Presentation is loading. Please wait.

Presentation is loading. Please wait.

Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.

Similar presentations


Presentation on theme: "Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules."— Presentation transcript:

1

2 Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules Social Networking Cyber Bullying

3 Understanding Cryptology Cryptology is the process of making and using codes to secure the exchange of information. Why is encryption important?

4 Encryption and Decryption The process of converting ordinary information into something that is unreadable is known as encryption. The method of reversing the encrypted message by reverting the unreadable text back into its original form is known as decryption. Encryption makes it hard to understand, and decryption makes it easy again!

5 FACT TIME

6 Cipher Methods A cipher is an algorithm for performing encryption or decryption. It is a series of well-defined steps that can be followed as a procedure. Example of a cipher method… Substitution Cipher Initial alphabet ABCDEFGHIJKLMNOP Encryption alphabet DEFGHIJKLMINOQRS

7 History 1900 B.C. - Hieroglyphics 1500 B.C. - Mesopotamia B.C. - ATBASH 487 B.C. - Skytale B.C. - Julius Caesar 1790’s - Thomas Jefferson WWII

8 FACT TIME

9 Https vs. Http Secure Socket Layer (SSL) & Transport Layer Security (TSL) –cryptographic protocols or set of rules) that provide security for communications over networks such as the Internet. HTTPS is secure https://www.wellsfargo.com –Uses SSL to secure the transfer of information HTTP is not secure

10 Identity Theft

11 FACT TIME

12 Social Networking Sites: Twitter MySpace Facebook YouTube

13 What are people posting? Too much information! –Birthday –Address –Phone Number –Status Updates –Future Events –Pictures

14 How does your profile represent you? How can it affect you? –Potential scholarships? –Future employers? –Future in-laws? Think about your online image –Who will see this? –What will they think?. **Assume that anything you put on the internet can be accessed later… It’s there FOREVER!

15 FACT TIME

16 Can it happen to you? Burleson High School in Texas Churubusco High School in Indianapolis Paramus High School in New Jersey

17 Social Networking Risks Do you personally know all of your “friends”? –what can be done with the information you display Do people really need to know what you’re doing 24/7?? FBI monitoring networking sites

18 Cyber Bullying Cyber bullying is using terminology to embarrass, humiliate, threaten, or intimidate another –Flaming: online fighting –Harassment: repeat messages –Impersonation: identity theft –Denigration: “dissing”, gossip, rumors –Stalking: repeat harassment and denigration Can lead to potential legal ramifications

19 FACT TIME

20 Protecting Your Identity Ever heard of… Spyware? –ExampleExample Malware? –ExampleExample Phishing? –ExampleExample Anti-virus software or Firewall?

21 Internet Safety Rules Protect your computer –Secure vs. unsecure networks Look for the lock (https) Bank Example –Up-to-date security software Protect your privacy & the privacy of others (friends and family) –Only give necessary information when required

22 Internet Safety Rules (cont.) Protect your password –Tips for strong secure passwords –Beware of shoulder surfers –Do not click “remember me” on public computers View all content critically

23 FACT TIME

24 Internet Safety Rules (cont.) Beware of contests, clubs, prizes, and gifts –Common scams –Do you really need an account? Beware of stranger danger –Cyber predators Dateline: Predator Don’t break the law –Cyber bullying –Plagiarism

25 Tips for Using Public Computers Always log out Don’t leave your computer unattended Erase your tracks Don’t save log-in information –Don’t click “remember me” Beware of shoulder snoops Don’t enter sensitive information –Key logging software

26 Game Time! Beware of Spyware Friend Finder ID Theft Faceoff Invasion of the Wireless Hackers Phishing Scams - Avoid the Bait The Case of the Cyber Criminal


Download ppt "Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules."

Similar presentations


Ads by Google