+ All Categories
Home > Technology > Cyber Safety Presentation to Hadley Farms Middle School - April 2013

Cyber Safety Presentation to Hadley Farms Middle School - April 2013

Date post: 28-Nov-2014
Category:
Upload: steve-peterson
View: 486 times
Download: 1 times
Share this document with a friend
Description:
 
37
Cyber Safety Presentation for Hadley Farms Steve Peterson, President Montgomery County Community Emergency Response Team www.montgomerycert.org
Transcript
  • 1. CyberSafetyPresentationforHadleyFarms StevePeterson,President MontgomeryCountyCommunityEmergencyResponseTeam www.montgomerycert.org
  • 2. Introduction HowmanyofyouliketousetheInternet? Howmanyofyouuseiteveryday? WherearesomeplacesyouusetheInternetregularly? Whatkindsofthingsdoyouregularlydowhenusingthe Internet? Wheredoyoukeepthecomputer? Doyouhavespecialrulesforusingthecomputerandthe Internet? Whataresomeofthoserules?
  • 3. Cyberbullying Cyberbullyingistheelectronicpostingofmeanspiritedmessagesaboutaperson, oftendoneanonymously
  • 4. Cyberbullying UsingtheInternettospreadgossip,tobullysomeone,or damagetheirreputationishurtful Onlydoandsaythingsonlinethatyouwouldhavedoneuntoyou Speakup!Ifsomethingorsomeoneonlinemakesyoufeel uncomfortable,youhavetherighttonot respond,deletea post,andmostimportantlytellatrustedadult Dontstandforbullyingonlineoroff 1 OnGuardOnline.gov
  • 5. Cyberbullying thelawshavestarted catchingup SteveChaikin,headof communityprosecutionforthe MontgomeryCountyStates AttorneysOffice April10,2013GermantownGazette Thisisinresponseto studentsandyoungpeople whotormentothersonline
  • 6. CyberPredators Peoplewhosearchonlineforotherpeopleinordertouse,control,orharm theminsomeway
  • 7. CyberPredators Sharingpersonalinformationwithpeopleyouviewas"friends" (online)isrisky Keeppersonalinformationaboutyourselfprivate,including yourfamilymembers,yourschoolname,yourpasswords,your telephonenumber,youraddress,orotherprivateinformation Example:MantiTe'o FootballplayerattheUniversityofNotreDame andanacquaintancewhoorchestratedahoaxandluredTe'o intoan onlinerelationshipwithanonexistentwoman;however,thephotosused forthenonexistentwomanwerereal Nevermeetinpersonwithsomeoneyoumetonline
  • 8. IdentityTheft Theillegaluseofsomeoneelse'spersonalinformationinordertoobtain moneyorcredit
  • 9. Questions Everyyear,howmanykidshavetheiridentitystolen? Areyouwillingtosharepersonalinformationonlineabout yourselfandyourfamilyinexchangeforgoodsandservice? 1 IdentityTheftResourceCenter 2 eMarketer 500,000identitiesstolenperyear 75%ofkidsarewillingtoshareinfo
  • 10. HowIdentityTheftMightHappenThrough SocialMedia Usinglowprivacyornoprivacysettings Acceptinginvitationstoconnectfromunfamiliarpersons Downloadingfreeapplicationsforuseonyourprofile Givingyourpasswordorotheraccountdetailstopeopleyouknow Participatinginquizzes(e.g.Howwelldoyouknowme?)which mayrequireyoutodivulgealotofpersonalinformation Clickingonlinksthatleadyoutootherwebsites,evenifthelink wassenttoyoubyafriendorpostedonyourfriendsprofile Fallingforemailscams(phishing)thatasktoupdateyoursocial networkingprofiles IdentityTheftResourceCenter http://www.idtheftcenter.org
  • 11. Example Amanreceivesamessagefromoneofhisfriendswhichhasa linktoafunnyvideo,soheclicksonit.Thelinkdoesnotbring upavideo.Thefriendsprofilehadbeenhacked,andnowa formofmalicioussoftwareisbeingdownloadedontothemans computerasaresultofhimclickingthelink.Thissoftwareis designedtoopenawayforanidentitythieftotakepersonal informationfromthemanssystem.Itadditionallysendsa similaremailtoeverybodyheisconnectedwithonhisprofile, askingthemtoviewthevideo.Downloadingfreeapplications andsoftwarecanbesourcesofthistypeofmalicioussoftware, too.
  • 12. Phishing Ascambywhichanemailuserisdupedintorevealingpersonalor confidentialinformationthatthescammercanuseillicitlyorfraudulently
  • 13. 68%ofteenssurveyedsaytheyhave1 79%2 PhishingQuiz Haveyoudownloadedaprogramorsoftwarewithoutyour parent'sorguardianspermission? Whatpercentageofonlineteenagersagreethatteensarent carefulenoughwhensharingpersonalinformationonline? 1 IdentityTheftResourceCenter 2 PewInternetandAmericanLifeProject
  • 14. PhishingTips Mostorganizationsdonotaskforyourpersonalinformation overemail Bewareofrequeststoupdateorconfirmyourpersonalinformation Donotopenemailsfromstrangersanddonotclickon unfamiliarsites Ifyouthinkanofferistoogoodtobetrue,thenitprobablyis Example:GetafrEeipAdbuyclikingthislynk. Makesureyouchangeyourpasswordsoften Avoidusingthesamepasswordonmultiplesites AlwaysenteraURLbyhandinsteadoffollowinglinks
  • 15. TrustworthyandCredible Thequalityofbeingbelievableorworthyoftrust
  • 16. TrustedSource Whyisitimportanttomake surealinkisfromatrusted source? Cantwejustclickandifits notwhatwewantor thoughtitwouldbe,justgo back?
  • 17. WhatKindofFilesDoYouDownload? Videogamesand instructions Movies/Video Songs Books Reports Slideshow presentations Photos Graphics Freescreensavers Animations Ringtones Software
  • 18. Question Whatshouldmakeyoususpiciousthatalinkcouldcause trouble? Amessageclaimingyouvewonabigprizeoranofferthatseemstoo goodtobetrueisalwayssuspicious Inwhatothersituationsshouldyoutostopandnotclick?
  • 19. SuspiciousLinks Linksfromsomeoneyoudontknow Linksthatexcitedlytellyoutotakeurgentaction Linksinchainletters Linksinmessagesthatjustlookweird Linksinamessagethatisclearlyspam(junkmail) Linkswithinmessagesthatusebadgrammarorawkward phrasingormisspellings PreparedbyCyberSmartEducationfortheNationalCyberSecurityAlliance.www.StaySafeOnline.org
  • 20. SuspiciousLinks Linksfromafriendorstrangerclaiminghe/sheisintroubleand askingthatyousendmoney Linkstoapageaskingyouforanypersonalinformation,suchas yourpassword Linksinmessagesthatappeartobefromafavoritestore, askingyoutoupdateyouraccount(Reputablecompaniesnever dothis.) Linksonasocialnetworkingsitethatsaywatchthisfunny videoofyou Linksinmessagesthattellyoutoopenanattachment PreparedbyCyberSmartEducationfortheNationalCyberSecurityAlliance.www.StaySafeOnline.org
  • 21. NoteverythingseenontheInternetistrue
  • 22. Consequences Themorality(rightorwrong)ofanactisdeterminedbyitseffects
  • 23. TakeResponsibility Postinginappropriatecomments/photosonsocialmediasites, suchasTwitterandFacebookmayleadtounintendedor unknownconsequences Suspension Lossofemployment Arrest Thinktwicebeforeyoupostorsayanythingonline;once itisonsocialmediasitesitisthereforever Itispermanentlystoredsomewhere regardlessofwhetheryou deleteit
  • 24. TakeResponsibility Whyshouldyounotpostinformationonlinewhereyouare located? Observantcriminalswouldknowyouarenothome burgulary CyberPredatorswouldknowwhereyouarelocated
  • 25. CyberSecurity Measurestakentoprotectacomputerorcomputersystemagainst unauthorizedaccessorattack
  • 26. SecurityTools Theyareavailableforyoutousetofurtherprotectyourself, yourpersonalinformation,andcomputerfromviruses, spyware,andspam
  • 27. WhichPasswordisStronger? A1b2c3d4 R4c7x3E1f
  • 28. WhichPasswordisStrongest? Go!jets#1!! Applesauce1212** M^s1ster|$alw4ysf1ne!
  • 29. Question Whyisapasswordstrongerwhenwecombineupperandlower caselettersANDnumbersANDsymbols? A O L B T @ Number0 ! 6 +
  • 30. Dangers Understandthedangersofsharingyourinformation(pictures, locations,status,etc.)online Itcanbeusedagainstyoubythosewhowishtodoharm Itcanbeusedagainstyouinacourtoflaw Itcanbeusedagainstyouinschool Whathashappenedtootherkidsthathavehadtheir passwordsstolenorsharedthemwiththeirfriends?
  • 31. StopandThink Beforeyourepost/retweetamessage,stopandaskyourself thesequestions: Whogeneratedtheinformationwithinthistweet? WillIharmsomeonebyreposting/retweetingthisinformation? Isthisinformationgossip?
  • 32. Resources
  • 33. AvailableResources OnguardOnline.gov Aonestopshopforonlinesafetyresourcesavailabletoparents, educators,andkidsrunbytheFederalTradeCommission Cybertipline.com Receivesonlinechildsolicitationreports24hoursaday,sevendaysa week.Submitanonlinereportorcall18008435678 PartoftheNationalCenterforMissingandExploitedChildren Staysafeonline.org Offersinstructiononsecurityupdates,freeantivirussoftware,malware softwareremoval,andotherservicesrunbyTheNationalCyber SecurityAlliance
  • 34. ThankYou!Questions?

Recommended