Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Post on 25-Dec-2015

214 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

Cyber Security

Level 5

Hey Everybody!My name is Tek.

I’m going to be your guide today! I’m a part of i-SAFE, and we are concerned with helping you to be safe online.

We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i-SAFE with others.

 

The Plan

Today you will be learning about viruses and malicious code. For this lesson you will be designing brochures on e-mail

etiquette and safety.

All Right – Let’s Get Started

Today we’re going to start with a game –

The Handshake Game

Here are the Rules!We are going to play a short game about

communication.You will be given time to go around and communicate

with each other in different ways.Your teacher will give each person a special instruction

on how to communicate as he/she meets each person. You are not to tell others what your instruction is; you are only to do the behavior.

Teacher - please pass out a behavior strip to each student at this time. Then allow them to begin.

Please Return to Your Seats at this Time   

• If you had contact – a handshake - with another student, please stand.

• Those students who are standing are Infected.

• Ask remaining students to stand if they had contact with any of the now standing students who were infected.

• This is how a virus works. It spreads and infects quickly, through contact.

Let’s Learn!Just as you communicated in the activity, e-mail is a form of communication. However, it has its own set of rules. Some reasons for this are harmful items like computer viruses.

Time for Discussion

How many of you have ever had your computer crash because of a virus?

Does anyone know how viruses are spread?

What are some viruses you have heard of?

ActivityOne common method of obtaining a virus is by downloading an

attachment from e-mail.

On your own, Brainstorm a list of 5-10 rules for e-mail based on your experience with it. If you have no experience, email is a written form of communication but with seemingly instant access available on a computer.

When finished brainstorming, share your rules with the class and discuss them.

Teacher’s choice:For a classroom with computers, return to the

Cyber Community folder on the CD and select HTML Activities. Follow the link: “Begin Here”. Students should work in groups.

When completed -Return here to Slide 23 to continue.

Otherwise – let’s continue on…

Email Etiquette is part of being a good cyber citizen.

E-mail is different then phone conversations, letters, or face-to-face meetings. That’s why it has some rules of its own. * This material can be found on reference

pages 1-3

Flaming: Flaming is when you send a mean or hurtful email. Flaming tends to happen frequently on the net because it's easy to write things without thinking them through. It's also easy to be misunderstood when writing e-mail messages, which can lead to a flame reply. Flaming can easily get out of control – If you get a flame message from someone, tell your parents or just delete it.

Spamming: Spam refers to e-mail garbage. Spamming is when you send junk mail such as jokes, hoaxes, urban legends, etc. to many people at once. You should never email this type of stuff to people you do not know. And typically, even your friends don’t want this stuff cluttering their email box. Spim: Just like Spam, but delivered by Instant Messaging.

Forwarding: Think before you forward email.

1. When you forward e-mail, you are giving out personal information

such as the email addresses of the person who sent it to you. 2. Forwarding e-mail can also be considered spamming. Make sure the email you send has a point.

Sometimes you may receive emails from a business asking for personal information. You should never reply to these type of emails. They are usually from people trying to steal your information for illegal reasons. They are “fishing” for information – thus the term phishing.

MalwareMalware are programs such as

worms and viruses that include malicious code – code written with the intent to harm, destroy, or annoy. Code is a term for the language(s) computer programs are written in – the code tells the computer what and how to do things. Malware can attach to email and carry out their programming which can cause computers to work improperly.

 

A Virus is a program that spreads itself by infecting files. Viruses are dangerous and can shut your computer down. While there are many ways to get a virus, the most common is through e-mail attachments.

Viruses

Worms also include malicious code. Worms work through networks. They travel through shared files and programs and can bring down an entire computer system.

Trojan Horse

Trojan Horses are another type of malicious code.

These are programs that claim to do one thing but actually do another when downloaded.

For example, you download a game to play but instead it wipes out your hard drive.

Here are ways you can keep your own computer safe, and make sure it doesn’t threaten other computers:

(1) Find out if your computer has a firewall. If not, ask your parents to make sure one is installed. A firewall protects information from entering your computer without your permission.

(2) Keep your computer updated (make sure updates are downloaded for your operating system regularly)

(3) Find out if your computer has virus protection software installed. If not, ask your parents to make sure they install virus protection software on your computer, keep it updated and USE it. This is very important!

And just a couple more:

(4) Don’t open e-mails if you don’t know who they are from.

(5) Be careful when you see e-mail that has been forwarded “FW:” or if it has an attachment with the suffix of “.exe,” “.scr,” or “.vsb.”

(6) If you do want to open an attachment, scan it through the virus software first. Sometimes even your friends can pass on viruses unintentionally. To do this, save all attachments before opening them.

Acronyms:

BCNU Be Seeing You

BTW By the Way

FWIW For What it’s Worth

FAQ Frequently asked questions

F2F Face to Face

FYI For your information

ROTFL Rolling on the floor laughing

Emoticons:

:-) Smiley face/ Happy

;-) Wink

:-( Sad Face/ Unhappy

:-O Yelling

:-@ Screaming

Some Fun with Email

I hope you learned something I know I did!

All right – let’s get into groups. Your teacher will divide you up for our next activity.

All right – Everyone in Groups?

Good! Your task today is to create a brochure on e-mail etiquette and safety.

I’m going to help you out and show you how to get started.

Build a Brochure

Ok – Now you understand the concept of email along with some of its dangers.

In your small groups, return to (A) what you have learned and (B) your former brainstorm list. Using these items, you are to design a brochure on E-mail Etiquette and Safety. Brochures should be informative and creative. One simplified suggestion would be to have a Do and Don’t list.

So Get Started!

Do your best on these brochures! Once you are finished your group will present your brochure to the rest of the class and discuss what you have learned.

How Do you Know When You’re Done?

Have you:1. Completed your group brochure?2. Shared your brochure with your class?3. Discussed as a class what you have learned about email etiquette and

safety?

It doesn’t have to end here!

Find out about DRiVE!

Take ActionTake Action It’s Easy with the i-Mentor Training Network!

The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community.

To watch the videos go to the i-Mentor Network located in the X-BLOCK of the i-SAFE website at www.isafe.org.

Visit the X-BLOCK at www.isafe.org to learn about the i-Mentor Training Network. It’s all online!

www.isafe.org

• Enroll online at www.isafe.org by clicking on Create an Account.

• Receive your own Student Toolkit and materials to get started.

Get the recognition you deserve Get the recognition you deserve as an i-SAFE Mentoras an i-SAFE Mentor

Take ActionTake Action

top related