Download presentation
Presentation is loading. Please wait.
Published byTyrone Lloyd Modified over 9 years ago
2
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules Social Networking Cyber Bullying
3
Understanding Cryptology Cryptology is the process of making and using codes to secure the exchange of information. Why is encryption important?
4
Encryption and Decryption The process of converting ordinary information into something that is unreadable is known as encryption. The method of reversing the encrypted message by reverting the unreadable text back into its original form is known as decryption. Encryption makes it hard to understand, and decryption makes it easy again!
5
FACT TIME
6
Cipher Methods A cipher is an algorithm for performing encryption or decryption. It is a series of well-defined steps that can be followed as a procedure. Example of a cipher method… Substitution Cipher Initial alphabet ABCDEFGHIJKLMNOP Encryption alphabet DEFGHIJKLMINOQRS
7
History 1900 B.C. - Hieroglyphics 1500 B.C. - Mesopotamia 500-600 B.C. - ATBASH 487 B.C. - Skytale 50-60 B.C. - Julius Caesar 1790’s - Thomas Jefferson WWII
8
FACT TIME
9
Https vs. Http Secure Socket Layer (SSL) & Transport Layer Security (TSL) –cryptographic protocols or set of rules) that provide security for communications over networks such as the Internet. HTTPS is secure https://www.wellsfargo.com –Uses SSL to secure the transfer of information HTTP is not secure http://www.facebook.com
10
Identity Theft
11
FACT TIME
12
Social Networking Sites: Twitter MySpace Facebook YouTube
13
What are people posting? Too much information! –Birthday –Address –Phone Number –Status Updates –Future Events –Pictures
14
How does your profile represent you? How can it affect you? –Potential scholarships? –Future employers? –Future in-laws? Think about your online image –Who will see this? –What will they think?. **Assume that anything you put on the internet can be accessed later… It’s there FOREVER!
15
FACT TIME
16
Can it happen to you? Burleson High School in Texas Churubusco High School in Indianapolis Paramus High School in New Jersey
17
Social Networking Risks Do you personally know all of your “friends”? –what can be done with the information you display Do people really need to know what you’re doing 24/7?? FBI monitoring networking sites
18
Cyber Bullying Cyber bullying is using terminology to embarrass, humiliate, threaten, or intimidate another –Flaming: online fighting –Harassment: repeat messages –Impersonation: identity theft –Denigration: “dissing”, gossip, rumors –Stalking: repeat harassment and denigration Can lead to potential legal ramifications
19
FACT TIME
20
Protecting Your Identity Ever heard of… Spyware? –ExampleExample Malware? –ExampleExample Phishing? –ExampleExample Anti-virus software or Firewall?
21
Internet Safety Rules Protect your computer –Secure vs. unsecure networks Look for the lock (https) Bank Example –Up-to-date security software Protect your privacy & the privacy of others (friends and family) –Only give necessary information when required
22
Internet Safety Rules (cont.) Protect your password –Tips for strong secure passwords –Beware of shoulder surfers –Do not click “remember me” on public computers View all content critically
23
FACT TIME
24
Internet Safety Rules (cont.) Beware of contests, clubs, prizes, and gifts –Common scams –Do you really need an account? Beware of stranger danger –Cyber predators Dateline: Predator Don’t break the law –Cyber bullying –Plagiarism
25
Tips for Using Public Computers Always log out Don’t leave your computer unattended Erase your tracks Don’t save log-in information –Don’t click “remember me” Beware of shoulder snoops Don’t enter sensitive information –Key logging software
26
Game Time! Beware of Spyware Friend Finder ID Theft Faceoff Invasion of the Wireless Hackers Phishing Scams - Avoid the Bait The Case of the Cyber Criminal
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.