Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University

Size: px
Start display at page:

Download "Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University"

Transcription

1 5-E Classroom STEM Activity: ETHICAL HACKING: HOW LONG DOES IT TAKE TO BREAK YOUR PASSWORD? Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University

2 CYBER SECURITY // HOW TO PROTECT YOURSELF FROM HACKERS DON T BE A VICTIM! Are you taking the STEM Type quiz? HOW TO PROTECT YOURSELF FROM HACKERS HACKERS ARE BECOMING MORE ADVANCED AND EVERYONE IS AT RISK. BY STEPHANIE PETIT Ever get an from a friend with a weird link? Or saw a friend start posting strange tweets? They probably got hacked and it can happen to you, too. Here s how to protect yourself from these hackers. STEM JOBS // LATE FALL 04 // STEMJOBS.COM

3 USE DIFFERENT PASSWORDS Most people use one or two passwords for all of their accounts, but that makes it easy for hackers if one password is revealed, they suddenly have access to your , bank account, social media accounts and more. It may be a little harder to remember different passwords for different accounts, but it s also harder to hack. It also doesn t hurt to change your passwords every few months. MAKE PASSWORDS LONG AND COMPLEX ABC or password isn t going to cut it. Use upper and lower case letters, numbers and symbols in your passwords so that they aren t guessed easily. The length of your password is also important. Hackers use programs that sort through combinations of letters and numbers at lightning speed. Longer passwords mean more work for hacking software and hackers generally want quick results. USE AND UPDATE ANTIVIRUS SOFTWARE There are many good antivirus programs out there that protect you from 95 percent of the danger that s out there. A free one is Microsoft Security Essentials. It provides protection from spyware, malware and viruses. BE CAREFUL WHERE YOU CLICK Never open an if you don t know the sender especially not attachments. Be suspicious if a friend appears to have sent you an with no subject line, a subject line that only says RE or FW or is uncharacteristically vague or brief like Hey. It may be a good idea to call them and ask if they sent the . Also, don t click links that promise prizes or free things like movies it s tempting, and that s why hackers use them, but they re not legit. It s sad that these people are using their computer skills in all the wrong ways you can actually get paid to hack. Jobs for ethical hackers are increasing because businesses and government-related organizations want to ensure their networks, applications and computer systems are strong enough to prevent theft and fraud. It pays well, too! In your first years as an ethical hacker, you can earn anywhere from $50,000 to $00,000 per year depending on the company that hires you, your IT experience and education. With several years of professional experience, you could command $0,000 or more per year. And the big bonus no risk of jail time like those not-so-ethical hackers. Potential ethical hackers should start by earning a A+ Certification and getting experience in a tech support position. After some experience and additional certification such as Network+ or CCNA, move up to a network support or admin role and then to network engineer after a few years. Earn security certifications and eventually work toward the Certified Ethical Hacker (CEH) certification offered by the International Council of Electronic Commerce Consultants. Along with these skills and certifications, you ll need a strong work ethic, good problem-solving skills and the ability to say motivated. Even with your skills, remember to never intrude anyone s network without their permission not even your ex-boyfriend or girlfriend. STEMJOBS.COM // LATE FALL 04 // STEM JOBS

4 ETHICAL HACKING: HOW LONG DOES IT TAKE TO BREAK YOUR PASSWORD? Here are some ideas for how high school teachers could use this story as a launching point for integrated STEM learning. Our activities follow the 5-E Learning Cycle Model, and the activity below is intended to last three to four one-hour class periods (although portions of the activity could be used in shorter time periods). Part : Engage 4 Ask students: What do you think the most common passwords that people use are? Why is it a bad idea to use a really common password? Why is it a bad idea to use the same password for multiple websites? Show students the 5 most common passwords on the following site: cbsnews.com/news/the-5-most-common-passwords-of-0. Have students read the STEM Jobs SM article How to Protect Yourself from Hackers. Ask students if they ve ever had to create a password for a website that had particular requirements for the password (e.g., has to have a certain number of characters, has to have symbols, etc.). What are the pros and cons of a website requiring a complicated password? Ask students: What mathematical concepts could we use to figure out how difficult a password is to break? For instance, how could we figure out how much harder it is to break a six-character password compared to a seven-character password? Students should hopefully discuss probability and permutations here. Part : Explore Show students the following scenario on a worksheet or on the projector: You are being interviewed for a job as an ethical hacker, and as part of your interview you have to break into a secure website in a limited time period. You have the choice of four websites you can try to hack. Which website would you choose? A. A website that requires a password consisting of seven characters which must be numbers and lowercase letters. B. A website that requires a password consisting of six characters that must be uppercase letters, lowercase letters, numbers and the symbols above the numerical keys on a typical keyboard. C. A website that requires a seven-character password of upper and lowercase letters and numbers, but where no character can be repeated. D. A website that requires a 0-character password of upper and lowercase letters and numbers, where no character can be repeated and the order of the characters does not matter (i.e., if the password was set as , the system would also accept as correct). Work in groups and be ready to provide a mathematical argument for why your choice is the best one. Have students discuss with partners and make an initial prediction about which of the four options they feel would be easiest to hack, then have a class discussion where students give their prediction and their reasoning for choosing that option. Have students work in groups to use the mathematical concepts of combination and permutation to figure out which of the four websites would be the best choice (note: students will need a calculator capable of handling large numbers). STEMjobs.com Ethical Hacking: How Long Does It Take to Break Your Password?

5 Part : Explain 4 See a review of combinations and permutations here if needed: mathsisfun.com/combinatorics/combinations-permutations.html. Have each student group give their choice and discuss the mathematical reasoning they used to provide evidence that their choice was the best one. Project student work on the overhead and discuss concepts of combinations and permutations, and how the formulas change when repetition is allowed or not allowed. Have students revisit their predictions and rate how well their intuition about the best option matched their actual calculations. If their prediction was far off, have them come up with an explanation why. Engage students in a discussion of what password requirements they typically see on sites they go to, and what other security procedures sites use, other than having particular requirements for passwords (e.g., use SiteKeys, track if you re logging on from a different device, have security questions, ask you to enter characters from a picture). Part 4: Elaborate 4 Ask students: How many password tries do you think hacking software can make every second? Have students read the following article: zdnet.com/article/cheap-gpus-are-rendering-strong-passwords-useless. Tell students: The article we just read says that a CPU (Central Processing Unit) can make 9.8 million password guesses per second. On a GPU (Graphics Processing Unit), however, the rate is. billion passwords per second. In their groups, have students respond to the following prompt: For the CPU and for the GPU, on average, how long would it take you to guess the password that you chose for your ethical hacking interview? (See Explore phase above.) What is the range of times it would take to guess the password? Extension: If your hacking software guessed the words in the English dictionary first, and the password was a word in the dictionary, how long would it take to crack the password? Part 5: Evaluate Have students work on the following problems individually in their math journals: You re designing a new social media website, and you want to balance password security with the users being able to easily access the site. What security measures would you put in place with respect to users logging in? Use mathematical reasoning to support your response. You re designing a new banking website, and you want to balance password security with the users being able to easily access the site. What security measures would you put in place with respect to users logging in? Use mathematical reasoning to support your response. Standards: CCSS.Math.Content.HSS.CP.B.9. Use permutations and combinations to compute probabilities of compound events and solve problems. CCSS.Math.Practice.MP. Construct viable arguments and critique the reasoning of others. STEMjobs.com Ethical Hacking: How Long Does It Take to Break Your Password?

6 STEMjobs.com

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

THE LITTLE BIG BOOK OF BADNESS

THE LITTLE BIG BOOK OF BADNESS THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

6th Grade Lesson Plan: Probably Probability

6th Grade Lesson Plan: Probably Probability 6th Grade Lesson Plan: Probably Probability Overview This series of lessons was designed to meet the needs of gifted children for extension beyond the standard curriculum with the greatest ease of use

More information

Relative and Absolute Change Percentages

Relative and Absolute Change Percentages Relative and Absolute Change Percentages Ethan D. Bolker Maura M. Mast September 6, 2007 Plan Use the credit card solicitation data to address the question of measuring change. Subtraction comes naturally.

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Set up an email account with Hotmail

Set up an email account with Hotmail Set up an email account with Hotmail *This guide was last updated 18 April 2011. Please note that the real system and process may differ from this guide. 1 1. Get started Hotmail is an email service provided

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

PEER PRESSURE TEACHER S GUIDE:

PEER PRESSURE TEACHER S GUIDE: TEACHER S GUIDE: PEER PRESSURE LEARNING OBJECTIVES Students will be able to identify peer pressure as both a positive and negative force. Students will understand how peer pressure impacts everyone. Students

More information

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015 Computer Network and Internet Security Awareness and Responsible Use Indian River County School District 2014-2015 1 Through the availability of electronic resources provided by the School District of

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

The Windows Command Prompt: Simpler and More Useful Than You Think

The Windows Command Prompt: Simpler and More Useful Than You Think The Windows Command Prompt: Simpler and More Useful Than You Think By Ryan Dube When most people think of the old DOS command prompt window that archaic, lingering vestige of computer days gone by they

More information

Fraud Protection module

Fraud Protection module Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning

More information

Could you spot a scammer?

Could you spot a scammer? Could you spot a scammer? Keeping you safe and secure Fraud can affect anyone whatever your background, age or experience And attempts can come in all shapes and sizes over the phone, on the internet or

More information

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs

More information

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 1 Objectives What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 2 What is Cloud Computing? Not single, agreed upon definition exists yet,

More information

A QUICK AND EASY GUIDE TO ONLINE BANKING AND BILL PAY

A QUICK AND EASY GUIDE TO ONLINE BANKING AND BILL PAY A QUICK AND EASY GUIDE TO ONLINE BANKING AND BILL PAY BY PAUL A. MURPHY, AUTHOR OF BANKING ONLINE FOR DUMMIES A Quick and Easy Guide to Online Banking and Bill Pay Disclaimer Concepts, strategies and procedures

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Joseph in Egypt. Genesis 39:2-3 the LORD was with Joseph and gave him success in everything he did.

Joseph in Egypt. Genesis 39:2-3 the LORD was with Joseph and gave him success in everything he did. Joseph in Egypt Teacher Pep Talk: Joseph s brothers had seen their chance to get rid of him and they did. They sold him into slavery in Egypt. But the LORD was with Joseph in Egypt and gave him success

More information

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Tom wants to find two real numbers, a and b, that have a sum of 10 and have a product of 10. He makes this table.

Tom wants to find two real numbers, a and b, that have a sum of 10 and have a product of 10. He makes this table. Sum and Product This problem gives you the chance to: use arithmetic and algebra to represent and analyze a mathematical situation solve a quadratic equation by trial and improvement Tom wants to find

More information

NTFS permissions represent a core part of Windows s security system. Using

NTFS permissions represent a core part of Windows s security system. Using bonus appendix NTFS Permissions NTFS permissions represent a core part of Windows s security system. Using this feature, you can specify exactly which coworkers are allowed to open which files and folders

More information

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4 Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will

More information

It may look like this all has to do with your password, but that s not the only factor to worry about.

It may look like this all has to do with your password, but that s not the only factor to worry about. Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter).

More information

Finding the last cell in an Excel range Using built in Excel functions to locate the last cell containing data in a range of cells.

Finding the last cell in an Excel range Using built in Excel functions to locate the last cell containing data in a range of cells. Finding the last cell in an Excel range Using built in Excel functions to locate the last cell containing data in a range of cells. There are all sorts of times in Excel when you will need to find the

More information

Are You A Sitting Duck?

Are You A Sitting Duck? The 7 Most Cricitcal I.T. Security Protections Every Business Must Have in Place Now to Protect Themselves from Cybercrime, Data Breaches, and Hacker Attacks Cybercrime is at an all-time high, and hackers

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

Hector s World Lesson plan Episode: Computer security: Oops Upper primary

Hector s World Lesson plan Episode: Computer security: Oops Upper primary Hector s World Lesson plan Episode: Computer security: Oops Upper primary BACKGROUND Students of this age are emerging users of internet-enabled computers. They may be involved in a range of online activities

More information

Joomla Admin Protection

Joomla Admin Protection Joomla Admin Protection We congratulate you on installation of our plug-in that will not only help you to protect your website but will also make your work with CMS much easier and secure. Our plug-in

More information

Easy Casino Profits. Congratulations!!

Easy Casino Profits. Congratulations!! Easy Casino Profits The Easy Way To Beat The Online Casinos Everytime! www.easycasinoprofits.com Disclaimer The authors of this ebook do not promote illegal, underage gambling or gambling to those living

More information

Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests

Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests Wider interests Use this document with the glossary Beginner s guide to Money and shopping 8.1 Online banking This activity will help you register to bank online and get you started with your online banking

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Version 2 January 2015

Version 2 January 2015 Version 2 January 2015 IT SUPPORT HANDBOOK FOR BYO DEVICES 2015 INSTALLING SOFTWARE... 1 Microsoft Office... 1 Setting up Office preferences... 5 Setting up your College email account for the first time

More information

Grade 2 Lesson 3: Refusing Bullying. Getting Started

Grade 2 Lesson 3: Refusing Bullying. Getting Started Getting Started Lesson Concepts You can refuse to let bullying happen to you or to others. Being assertive is one way to refuse bullying. Key Words Refuse, assertive Objectives Students will be able to:

More information

The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for

The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for The 5 P s in Problem Solving 1 How do other people solve problems? The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation *solve: to find a solution, explanation, or answer

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

things you haven t done to protect your business from cybercrime

things you haven t done to protect your business from cybercrime 5 things you haven t done to protect your business from cybercrime 5 things you can do to protect your business from cybercrime 27,000,000,000 27billion is a big number and is what the UK government estimates

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

Online financial transactions be savvy and safe. Lesson description. Enduring understanding/deep learnings: Year level: Year 9 and 10

Online financial transactions be savvy and safe. Lesson description. Enduring understanding/deep learnings: Year level: Year 9 and 10 Online financial transactions be savvy and safe Year level: Year 9 and 10 Duration: 60 minutes (lesson 1 of 2 connecting lessons) Key learning area: English, Mathematics, *Economics and business Lesson

More information

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise instead of the preposition. Your partner can guess the

More information

Chapter 2. Making Shapes

Chapter 2. Making Shapes Chapter 2. Making Shapes Let's play turtle! You can use your Pencil Turtle, you can use yourself, or you can use some of your friends. In fact, why not try all three? Rabbit Trail 4. Body Geometry Can

More information

Why should I back up my certificate? How do I create a backup copy of my certificate?

Why should I back up my certificate? How do I create a backup copy of my certificate? Why should I back up my certificate? You should always keep a backup copy of your ACES Business Certificate on a location external to your computer. Since it s stored locally on your computer, in the Windows

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Persuasive. How to Write Persuasive. Social Media Proposals

Persuasive. How to Write Persuasive. Social Media Proposals Persuasive Social Media Proposals How to Write Persuasive Social Media Proposals How to Write Persuasive Social Media Proposals! You got started in social media because you wanted to connect with people

More information

Society tells us otherwise. Our broke family and friends tell us otherwise.

Society tells us otherwise. Our broke family and friends tell us otherwise. Breaking the Bondage of Debt Text: Proverbs 22:7 I. Intro a. You can t believe everything you hear. Think about it for a second: Who taught you that borrowing money was a good idea? i. Was it your broke

More information

Mobile Banking Frequently Asked Questions

Mobile Banking Frequently Asked Questions Registration and Activation FAQs Why do I have to register my phone? Mobile devices must be enrolled to use First Federal Lakewood in order to securely validate that only your device has access to your

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Chapter 28: Expanding Web Studio

Chapter 28: Expanding Web Studio CHAPTER 25 - SAVING WEB SITES TO THE INTERNET Having successfully completed your Web site you are now ready to save (or post, or upload, or ftp) your Web site to the Internet. Web Studio has three ways

More information

T H E L E G I S L A T I V E B R A N C H

T H E L E G I S L A T I V E B R A N C H T H E L E G I S L A T I V E B R A N C H Introduce students to the legislative branch in one class period with this easy lesson plan. First, kick students off with our optional sponge activity while you

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

WHITE PAPER The Five Step Guide to Better Social Media Security

WHITE PAPER The Five Step Guide to Better Social Media Security WHITE PAPER The Five Step Guide to Better Social Media Security A Hootsuite White Paper The Five Step Guide to Better Social Media Security A Hootsuite White Paper In 2013, not a single month went by without

More information

SPIN Selling SITUATION PROBLEM IMPLICATION NEED-PAYOFF By Neil Rackham

SPIN Selling SITUATION PROBLEM IMPLICATION NEED-PAYOFF By Neil Rackham SITUATION PROBLEM IMPLICATION NEED-PAYOFF By Neil Rackham 1. Sales Behavior and Sales Success Small Sales Selling Techniques The traditional selling techniques that most of us have been trained to use

More information

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams Advance Fee Loans Scam artists can trick you into paying money to qualify for a loan or credit card. Despite their guarantees, you do not receive a loan, credit card, or any money. Never pay money to qualify

More information

Why is it important?

Why is it important? Keeping safe online Why is it important? The obvious reason avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Viruses, Worms, and Trojan Horses

Viruses, Worms, and Trojan Horses Viruses, Worms, and Trojan Horses Be a Power Reader Make Personal Connections As you read this article, think to yourself, How can I apply this knowledge? How will what I m learning be useful to me? You

More information

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware. Activities for Protecting Your Identity and Computer for Elementary and Middle School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these

More information

Songwriting. Geniuses. for. 25 Tips for the Genius in Everyone. By Gene Burnett

Songwriting. Geniuses. for. 25 Tips for the Genius in Everyone. By Gene Burnett Songwriting for Geniuses 25 Tips for the Genius in Everyone By Gene Burnett Songwriting for Geniuses iii Introduction This little book is entitled Songwriting For Geniuses and is comprised of various tips

More information

Reading Strategies by Level. Early Emergent Readers

Reading Strategies by Level. Early Emergent Readers The charts below were created as a common language for teachers and students in the Wallingford Public Schools in kindergarten through eighth grade. The level of the chart selected for use in the classroom

More information

Q: What types of businesses/industries can benefit from the SBA loan programs? A: Most small owner-operated business can benefit from SBA loans

Q: What types of businesses/industries can benefit from the SBA loan programs? A: Most small owner-operated business can benefit from SBA loans Interview with Alan Thomes, President, SBA Loan Division State Bank and Trust Company For many new start-ups and small businesses, an SBA loan may be an appropriate form of financing. In this interview

More information

Protecting Yourself From Identity Theft

Protecting Yourself From Identity Theft Protecting Yourself From Identity Theft We re hearing a lot more about identity theft these days from hackers stealing credit card numbers from big banks and retail stores to individuals opening up credit

More information

PaymentNet Federal Card Solutions Cardholder FAQs

PaymentNet Federal Card Solutions Cardholder FAQs PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How

More information

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice

Don t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail

More information

Activities for Protecting Your Identity and Computer for Middle and High School Students

Activities for Protecting Your Identity and Computer for Middle and High School Students Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be

More information

The Concept of Present Value

The Concept of Present Value The Concept of Present Value If you could have $100 today or $100 next week which would you choose? Of course you would choose the $100 today. Why? Hopefully you said because you could invest it and make

More information

How To Proofread

How To Proofread GRADE 8 English Language Arts Proofreading: Lesson 6 Read aloud to the students the material that is printed in boldface type inside the boxes. Information in regular type inside the boxes and all information

More information

CYBERBULLYING TEACHER S GUIDE:

CYBERBULLYING TEACHER S GUIDE: TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies

More information

VoipSwitch Security Audit

VoipSwitch Security Audit VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has

More information

Viewing my Electronic Health Record

Viewing my Electronic Health Record Viewing my Electronic Health Record An Introduction for Patients Online Electronic Health Record Empowering and Educating Patients Patient Information Guide Supported By Greater Huddersfield Clinical Commissioning

More information

How to Use StartWire

How to Use StartWire How to Use StartWire How to Use StartWire StartWire is a free site you can use to manage your job search from getting recommendations on where to apply to getting automatic updates on the status of your

More information

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.

1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet

More information

Your Digital Dollars Online & Mobile Banking

Your Digital Dollars Online & Mobile Banking Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding

More information

TeachingEnglish Lesson plans. Kim s blog

TeachingEnglish Lesson plans. Kim s blog Worksheets - Socialising (3): Social networking TeachingEnglish Lesson plans Previous post Posted Friday, 25 th November by Kim Kim s blog Next post What I learned about social networking I used to think

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Self-Acceptance. A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3. Grade Level: Third grade

Self-Acceptance. A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3. Grade Level: Third grade Self-Acceptance A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3 This Book Kit was planned by Lindsay N. Graham Grade Level: Third grade Characteristic Trait: Self Acceptance

More information

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required

More information

Hector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9

Hector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9 Hector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9 OBJECTVES: 1. Children understand that strong passwords can help protect computer files and information. 2. Children undrestand

More information

Education for children with disabilities in South Africa What needs to change

Education for children with disabilities in South Africa What needs to change Education for children with disabilities in South Africa What needs to change 2015 Diane McCarthy/Human Rights Watch 2015 Diane McCarthy/Human Rights Watch Who are we? We are called Human Rights Watch.

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

Unit 2 Module 3: Generating Examples and Nonexamples

Unit 2 Module 3: Generating Examples and Nonexamples Unit 2 Module 3: Generating Examples and Nonexamples Section 1 Slide 1 Title Slide Welcome to the third module in the Vocabulary Instructional Routines unit, Generating Examples and Nonexamples. Slide

More information

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS. Christopher Heil Georgia Institute of Technology WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

More information

( F O R M E R LY M Y A C C O U N T ) Quick Reference Guide - Updated Sept 21, 2015

( F O R M E R LY M Y A C C O U N T ) Quick Reference Guide - Updated Sept 21, 2015 MANAGING YOUR MGE ONLINE ACCOUNT ON CUSTOMER CONNECTION ( F O R M E R LY M Y A C C O U N T ) Quick Reference Guide - Updated Sept 21, 2015 WELCOME TO CUSTOMER CONNECTION Customer Connection is a new online

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Handouts for teachers

Handouts for teachers ASKING QUESTIONS THAT ENCOURAGE INQUIRY- BASED LEARNING How do we ask questions to develop scientific thinking and reasoning? Handouts for teachers Contents 1. Thinking about why we ask questions... 1

More information

A crash course in credit

A crash course in credit A crash course in credit Ever get the feeling that you re being watched? That someone s keeping an eye on how you handle your money? Well, you re not just imagining things. Banks, credit card companies,

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Page 18. Using Software To Make More Money With Surveys. Visit us on the web at: www.takesurveysforcash.com

Page 18. Using Software To Make More Money With Surveys. Visit us on the web at: www.takesurveysforcash.com Page 18 Page 1 Using Software To Make More Money With Surveys by Jason White Page 2 Introduction So you re off and running with making money by taking surveys online, good for you! The problem, as you

More information