Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How to protect yourself, your computer, and others on the internet
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Developed by Technology Services 1:1 Laptop Initiative
Part I: Making Good Online Choices
Forms of Cyberbullying
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Breaking Trust On The Internet
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Cyber bullying and internet safety Parents meeting: staying safe online.
Social media threats. Warning! May contain mild peril.
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
How to protect yourself Hacked Construction Sign: MIT, April 2007 at intersection of Vassar & Main Streets Information Security:
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
Internet Safety.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
Oswego School District 308 Internet Safety and Ethics Review Plank Jr. High – Tech 6 Mr. Brown.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 Facebook  Twitter  MySpace  Windows LiveSpace.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Everyday Cyber Security April 27 th Why Should You Care? Ensuring your privacy and security Protecting yourself and others Practicing safe internet.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Digital Citizenship Created By: Kelli Stinson June 2011.
1. ONLINE. Bullying behaviour is no longer restricted to the school yard. It is often online, out of sight and earshot of teachers and parents.... ONLINE.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
Berkeley Unified School District Cyber Savvy social networking and netiquette.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
Internet Safety - Social Networking Jason Loveall.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Oswego School District 308 Internet Safety and Ethics Review Plank Jr. High – Tech 6 Mr. Brown.
Internet Dangers Technology Communication Tools E-Literate.
ThinkB4uClick A Smart Guide to Internet Safety. Dumb Ideas Stay off the Internet Don’t have a Facebook page Never use Twitter Don’t Never post.
Julie Latham Digital Citizenship: An Informational Guide.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Safety.
Remember cyber Bullying can also lead to death!!!
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Information Security Awareness 101
Bethesda Cybersecurity Club
Internet Safety – Social Media
Presentation transcript:

Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules Social Networking Cyber Bullying

Understanding Cryptology Cryptology is the process of making and using codes to secure the exchange of information. Why is encryption important?

Encryption and Decryption The process of converting ordinary information into something that is unreadable is known as encryption. The method of reversing the encrypted message by reverting the unreadable text back into its original form is known as decryption. Encryption makes it hard to understand, and decryption makes it easy again!

FACT TIME

Cipher Methods A cipher is an algorithm for performing encryption or decryption. It is a series of well-defined steps that can be followed as a procedure. Example of a cipher method… Substitution Cipher Initial alphabet ABCDEFGHIJKLMNOP Encryption alphabet DEFGHIJKLMINOQRS

History 1900 B.C. - Hieroglyphics 1500 B.C. - Mesopotamia B.C. - ATBASH 487 B.C. - Skytale B.C. - Julius Caesar 1790’s - Thomas Jefferson WWII

FACT TIME

Https vs. Http Secure Socket Layer (SSL) & Transport Layer Security (TSL) –cryptographic protocols or set of rules) that provide security for communications over networks such as the Internet. HTTPS is secure –Uses SSL to secure the transfer of information HTTP is not secure

Identity Theft

FACT TIME

Social Networking Sites: Twitter MySpace Facebook YouTube

What are people posting? Too much information! –Birthday –Address –Phone Number –Status Updates –Future Events –Pictures

How does your profile represent you? How can it affect you? –Potential scholarships? –Future employers? –Future in-laws? Think about your online image –Who will see this? –What will they think?. **Assume that anything you put on the internet can be accessed later… It’s there FOREVER!

FACT TIME

Can it happen to you? Burleson High School in Texas Churubusco High School in Indianapolis Paramus High School in New Jersey

Social Networking Risks Do you personally know all of your “friends”? –what can be done with the information you display Do people really need to know what you’re doing 24/7?? FBI monitoring networking sites

Cyber Bullying Cyber bullying is using terminology to embarrass, humiliate, threaten, or intimidate another –Flaming: online fighting –Harassment: repeat messages –Impersonation: identity theft –Denigration: “dissing”, gossip, rumors –Stalking: repeat harassment and denigration Can lead to potential legal ramifications

FACT TIME

Protecting Your Identity Ever heard of… Spyware? –ExampleExample Malware? –ExampleExample Phishing? –ExampleExample Anti-virus software or Firewall?

Internet Safety Rules Protect your computer –Secure vs. unsecure networks Look for the lock (https) Bank Example –Up-to-date security software Protect your privacy & the privacy of others (friends and family) –Only give necessary information when required

Internet Safety Rules (cont.) Protect your password –Tips for strong secure passwords –Beware of shoulder surfers –Do not click “remember me” on public computers View all content critically

FACT TIME

Internet Safety Rules (cont.) Beware of contests, clubs, prizes, and gifts –Common scams –Do you really need an account? Beware of stranger danger –Cyber predators Dateline: Predator Don’t break the law –Cyber bullying –Plagiarism

Tips for Using Public Computers Always log out Don’t leave your computer unattended Erase your tracks Don’t save log-in information –Don’t click “remember me” Beware of shoulder snoops Don’t enter sensitive information –Key logging software

Game Time! Beware of Spyware Friend Finder ID Theft Faceoff Invasion of the Wireless Hackers Phishing Scams - Avoid the Bait The Case of the Cyber Criminal