Download presentation
Presentation is loading. Please wait.
Published byBrenda Kelly Modified over 8 years ago
1
Homeland Security
2
Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online. We want you to recognize and avoid dangerous, destructive or unlawful online behavior. Also, we hope to empower you to communicate what you learn from i-SAFE with others.
3
All right – Let’s talk Empowerment Remember - Empowerment means you own what you learn and can use it to teach others and make a difference.
4
So not only are you learning and sharing, you are getting rewarded for doing so! i-SAFE includes an empowerment activity in every lesson. By completing the activity you may be eligible for neat incentives and prizes. Check it out at www.isafe.org – Click on the link to contests and Incentives.www.isafe.org Empowerment is the Key to Learning!
5
In this lesson, you will be learning about cyber terrorism and homeland security. You will be participating in a scavenger hunt for information and formulating your own answers to some tough questions. The Plan
6
All Right – Let’s Get Started Today we’re going to start with a discussion. We all know that going on the Internet is getting involved in a large Cyber Community. - What are some rules we should follow?
7
Time to Brainstorm Think of terrorism events that have happened in and to the United States such as September 11, the War on Terrorism, etc. Let’s talk about those for a minute. Now think, could the Internet be utilized as a potential weapon either by terrorists or other governments? How?
8
Cyber Terrorism The execution of a surprise attack by a sub national foreign terrorist group, or individuals with a domestic political agenda, using computer technology and the Internet to cripple or disable a nation's electronic and physical infrastructure. Also to be considered is a physical attack aimed at the Cyber infrastructure that would also result in down time. Either way, the goal is to increase panic, fear and confusion. Can you put this in your own words so you understand it?
9
Cyber Warfare The use of computers and other devices to attack an enemy’s information systems as opposed to an enemy’s armies or factories Now consider: how can hacking, steganography, malicious code (i.e. viruses and worms) have an impact on cyber terrorism/ cyber warfare?
10
Let’s Look at Some Important Vocabulary Terrorism: The unlawful use or threatened use of force or violence by a person or an organized group against people or property with the intention of intimidating or coercing societies or governments, often for ideological or political reasons. Cyber community: a group of people connected through online interaction.
11
A Few More Words to Know Infrastructure: The basic facilities, services, and installations needed for the functioning of a community or society, such as transportation and communications systems, water and power lines, and public institutions including schools, post offices, and prisons. Target Hardening: Making targets more resistant to attack or more difficult to remove or damage.
12
Think About It! If you apply cyber security strategies, are you in effect participating in Cyber Target Hardening? How is the infrastructure of the United States largely reliant on computers to work effectively? What are the possible consequences to the infrastructure of a cyber attack?
13
It’s time to do an activity… Divide into groups.
14
Time for Group Work In your groups you will participate in a scavenger hunt – either online or using worksheets. Make sure to read carefully and discuss each question. Sometimes there is more then one correct answer! Also, as a group you’ll need to come up with a few guidelines on how we all can help with Homeland Security We’ll meet back here when all the groups are finished.
15
Presentation Time Present your information to the class along with your guidelines. Then Discuss: How could a few simple guidelines make a difference in protection against a Cyber terrorist threat? As a class, come up with Five Guidelines for prevention and protection.
16
So How Do you Know When You’re Done??? Have you: 1. Completed the scavenger hunt and written your guidelines? 2. Discussed with your class what you have learned? 3. As a class, written five guidelines? 4. Checked out the Contests and Incentives link at www.isafe.org?
17
It doesn’t have to end here! Find out about DRiVE!
18
Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at www.isafe.org.www.isafe.org Visit the Kids and Teens section at www.isafe.org to learn about the i-Mentor Training Network.www.isafe.org It’s all online!
19
Take Action It’s Easy with the i-Mentor Training Network! The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i- Parent Programs and Community Leaders Meetings.
20
www.isafe.org 1.Enroll online at www.isafe.org by clicking on Create an Account.www.isafe.org 2.Go to the Kids and Teens Section and Submit the Online Mentor Menu. 3.Receive your own Student Toolkit and materials to get started. Get the recognition you deserve as an i-SAFE Mentor Take Action
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.