Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules Social Networking Cyber Bullying
Understanding Cryptology Cryptology is the process of making and using codes to secure the exchange of information. Why is encryption important?
Encryption and Decryption The process of converting ordinary information into something that is unreadable is known as encryption. The method of reversing the encrypted message by reverting the unreadable text back into its original form is known as decryption. Encryption makes it hard to understand, and decryption makes it easy again!
FACT TIME
Cipher Methods A cipher is an algorithm for performing encryption or decryption. It is a series of well-defined steps that can be followed as a procedure. Example of a cipher method… Substitution Cipher Initial alphabet ABCDEFGHIJKLMNOP Encryption alphabet DEFGHIJKLMINOQRS
History 1900 B.C. - Hieroglyphics 1500 B.C. - Mesopotamia B.C. - ATBASH 487 B.C. - Skytale B.C. - Julius Caesar 1790’s - Thomas Jefferson WWII
FACT TIME
Https vs. Http Secure Socket Layer (SSL) & Transport Layer Security (TSL) –cryptographic protocols or set of rules) that provide security for communications over networks such as the Internet. HTTPS is secure –Uses SSL to secure the transfer of information HTTP is not secure
Identity Theft
FACT TIME
Social Networking Sites: Twitter MySpace Facebook YouTube
What are people posting? Too much information! –Birthday –Address –Phone Number –Status Updates –Future Events –Pictures
How does your profile represent you? How can it affect you? –Potential scholarships? –Future employers? –Future in-laws? Think about your online image –Who will see this? –What will they think?. **Assume that anything you put on the internet can be accessed later… It’s there FOREVER!
FACT TIME
Can it happen to you? Burleson High School in Texas Churubusco High School in Indianapolis Paramus High School in New Jersey
Social Networking Risks Do you personally know all of your “friends”? –what can be done with the information you display Do people really need to know what you’re doing 24/7?? FBI monitoring networking sites
Cyber Bullying Cyber bullying is using terminology to embarrass, humiliate, threaten, or intimidate another –Flaming: online fighting –Harassment: repeat messages –Impersonation: identity theft –Denigration: “dissing”, gossip, rumors –Stalking: repeat harassment and denigration Can lead to potential legal ramifications
FACT TIME
Protecting Your Identity Ever heard of… Spyware? –ExampleExample Malware? –ExampleExample Phishing? –ExampleExample Anti-virus software or Firewall?
Internet Safety Rules Protect your computer –Secure vs. unsecure networks Look for the lock (https) Bank Example –Up-to-date security software Protect your privacy & the privacy of others (friends and family) –Only give necessary information when required
Internet Safety Rules (cont.) Protect your password –Tips for strong secure passwords –Beware of shoulder surfers –Do not click “remember me” on public computers View all content critically
FACT TIME
Internet Safety Rules (cont.) Beware of contests, clubs, prizes, and gifts –Common scams –Do you really need an account? Beware of stranger danger –Cyber predators Dateline: Predator Don’t break the law –Cyber bullying –Plagiarism
Tips for Using Public Computers Always log out Don’t leave your computer unattended Erase your tracks Don’t save log-in information –Don’t click “remember me” Beware of shoulder snoops Don’t enter sensitive information –Key logging software
Game Time! Beware of Spyware Friend Finder ID Theft Faceoff Invasion of the Wireless Hackers Phishing Scams - Avoid the Bait The Case of the Cyber Criminal