Security Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
© Copyright 2011 (ISC)², Inc. All Rights Reserved. 1.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Cyber Security Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Personal Safety Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Community Level 6. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Intellectual Property Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Personal Safety Level 7. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Learning basic safety precautions can help a person avoid threatening or harmful situations.
Intellectual Property Grade 5 Lesson 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Copyright and Fair Use. Today you will be exercising your knowledge about copyright and fair use. You will be working with scenarios to determine how.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Cyber Security Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping.
Student Mentors Know the Rules of the Road Tell others about Internet safety Plan Internet Safety Activities and Events outside the classroom Teach i-SAFE.
Cyber Safety and Digital Citizenship Keeping kids safe from harm.
Web Logs: A Positive Approach to Blogging. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are.
Intellectual Property Level 6. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned.
Safe Website Design. Hey Everybody My name is Tek. I’m going to be your guide today! I’m a part of i-SAFE America. i- SAFE is concerned with teaching.
Personal Safety Level 8. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Internet Safety Review Focus: Personal Information A Literacy-Based Teaching and Learning Activity Level 8.
Understanding the Threats of and Defenses Against Cyber Warfare.
Copyright and Fair Use. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
In order to be eligible for federal funding for technology students EGUSD must receive instruction in "Digital Citizenship" These mini-lessons will be.
© 2008 i-SAFE Inc. an i-SAFE presentation. © 2008 i-SAFE Inc. Learning Goals YOU WILL: Understand that an online stranger is anyone met exclusively online.
EducateEmpowerMobilize. Why iSafe?  In an eloquent letter to educators, Teri Schroeder, the president of I- Safe America describes why Los Angeles Unified.
The 9 Themes of Digital Citizenship By: Austin. Digital Access Full electronic participation in society. Being able to access technology through the internet.
Community Level 8. Hey Everybody My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you to.
Chapter 17: Foreign Policy and National Defense Section 2.
Internet Safety Review Focus: Cyber Security A Literacy-Based Teaching and Learning Activity Level 6.
Cyber Bullying Level 7. Hey It’s Me Again! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be.
Cyber Chip New for 2016.
3.6 Fundamentals of cyber security
Understanding the Threats of and Defenses Against Cyber Warfare
Training and Outreach Materials
Cyber Chip.
9/11: Through Publication
Dignity for All Students Act (The Dignity Act)
Cyber Chip.
Web Logs: A Positive Approach to Blogging
Safe Website Design.
Presentation transcript:

Homeland Security

Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior. Also, we hope to empower you to communicate what you learn from i-SAFE with others.

All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.

So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at – Click on the link to contests and Incentives. Empowerment is the Key to Learning!

In this lesson, you will be learning about cyber terrorism and homeland security. You will be participating in a scavenger hunt for information and formulating your own answers to some tough questions. The Plan

All Right – Let’s Get Started Today we’re going to start with a discussion. We all know that going on the Internet is getting involved in a large Cyber Community. - What are some rules we should follow?

Time to Brainstorm Think of terrorism events that have happened in and to the United States such as September 11, the War on Terrorism, etc. Let’s talk about those for a minute. Now think, could the Internet be utilized as a potential weapon either by terrorists or other governments? How?

Cyber Terrorism The execution of a surprise attack by a sub national foreign terrorist group, or individuals with a domestic political agenda, using computer technology and the Internet to cripple or disable a nation's electronic and physical infrastructure. Also to be considered is a physical attack aimed at the Cyber infrastructure that would also result in down time. Either way, the goal is to increase panic, fear and confusion. Can you put this in your own words so you understand it?

Cyber Warfare The use of computers and other devices to attack an enemy’s information systems as opposed to an enemy’s armies or factories Now consider: how can hacking, steganography, malicious code (i.e. viruses and worms) have an impact on cyber terrorism/ cyber warfare?

Let’s Look at Some Important Vocabulary Terrorism: The unlawful use or threatened use of force or violence by a person or an organized group against people or property with the intention of intimidating or coercing societies or governments, often for ideological or political reasons. Cyber community: a group of people connected through online interaction.

A Few More Words to Know Infrastructure: The basic facilities, services, and installations needed for the functioning of a community or society, such as transportation and communications systems, water and power lines, and public institutions including schools, post offices, and prisons. Target Hardening: Making targets more resistant to attack or more difficult to remove or damage.

Think About It! If you apply cyber security strategies, are you in effect participating in Cyber Target Hardening? How is the infrastructure of the United States largely reliant on computers to work effectively? What are the possible consequences to the infrastructure of a cyber attack?

It’s time to do an activity… Divide into groups.

Time for Group Work In your groups you will participate in a scavenger hunt – either online or using worksheets. Make sure to read carefully and discuss each question. Sometimes there is more then one correct answer! Also, as a group you’ll need to come up with a few guidelines on how we all can help with Homeland Security We’ll meet back here when all the groups are finished.

Presentation Time Present your information to the class along with your guidelines. Then Discuss: How could a few simple guidelines make a difference in protection against a Cyber terrorist threat? As a class, come up with Five Guidelines for prevention and protection.

So How Do you Know When You’re Done??? Have you: 1. Completed the scavenger hunt and written your guidelines? 2. Discussed with your class what you have learned? 3. As a class, written five guidelines? 4. Checked out the Contests and Incentives link at

It doesn’t have to end here! Find out about DRiVE!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at Visit the Kids and Teens section at to learn about the i-Mentor Training Network. It’s all online!

Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.

1.Enroll online at by clicking on Create an Account. 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action