Download presentation
Presentation is loading. Please wait.
Published byDaisy Garrett Modified over 9 years ago
1
Cyber Security Level 6
2
Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE America, and we are concerned with helping you to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i- SAFE with others.
3
All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.
4
So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at www.isafe.org – Click on the link to contests and Incentives.www.isafe.org Empowerment is the Key to Learning!
5
The Plan Today you will be learning about viruses and malicious code. For this lesson you will be developing a top ten list of e-mail rules to follow along with a slogan.
6
All Right – Let’s Get Started Today we’re going to start with a game – The Match-Up Game
7
Here are the Rules! We are going to play a short game about communication. You will be given either a vocabulary word or an email letter by your teacher. You are to try to find your match – each vocabulary word has an email letter with an example of it in it. You aren’t expected to know all the terms – just do your best! Teacher - please pass out either a vocabulary word or an e-mail letter to each student at this time. Then allow them to begin.
8
Please Return to Your Seats at this Time Ok – now we’re going to learn more about these terms and why they are important. Each of those vocabulary terms has something to do with email communication. Let’s see who got what right! *Teacher please see answer key for correct answers.
9
Let’s Learn! Just as you communicated in the activity, e-mail is a form of communication. However, it has its own set of rules. Some reasons for this are harmful items like computer viruses.
10
Time for Discussion How many of you have ever had your computer crash because of a virus? Does anyone know how viruses are spread? What are some viruses you have heard of?
11
Think About It! What are your experiences with e-mail? What are some common issues or annoyances you have run into with e-mail?
12
Teacher’s choice: For a classroom with computers, return to the Cyber Community folder on the CD and select HTML Activities. Follow the link: “Begin Here”. Students should work in groups. When completed - Return here to Slide 25 to continue. Otherwise – let’s continue on…
13
E-mail Etiquette is part of being a good cyber citizen. E-mail is different than phone conversations, letters, or face-to-face meetings. These differences cause a new set of problems associated with this communication. Educate yourself on these e-mail no no’s. This material can be found on activity pages #3-4
14
Because e-mail is written and instantaneous, people find it easier to say things they might not otherwise say. Flaming is when you send a mean or hurtful e-mail. Flaming tends to happen frequently on the net because it's easy to write things without thinking them through. Flaming can easily get out of control - If you get a flame message from someone, tell your parents or just delete it. Also, before you send an e-mail, think carefully about what you have said. Some things can be taken the wrong way – use emoticons to show people when you are joking.
15
Spam is considered to be e-mail garbage. It is all that stuff you get and have to delete. Spamming is when you send junk mail such as jokes, hoaxes, urban legends, etc. to many people at once. You should never e-mail this type of material to people you do not know. And typically, even your friends don’t want this stuff cluttering up their e-mail box.
16
Forwarding: Think before you forward. 1.When you forward e-mail, you are giving out personal information such as the e-mail addresses of the person who sent it to you. If you do have to forward it – delete previous addresses and BCC it to everyone – that way no e-mail addresses show but yours. 2. Forwarding e-mail can also be considered spamming. Make sure the e-mail you send has a point.
17
There are a lot of stories, rumors, and urban legends circulating out there. Realize that not everything you receive in e-mail is true. Some examples are the e-mails that tell you to forward to ten friends and you’ll receive money/gift certificates from a favorite store. Another harmful example is the e-mail that claims a virus may have been installed on your computer and you should delete a certain file. Often this file is a necessary one for your computer. Make sure you delete these types of hoax e-mails and don’t pass them on.
18
A Virus is a program that spreads itself by infecting files. Viruses are dangerous and can shut your computer down. While there are many ways to get a virus, the most common is through email attachments. Viruses
19
Here are ways you can keep your own computer safe, and make sure it doesn’t threaten other computers: 1. Install a firewall on you computer. A firewall protects information from entering your computer without your permission. 2. Keep you computer updated (download updates for your operating system regularly) 3. Install virus protection software on your computer, keep it updated and USE it. 4. Don’t open e-mails if you don’t know who they are from. 5. Another red flag is when e-mail is forwarded “FW:” or it has an attachment with the suffix of “.exe,” “.scr,” or “.vsb.” 6. If you do want to open an attachment, scan it through the virus software first. Sometimes even your friends can pass on viruses unintentionally. To do this save all attachments before opening them. There are consequences for creating or spreading a virus. You can be prosecuted as a criminal.
20
Acronyms: BCNUBe Seeing You BTWBy the Way FWIWFor What it’s Worth FAQFrequently asked questions F2FFace to Face FYIFor your information ROTFLRolling on the floor laughing Emoticons: :-)Smiley face/ Happy ;-)Wink :-(Sad Face/ Unhappy :-OYelling :-@Screaming Some Fun with Email
21
Malicious code is a computer program code that is written with the intent to harm, destroy, or annoy. Viruses are malicious code. They attach to e-mail and carry out their programming which causes problems and money.
22
Worms are also malicious code. Worms work through networks. They travel through shared files and programs and can bring down an entire system.
23
Trojan horses are another type of malicious code. These are programs that claim to do one thing but actually do another when downloaded. For example, you download a game but the program wipes your hard drive.
24
Sometimes you may receive emails from a business asking for personal information. You should never reply to these type of emails. They are usually from people trying to steal your information for illegal reasons. They are “fishing” for information – thus the term phishing.
25
A program running in the background to monitor your computer activities. Frequently downloaded without you knowing it, they can monitor your web browsing and cause pop- ups.
26
I hope you learned something I know I did! All right – let’s get into groups. Your teacher will divide you up for our next activity.
27
All right – Everyone in Groups? Good! Your task today is to think back over what you have learned and create a top ten list of rules for e-mail use. Then develop a slogan to help remember safe and responsible e-mail use. You can put your list on paper or on a poster board!
28
So Get Started! Do your best on these slogans and lists! Once you are finished your group will present your list and slogan to the rest of the class and discuss what you have learned. And once you’re finished, check out i-SAFE’s contests! Click on the link to Contests and Incentives at www.isafe.org.www.isafe.org
29
So How Do you Know When You’re Done? Have you: 1. Completed your Top Ten list and Slogan? 2. Shared your list and slogan with your class? 3. Discussed as a class what you have learned about e-mail etiquette and safety? 4. Checked out the Contests and Incentives link at www.isafe.org?
30
It doesn’t have to end here! Find out about DRiVE!
31
Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at www.isafe.org.www.isafe.org Visit the Kids and Teens section at www.isafe.org to learn about the i-Mentor Training Network.www.isafe.org It’s all online!
32
Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.
33
www.isafe.org 1.Enroll online at www.isafe.org by clicking on Create an Account.www.isafe.org 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.