Wednesday, February 15, 2017

Hex 4-9: Digital Security


http://senior-learning.wikispaces.com/file/view/lesson4-art.png/278606920/645x363/lesson4-art.png

Part I: Dangers on the Internet

Activity: Are You Web Aware?

1-What are some possible dangers on the Internet?  Is the Internet a dangerous place?

2-When is it OK to share personal information online? What kinds of personal information are NOT OK to share?  What kinds of personal information are OK to share?

http://transmissionsmedia.com/wp-content/uploads/2012/11/DANGER-INTERNET-AHEAD-PROCEED-WITH-CAUTION.png

Video:  Friend or Fake

Guide to Social Networking 

Video: Think Before You Share (Top 10)

Things to Think About with Social Media:
-limit your friends list
-privacy settings/controls (check often)
-"privacy fatigue" (read privacy guidelines, know new features)
-malicious apps, phishing, malware (similar to email)
-future job hunting
   -These types of posts will impact future career plans the most: lifestyle; inappropriate materials (comments, photos, etc.) made by you OR your friends/relatives; comments criticizing your past jobs (employees, coworkers, clients, etc); membership in certain groups 
   -Positive online reputation will help
   -Do not disclose a username and password in an interview

HW: Internet Contract





Part II: Scams


http://www.planetminecraft.com/blog/minecrafr-frauds-thetruth/

1-What are some different ways that you can be digitally scammed?

2-What can you do to make sure that you are not a victim of a scam?

3-What advice would you give to adults (especially older adults) in your life that might be susceptible to scams?

Video: 
The Internet: Cybersecurity & Crime





Types: 
-malware (connected to flash drives, embedded in files, downloads, email attachments)
-pop-ups (scareware ["Your computer is infected"], malicious advertising/contests)
-spyware (record keystrokes, screenshots, video, audio, browsing)
-ransomware (hold computer hostage until you pay)
-backdoor (hidden access to computer, besides malware)
-public wifi ("listen" to others, rogue router [not the wifi you think you're connecting to], "shoulder surfing", theft [don't leave unattended])
-private wifi (piggybacking [unauthorized use on private wifi--slows speed, could be doing illegal activity or "listening", hackers share locations]; turn off if not in use [vacation])
-Identity theft

Video: Identity theft targets kids








Defense:
Data backup
Firewalls
Software patches
Antivirus software (only trust warnings from a legitimate source)
User knowledge/education
   -Do not click on unknown links! (hover over link)
   -Do not give personal/confidential information over the phone!
   -Phishing emails may use personalization or play on your emotions


Activity: Scams and Schemes

Kahoot: Digital Security


Part III: Sexting

1-What is sexting?  Why would someone do it?

2-What are some consequences of sexting?  
Consider child pornography before forwarding.

3-Do you think teens today feel pressured to sext?

4-What should you do if you receive an unwanted sext?




Part IV: Passwords

1-How frequently do you change your passwords?

2-What makes a good password?


Most Used Passwords
Source: Computer Security Literacy: Staying Safe in a Digital World


Source: Better Buys

 Source: Better Buys


Video: A World Beyond Passwords

Activity:  Creating a Good Password


Password Tester
(just for fun)


Part V: Digital Footprint/Misc.

1-Did you know websites/companies collect your personal information (cookies)?

2-What are some issues with leaks of government information (Wikileaks, Edward Snowden)?

3-What is a digital footprint?  What is on your digital footprint?



http://www.cybersmart.gov.au/Kids/Get%20the%20facts/~/media/Cybersmart/General%20Archive/Archive/digitalFootprint2.png

Video: Your Digital Footprint


Activity:  Privacy and Your Digital Footprint

No comments:

Post a Comment