Top Banner
Cyber Security Level 5
30

Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Dec 25, 2015

Download

Documents

Marianna Smith
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Cyber Security

Level 5

Page 2: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Hey Everybody!My name is Tek.

I’m going to be your guide today! I’m a part of i-SAFE, and we are concerned with helping you to be safe online.

We want you to recognize and avoid dangerous, destructive or unlawful online behavior, and we hope to empower you to communicate what you learn from i-SAFE with others.

 

Page 3: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

The Plan

Today you will be learning about viruses and malicious code. For this lesson you will be designing brochures on e-mail

etiquette and safety.

Page 4: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

All Right – Let’s Get Started

Today we’re going to start with a game –

The Handshake Game

Page 5: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Here are the Rules!We are going to play a short game about

communication.You will be given time to go around and communicate

with each other in different ways.Your teacher will give each person a special instruction

on how to communicate as he/she meets each person. You are not to tell others what your instruction is; you are only to do the behavior.

Teacher - please pass out a behavior strip to each student at this time. Then allow them to begin.

Page 6: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Please Return to Your Seats at this Time   

• If you had contact – a handshake - with another student, please stand.

• Those students who are standing are Infected.

• Ask remaining students to stand if they had contact with any of the now standing students who were infected.

• This is how a virus works. It spreads and infects quickly, through contact.

Page 7: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Let’s Learn!Just as you communicated in the activity, e-mail is a form of communication. However, it has its own set of rules. Some reasons for this are harmful items like computer viruses.

Page 8: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Time for Discussion

How many of you have ever had your computer crash because of a virus?

Does anyone know how viruses are spread?

What are some viruses you have heard of?

Page 9: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

ActivityOne common method of obtaining a virus is by downloading an

attachment from e-mail.

On your own, Brainstorm a list of 5-10 rules for e-mail based on your experience with it. If you have no experience, email is a written form of communication but with seemingly instant access available on a computer.

When finished brainstorming, share your rules with the class and discuss them.

Page 10: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Teacher’s choice:For a classroom with computers, return to the

Cyber Community folder on the CD and select HTML Activities. Follow the link: “Begin Here”. Students should work in groups.

When completed -Return here to Slide 23 to continue.

Otherwise – let’s continue on…

Page 11: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Email Etiquette is part of being a good cyber citizen.

E-mail is different then phone conversations, letters, or face-to-face meetings. That’s why it has some rules of its own. * This material can be found on reference

pages 1-3

Page 12: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Flaming: Flaming is when you send a mean or hurtful email. Flaming tends to happen frequently on the net because it's easy to write things without thinking them through. It's also easy to be misunderstood when writing e-mail messages, which can lead to a flame reply. Flaming can easily get out of control – If you get a flame message from someone, tell your parents or just delete it.

Page 13: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Spamming: Spam refers to e-mail garbage. Spamming is when you send junk mail such as jokes, hoaxes, urban legends, etc. to many people at once. You should never email this type of stuff to people you do not know. And typically, even your friends don’t want this stuff cluttering their email box. Spim: Just like Spam, but delivered by Instant Messaging.

Page 14: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Forwarding: Think before you forward email.

1. When you forward e-mail, you are giving out personal information

such as the email addresses of the person who sent it to you. 2. Forwarding e-mail can also be considered spamming. Make sure the email you send has a point.

Page 15: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Sometimes you may receive emails from a business asking for personal information. You should never reply to these type of emails. They are usually from people trying to steal your information for illegal reasons. They are “fishing” for information – thus the term phishing.

Page 16: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

MalwareMalware are programs such as

worms and viruses that include malicious code – code written with the intent to harm, destroy, or annoy. Code is a term for the language(s) computer programs are written in – the code tells the computer what and how to do things. Malware can attach to email and carry out their programming which can cause computers to work improperly.

Page 17: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

 

A Virus is a program that spreads itself by infecting files. Viruses are dangerous and can shut your computer down. While there are many ways to get a virus, the most common is through e-mail attachments.

Viruses

Page 18: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Worms also include malicious code. Worms work through networks. They travel through shared files and programs and can bring down an entire computer system.

Page 19: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Trojan Horse

Trojan Horses are another type of malicious code.

These are programs that claim to do one thing but actually do another when downloaded.

For example, you download a game to play but instead it wipes out your hard drive.

Page 20: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Here are ways you can keep your own computer safe, and make sure it doesn’t threaten other computers:

(1) Find out if your computer has a firewall. If not, ask your parents to make sure one is installed. A firewall protects information from entering your computer without your permission.

(2) Keep your computer updated (make sure updates are downloaded for your operating system regularly)

(3) Find out if your computer has virus protection software installed. If not, ask your parents to make sure they install virus protection software on your computer, keep it updated and USE it. This is very important!

Page 21: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

And just a couple more:

(4) Don’t open e-mails if you don’t know who they are from.

(5) Be careful when you see e-mail that has been forwarded “FW:” or if it has an attachment with the suffix of “.exe,” “.scr,” or “.vsb.”

(6) If you do want to open an attachment, scan it through the virus software first. Sometimes even your friends can pass on viruses unintentionally. To do this, save all attachments before opening them.

Page 22: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Acronyms:

BCNU Be Seeing You

BTW By the Way

FWIW For What it’s Worth

FAQ Frequently asked questions

F2F Face to Face

FYI For your information

ROTFL Rolling on the floor laughing

Emoticons:

:-) Smiley face/ Happy

;-) Wink

:-( Sad Face/ Unhappy

:-O Yelling

:-@ Screaming

Some Fun with Email

Page 23: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

I hope you learned something I know I did!

All right – let’s get into groups. Your teacher will divide you up for our next activity.

Page 24: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

All right – Everyone in Groups?

Good! Your task today is to create a brochure on e-mail etiquette and safety.

I’m going to help you out and show you how to get started.

Page 25: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Build a Brochure

Ok – Now you understand the concept of email along with some of its dangers.

In your small groups, return to (A) what you have learned and (B) your former brainstorm list. Using these items, you are to design a brochure on E-mail Etiquette and Safety. Brochures should be informative and creative. One simplified suggestion would be to have a Do and Don’t list.

Page 26: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

So Get Started!

Do your best on these brochures! Once you are finished your group will present your brochure to the rest of the class and discuss what you have learned.

Page 27: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

How Do you Know When You’re Done?

Have you:1. Completed your group brochure?2. Shared your brochure with your class?3. Discussed as a class what you have learned about email etiquette and

safety?

Page 28: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

It doesn’t have to end here!

Find out about DRiVE!

Page 29: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

Take ActionTake Action It’s Easy with the i-Mentor Training Network!

The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities you can do in your school and community.

To watch the videos go to the i-Mentor Network located in the X-BLOCK of the i-SAFE website at www.isafe.org.

Visit the X-BLOCK at www.isafe.org to learn about the i-Mentor Training Network. It’s all online!

Page 30: Cyber Security Level 5. Hey Everybody! My name is Tek. I ’ m going to be your guide today! I ’ m a part of i-SAFE, and we are concerned with helping you.

www.isafe.org

• Enroll online at www.isafe.org by clicking on Create an Account.

• Receive your own Student Toolkit and materials to get started.

Get the recognition you deserve Get the recognition you deserve as an i-SAFE Mentoras an i-SAFE Mentor

Take ActionTake Action