Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University"

Transcription

1 5-E Classroom STEM Activity: ETHICAL HACKING: HOW LONG DOES IT TAKE TO BREAK YOUR PASSWORD? Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University

2 CYBER SECURITY // HOW TO PROTECT YOURSELF FROM HACKERS DON T BE A VICTIM! Are you taking the STEM Type quiz? HOW TO PROTECT YOURSELF FROM HACKERS HACKERS ARE BECOMING MORE ADVANCED AND EVERYONE IS AT RISK. BY STEPHANIE PETIT Ever get an from a friend with a weird link? Or saw a friend start posting strange tweets? They probably got hacked and it can happen to you, too. Here s how to protect yourself from these hackers. STEM JOBS // LATE FALL 04 // STEMJOBS.COM

3 USE DIFFERENT PASSWORDS Most people use one or two passwords for all of their accounts, but that makes it easy for hackers if one password is revealed, they suddenly have access to your , bank account, social media accounts and more. It may be a little harder to remember different passwords for different accounts, but it s also harder to hack. It also doesn t hurt to change your passwords every few months. MAKE PASSWORDS LONG AND COMPLEX ABC or password isn t going to cut it. Use upper and lower case letters, numbers and symbols in your passwords so that they aren t guessed easily. The length of your password is also important. Hackers use programs that sort through combinations of letters and numbers at lightning speed. Longer passwords mean more work for hacking software and hackers generally want quick results. USE AND UPDATE ANTIVIRUS SOFTWARE There are many good antivirus programs out there that protect you from 95 percent of the danger that s out there. A free one is Microsoft Security Essentials. It provides protection from spyware, malware and viruses. BE CAREFUL WHERE YOU CLICK Never open an if you don t know the sender especially not attachments. Be suspicious if a friend appears to have sent you an with no subject line, a subject line that only says RE or FW or is uncharacteristically vague or brief like Hey. It may be a good idea to call them and ask if they sent the . Also, don t click links that promise prizes or free things like movies it s tempting, and that s why hackers use them, but they re not legit. It s sad that these people are using their computer skills in all the wrong ways you can actually get paid to hack. Jobs for ethical hackers are increasing because businesses and government-related organizations want to ensure their networks, applications and computer systems are strong enough to prevent theft and fraud. It pays well, too! In your first years as an ethical hacker, you can earn anywhere from $50,000 to $00,000 per year depending on the company that hires you, your IT experience and education. With several years of professional experience, you could command $0,000 or more per year. And the big bonus no risk of jail time like those not-so-ethical hackers. Potential ethical hackers should start by earning a A+ Certification and getting experience in a tech support position. After some experience and additional certification such as Network+ or CCNA, move up to a network support or admin role and then to network engineer after a few years. Earn security certifications and eventually work toward the Certified Ethical Hacker (CEH) certification offered by the International Council of Electronic Commerce Consultants. Along with these skills and certifications, you ll need a strong work ethic, good problem-solving skills and the ability to say motivated. Even with your skills, remember to never intrude anyone s network without their permission not even your ex-boyfriend or girlfriend. STEMJOBS.COM // LATE FALL 04 // STEM JOBS

4 ETHICAL HACKING: HOW LONG DOES IT TAKE TO BREAK YOUR PASSWORD? Here are some ideas for how high school teachers could use this story as a launching point for integrated STEM learning. Our activities follow the 5-E Learning Cycle Model, and the activity below is intended to last three to four one-hour class periods (although portions of the activity could be used in shorter time periods). Part : Engage 4 Ask students: What do you think the most common passwords that people use are? Why is it a bad idea to use a really common password? Why is it a bad idea to use the same password for multiple websites? Show students the 5 most common passwords on the following site: cbsnews.com/news/the-5-most-common-passwords-of-0. Have students read the STEM Jobs SM article How to Protect Yourself from Hackers. Ask students if they ve ever had to create a password for a website that had particular requirements for the password (e.g., has to have a certain number of characters, has to have symbols, etc.). What are the pros and cons of a website requiring a complicated password? Ask students: What mathematical concepts could we use to figure out how difficult a password is to break? For instance, how could we figure out how much harder it is to break a six-character password compared to a seven-character password? Students should hopefully discuss probability and permutations here. Part : Explore Show students the following scenario on a worksheet or on the projector: You are being interviewed for a job as an ethical hacker, and as part of your interview you have to break into a secure website in a limited time period. You have the choice of four websites you can try to hack. Which website would you choose? A. A website that requires a password consisting of seven characters which must be numbers and lowercase letters. B. A website that requires a password consisting of six characters that must be uppercase letters, lowercase letters, numbers and the symbols above the numerical keys on a typical keyboard. C. A website that requires a seven-character password of upper and lowercase letters and numbers, but where no character can be repeated. D. A website that requires a 0-character password of upper and lowercase letters and numbers, where no character can be repeated and the order of the characters does not matter (i.e., if the password was set as , the system would also accept as correct). Work in groups and be ready to provide a mathematical argument for why your choice is the best one. Have students discuss with partners and make an initial prediction about which of the four options they feel would be easiest to hack, then have a class discussion where students give their prediction and their reasoning for choosing that option. Have students work in groups to use the mathematical concepts of combination and permutation to figure out which of the four websites would be the best choice (note: students will need a calculator capable of handling large numbers). STEMjobs.com Ethical Hacking: How Long Does It Take to Break Your Password?

5 Part : Explain 4 See a review of combinations and permutations here if needed: mathsisfun.com/combinatorics/combinations-permutations.html. Have each student group give their choice and discuss the mathematical reasoning they used to provide evidence that their choice was the best one. Project student work on the overhead and discuss concepts of combinations and permutations, and how the formulas change when repetition is allowed or not allowed. Have students revisit their predictions and rate how well their intuition about the best option matched their actual calculations. If their prediction was far off, have them come up with an explanation why. Engage students in a discussion of what password requirements they typically see on sites they go to, and what other security procedures sites use, other than having particular requirements for passwords (e.g., use SiteKeys, track if you re logging on from a different device, have security questions, ask you to enter characters from a picture). Part 4: Elaborate 4 Ask students: How many password tries do you think hacking software can make every second? Have students read the following article: zdnet.com/article/cheap-gpus-are-rendering-strong-passwords-useless. Tell students: The article we just read says that a CPU (Central Processing Unit) can make 9.8 million password guesses per second. On a GPU (Graphics Processing Unit), however, the rate is. billion passwords per second. In their groups, have students respond to the following prompt: For the CPU and for the GPU, on average, how long would it take you to guess the password that you chose for your ethical hacking interview? (See Explore phase above.) What is the range of times it would take to guess the password? Extension: If your hacking software guessed the words in the English dictionary first, and the password was a word in the dictionary, how long would it take to crack the password? Part 5: Evaluate Have students work on the following problems individually in their math journals: You re designing a new social media website, and you want to balance password security with the users being able to easily access the site. What security measures would you put in place with respect to users logging in? Use mathematical reasoning to support your response. You re designing a new banking website, and you want to balance password security with the users being able to easily access the site. What security measures would you put in place with respect to users logging in? Use mathematical reasoning to support your response. Standards: CCSS.Math.Content.HSS.CP.B.9. Use permutations and combinations to compute probabilities of compound events and solve problems. CCSS.Math.Practice.MP. Construct viable arguments and critique the reasoning of others. STEMjobs.com Ethical Hacking: How Long Does It Take to Break Your Password?

6 STEMjobs.com

Security guide. small businesses and freelancers. Security guide 1

Security guide. small businesses and freelancers. Security guide 1 Security guide small businesses and freelancers Security guide 1 1. Introduction 3. The most dangerous types of threats 5. Will you let us protect you? 2. Where is the danger and how can we protect ourselves?

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Activities for Password Posters For Middle and High School Students

Activities for Password Posters For Middle and High School Students Activities for Password Posters For Middle and High School Students Overview There are three password posters for this grade span. We recommend that these be hung together, either vertically or horizontally,

More information

THE LITTLE BIG BOOK OF BADNESS

THE LITTLE BIG BOOK OF BADNESS THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Troubleshooting Multiple User Accounts. *Additional information is contained in the notes portion of this presentation.

Troubleshooting Multiple User Accounts. *Additional information is contained in the notes portion of this presentation. Mac OS X Troubleshooting Multiple User Accounts *Additional information is contained in the notes portion of this presentation. 23-7916-00 Rev A Intro: Mac OSX is equipped with a built-in multiple user

More information

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015 Computer Network and Internet Security Awareness and Responsible Use Indian River County School District 2014-2015 1 Through the availability of electronic resources provided by the School District of

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

6th Grade Lesson Plan: Probably Probability

6th Grade Lesson Plan: Probably Probability 6th Grade Lesson Plan: Probably Probability Overview This series of lessons was designed to meet the needs of gifted children for extension beyond the standard curriculum with the greatest ease of use

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Set up an email account with Hotmail

Set up an email account with Hotmail Set up an email account with Hotmail *This guide was last updated 18 April 2011. Please note that the real system and process may differ from this guide. 1 1. Get started Hotmail is an email service provided

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Are You A Sitting Duck?

Are You A Sitting Duck? The 7 Most Cricitcal I.T. Security Protections Every Business Must Have in Place Now to Protect Themselves from Cybercrime, Data Breaches, and Hacker Attacks Cybercrime is at an all-time high, and hackers

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

What Law Firms Can Do To Protect Themselves Online ANDRES HERNANDEZ

What Law Firms Can Do To Protect Themselves Online ANDRES HERNANDEZ What Law Firms Can Do To Protect Themselves Online ANDRES HERNANDEZ 46 THE FEDERAL LAWYER September 2015 The lifeblood of a law firm is the information often incredibly sensitive information that flows

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

25 STEPS TO SAFE ONLINE SHOPPING

25 STEPS TO SAFE ONLINE SHOPPING 25 STEPS TO SAFE ONLINE SHOPPING There exists a tremendous difference between what computer users should do to enhance their cyber security and what they really do. What is the primary reason for this?

More information

A QUICK AND EASY GUIDE TO ONLINE BANKING AND BILL PAY

A QUICK AND EASY GUIDE TO ONLINE BANKING AND BILL PAY A QUICK AND EASY GUIDE TO ONLINE BANKING AND BILL PAY BY PAUL A. MURPHY, AUTHOR OF BANKING ONLINE FOR DUMMIES A Quick and Easy Guide to Online Banking and Bill Pay Disclaimer Concepts, strategies and procedures

More information

Online financial transactions be savvy and safe. Lesson description. Enduring understanding/deep learnings: Year level: Year 9 and 10

Online financial transactions be savvy and safe. Lesson description. Enduring understanding/deep learnings: Year level: Year 9 and 10 Online financial transactions be savvy and safe Year level: Year 9 and 10 Duration: 60 minutes (lesson 1 of 2 connecting lessons) Key learning area: English, Mathematics, *Economics and business Lesson

More information

Basics of Reflective Essay Writing

Basics of Reflective Essay Writing Basics of Reflective Essay Writing Writing the Reflective Essays The three parts of this document reviews a year s worth of writing skills. Read everything very carefully and make sure to email me with

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

GET VOLUNTEERING, GET ACTIVE AND GET CREATIVE

GET VOLUNTEERING, GET ACTIVE AND GET CREATIVE GET VOLUNTEERING, GET ACTIVE AND GET CREATIVE This guide will help you make the most of your volunteering experience. Visit Reading Hack to find out more: www.readingagency.org.uk/readinghack GET READING

More information

Some Tips for Using WebAssign in Calculus

Some Tips for Using WebAssign in Calculus Some Tips for Using WebAssign in Calculus The problems you see on your WebAssign homework are generally questions taken from your textbook but sometimes randomized so that the numbers and functions may

More information

EADS up. stop think connect

EADS up. stop think connect EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,

More information

Relative and Absolute Change Percentages

Relative and Absolute Change Percentages Relative and Absolute Change Percentages Ethan D. Bolker Maura M. Mast September 6, 2007 Plan Use the credit card solicitation data to address the question of measuring change. Subtraction comes naturally.

More information

Hector s World Lesson plan Episode: Computer security: Oops Upper primary

Hector s World Lesson plan Episode: Computer security: Oops Upper primary Hector s World Lesson plan Episode: Computer security: Oops Upper primary BACKGROUND Students of this age are emerging users of internet-enabled computers. They may be involved in a range of online activities

More information

It may look like this all has to do with your password, but that s not the only factor to worry about.

It may look like this all has to do with your password, but that s not the only factor to worry about. Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter).

More information

Joomla Admin Protection

Joomla Admin Protection Joomla Admin Protection We congratulate you on installation of our plug-in that will not only help you to protect your website but will also make your work with CMS much easier and secure. Our plug-in

More information

S SAFE. PRIMARY SCHOOL SOCIAL NETWORKING & CYBER BULLYING The SMART Challenge. Safe Meeting Accepting Reliable Tell

S SAFE. PRIMARY SCHOOL SOCIAL NETWORKING & CYBER BULLYING The SMART Challenge. Safe Meeting Accepting Reliable Tell S is for SAFE: Answer the questions below using your own ideas and the clues if you need to! S SAFE Who can see your information? What might others do with it? How can you stop others getting information

More information

Easy Casino Profits. Congratulations!!

Easy Casino Profits. Congratulations!! Easy Casino Profits The Easy Way To Beat The Online Casinos Everytime! www.easycasinoprofits.com Disclaimer The authors of this ebook do not promote illegal, underage gambling or gambling to those living

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a great

More information

Fraud Protection module

Fraud Protection module Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning

More information

WHITE PAPER The Five Step Guide to Better Social Media Security

WHITE PAPER The Five Step Guide to Better Social Media Security WHITE PAPER The Five Step Guide to Better Social Media Security A Hootsuite White Paper The Five Step Guide to Better Social Media Security A Hootsuite White Paper In 2013, not a single month went by without

More information

An Interesting Way to Combine Numbers

An Interesting Way to Combine Numbers An Interesting Way to Combine Numbers Joshua Zucker and Tom Davis November 28, 2007 Abstract This exercise can be used for middle school students and older. The original problem seems almost impossibly

More information

Lesson Plans K-3. Bullying Response Lesson Plan Grades K-3

Lesson Plans K-3. Bullying Response Lesson Plan Grades K-3 Lesson Plans K-3 Bullying Response Lesson Plan Grades K-3 Estimated Time of Completion: Two to three classroom periods, or stretched out throughout the school year. Each activity will take between 15-30

More information

Experience is a hard teacher because she gives the test first, the lesson afterward. Vernon Law DRAFT

Experience is a hard teacher because she gives the test first, the lesson afterward. Vernon Law DRAFT ! Lesson 2-4 Ins and Outs 111 Lesson 2-4 Ins and Outs Learning Objec-ves 1. Distinguish between inputs (independent variables) and outputs (dependent variables). 2. Evaluate expressions and formulas. 3.

More information

things you haven t done to protect your business from cybercrime

things you haven t done to protect your business from cybercrime 5 things you haven t done to protect your business from cybercrime 5 things you can do to protect your business from cybercrime 27,000,000,000 27billion is a big number and is what the UK government estimates

More information

Computer Security and Privacy

Computer Security and Privacy Computer Security and Privacy 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Guidelines for Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures

More information

Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests

Money and shopping 8.1 Online banking. Beginner s guide to. Wider interests Wider interests Use this document with the glossary Beginner s guide to Money and shopping 8.1 Online banking This activity will help you register to bank online and get you started with your online banking

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Module 2: How to Make a Career Decision Transcript

Module 2: How to Make a Career Decision Transcript Module 2: How to Make a Career Decision Transcript Introduction (video clip 1) This module will focus on the first step of the Career Planning Process. Before we get started, though, let s find out what

More information

5-E CLASSROOM STEM ACTIVITY: SUSTAINABLE LIVING - DESIGNING AN ENERGY-EFFICIENT HOUSE

5-E CLASSROOM STEM ACTIVITY: SUSTAINABLE LIVING - DESIGNING AN ENERGY-EFFICIENT HOUSE 5-E CLASSROOM STEM ACTIVITY: SUSTAINABLE LIVING - DESIGNING AN ENERGY-EFFICIENT HOUSE Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University ENERGY // KEEPING

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

Persuasive. How to Write Persuasive. Social Media Proposals

Persuasive. How to Write Persuasive. Social Media Proposals Persuasive Social Media Proposals How to Write Persuasive Social Media Proposals How to Write Persuasive Social Media Proposals! You got started in social media because you wanted to connect with people

More information

Could you spot a scammer?

Could you spot a scammer? Could you spot a scammer? Keeping you safe and secure Fraud can affect anyone whatever your background, age or experience And attempts can come in all shapes and sizes over the phone, on the internet or

More information

Get Insant Help 1.8OO~ 570 ~1233 Panda Antivirus Tech nical Supp ort Customer Phone Number

Get Insant Help 1.8OO~ 570 ~1233 Panda Antivirus Tech nical Supp ort Customer Phone Number Get Insant Help 1.8OO~ 570 ~1233 Panda Antivirus Tech nical Supp ort Customer Phone Number Help and Support for Panda +1(800)- 570-1233 Security Panda Security is bundled up with safe & protective features

More information

Identity Protection Guide. The more you know, the better you can protect yourself.

Identity Protection Guide. The more you know, the better you can protect yourself. Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious

More information

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4

Grade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4 Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will

More information

TEACHER S GUIDE: DIVERSITY

TEACHER S GUIDE: DIVERSITY TEACHER S GUIDE: DIVERSITY LEARNING OBJECTIVES Students will understand that differences between people are positive. Students will learn that some people handle diversity in negative ways. Students will

More information

NTFS permissions represent a core part of Windows s security system. Using

NTFS permissions represent a core part of Windows s security system. Using bonus appendix NTFS Permissions NTFS permissions represent a core part of Windows s security system. Using this feature, you can specify exactly which coworkers are allowed to open which files and folders

More information

Lesson Plan Healthy Relationships

Lesson Plan Healthy Relationships Lesson Plan Healthy Relationships TOPIC: Healthy Relationships SUBJECT: Life Skills IDEAL NUMBER OF LEARNERS: 40 TARGET AGE RANGE: 9 15 TIME: 45 minutes WHAT ADVANCE PREPARATION, IF ANY, IS REQUIRED OF

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

Buying a Home Mortgage Decisions PwC's Earn Your Future Curriculum

Buying a Home Mortgage Decisions PwC's Earn Your Future Curriculum www.pwc.com/corporateresponsibility Buying a Home Mortgage Decisions PwC's Earn Your Future Curriculum Table of contents Introduction... 3 Lesson description... 3 Grade(s)... 3 Lesson time... 3 Pre-visit

More information

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams Advance Fee Loans Scam artists can trick you into paying money to qualify for a loan or credit card. Despite their guarantees, you do not receive a loan, credit card, or any money. Never pay money to qualify

More information

Understand What s Going On

Understand What s Going On Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Grade. Lesson 6. Bullying Prevention: Cyber Bullying

Grade. Lesson 6. Bullying Prevention: Cyber Bullying Bullying Prevention: Cyber Bullying Handout 6A: Pros and Cons Name: Make a list of pros and cons of electronic socializing. Be very specific when you list your ideas. To get started, think of the following

More information

PEER PRESSURE TEACHER S GUIDE:

PEER PRESSURE TEACHER S GUIDE: TEACHER S GUIDE: PEER PRESSURE LEARNING OBJECTIVES Students will be able to identify peer pressure as both a positive and negative force. Students will understand how peer pressure impacts everyone. Students

More information

How to Use StartWire

How to Use StartWire How to Use StartWire How to Use StartWire StartWire is a free site you can use to manage your job search from getting recommendations on where to apply to getting automatic updates on the status of your

More information

If you have registered previously with Job Service, simply log in with your username and password to start posting jobs.

If you have registered previously with Job Service, simply log in with your username and password to start posting jobs. HOW TO ENTER YOUR OWN JOB ORDER More and more employers are using the Job Service website, https://jobs.mt.gov to post and monitor their own job listings. Here are some hints that will help make your job

More information

Complete the details and click the Next button.

Complete the details and click the Next button. How To Setup a New Google Account When starting your Chromebook and selecting the option to Create a New Account you will be presented with the screen below. Your choice of email address may already be

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

The First 2 Weeks: Day One of Reading Workshop

The First 2 Weeks: Day One of Reading Workshop The First 2 Weeks: Day One of Reading Workshop Gather together in the meeting area. This might be on a large rug or in a corner of the room. Sit in a large circle. If possible, even the teacher sits on

More information

The Windows Command Prompt: Simpler and More Useful Than You Think

The Windows Command Prompt: Simpler and More Useful Than You Think The Windows Command Prompt: Simpler and More Useful Than You Think By Ryan Dube When most people think of the old DOS command prompt window that archaic, lingering vestige of computer days gone by they

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Cyber Security. Maintaining Your Identity on the Net

Cyber Security. Maintaining Your Identity on the Net Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD

More information

Problem-Solving Circles

Problem-Solving Circles Problem-Solving Circles Math Practice Standards 1. Make sense of problems and persevere in solving them. 2. Reason abstractly and quantitatively. 3. Construct viable arguments and critique the reasoning

More information

Safer Internet Day Quiz Are you a good friend online?

Safer Internet Day Quiz Are you a good friend online? Safer Internet Day Quiz Are you a good friend online? Safer Internet Day 2015 is all about helping to create a better internet together. One way to do this is to be a good friend to others online. What

More information

The Kindle Bestseller Blueprint Manifesto. It s Easy To Create A Bestseller! Here Are 3 Ways To Make A Killing With Kindle!

The Kindle Bestseller Blueprint Manifesto. It s Easy To Create A Bestseller! Here Are 3 Ways To Make A Killing With Kindle! Hello Dear Author, The Kindle Bestseller Blueprint Manifesto It s Easy To Create A Bestseller! Here Are 3 Ways To Make A Killing With Kindle! My name is Krizia, but everyone calls me Miss K, and like you

More information

Steps to Proving a Theorem

Steps to Proving a Theorem Steps to Proving a Theorem Step 1: Understand Goal What am I looking for? What should the last sentence in my proof say? What are some equivalent ways to state what I want? Are there any complicated definitions

More information

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood

2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying

More information

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer

Objectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 1 Objectives What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 2 What is Cloud Computing? Not single, agreed upon definition exists yet,

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Education for children with disabilities in South Africa What needs to change

Education for children with disabilities in South Africa What needs to change Education for children with disabilities in South Africa What needs to change 2015 Diane McCarthy/Human Rights Watch 2015 Diane McCarthy/Human Rights Watch Who are we? We are called Human Rights Watch.

More information

The Concept of Present Value

The Concept of Present Value The Concept of Present Value If you could have $100 today or $100 next week which would you choose? Of course you would choose the $100 today. Why? Hopefully you said because you could invest it and make

More information

VoipSwitch Security Audit

VoipSwitch Security Audit VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has

More information

Representing Probabilities: Medical Testing

Representing Probabilities: Medical Testing PROBLEM SOLVING Mathematics Assessment Project CLASSROOM CHALLENGES A Formative Assessment Lesson Representing Probabilities: Medical Testing Mathematics Assessment Resource Service University of Nottingham

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Your Digital Dollars Online & Mobile Banking

Your Digital Dollars Online & Mobile Banking Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding

More information

Creating book reviews in Destiny OPAC

Creating book reviews in Destiny OPAC Published on AASL Learning4Life Lesson Plan Database Creating book reviews in Destiny OPAC Created by: Elizabeth Russell Title/Role: School library media specialist Organization/School Name: Bradley Elementary

More information

What strategies will help me reach my savings goals?

What strategies will help me reach my savings goals? Savings 2 MONEY MATTERS The BIG Idea What strategies will help me reach my savings goals? AGENDA Approx. 45 minutes I. Warm Up (10 minutes) II. Saving Tips (10 minutes) III. Opportunity Costs (15 minutes)

More information

FROM LYRICS TO SENTENCES

FROM LYRICS TO SENTENCES FROM LYRICS TO SENTENCES Instructor: Jennifer Johnson Cecilia Ramos Having to translate from one genre to another is a difficult task all on its own, but having to change from one audience to a completely

More information

Viewing my Electronic Health Record

Viewing my Electronic Health Record Viewing my Electronic Health Record An Introduction for Patients Online Electronic Health Record Empowering and Educating Patients Patient Information Guide Supported By Greater Huddersfield Clinical Commissioning

More information

Joseph in Egypt. Genesis 39:2-3 the LORD was with Joseph and gave him success in everything he did.

Joseph in Egypt. Genesis 39:2-3 the LORD was with Joseph and gave him success in everything he did. Joseph in Egypt Teacher Pep Talk: Joseph s brothers had seen their chance to get rid of him and they did. They sold him into slavery in Egypt. But the LORD was with Joseph in Egypt and gave him success

More information

Why should I back up my certificate? How do I create a backup copy of my certificate?

Why should I back up my certificate? How do I create a backup copy of my certificate? Why should I back up my certificate? You should always keep a backup copy of your ACES Business Certificate on a location external to your computer. Since it s stored locally on your computer, in the Windows

More information

Preview of Real Python Course 1, Intro to Python. Fundamentals: Functions and Loops

Preview of Real Python Course 1, Intro to Python. Fundamentals: Functions and Loops Preview of Real Python Course 1, Intro to Python If you like what you see, consider purchasing the entire course on RealPython.com - for just $60, you will get all three courses, with over 1,200 pages

More information

Absolute Value of Reasoning

Absolute Value of Reasoning About Illustrations: Illustrations of the Standards for Mathematical Practice (SMP) consist of several pieces, including a mathematics task, student dialogue, mathematical overview, teacher reflection

More information

Introduction and Overview

Introduction and Overview Introduction and Overview Probability and Statistics is a topic that is quickly growing, has become a major part of our educational program, and has a substantial role in the NCTM Standards. While covering

More information

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise

Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise instead of the preposition. Your partner can guess the

More information

Division of Information Technology. Phishing Awareness. By Chad Vantine Information Security Assistant

Division of Information Technology. Phishing Awareness. By Chad Vantine Information Security Assistant Division of Information Technology Phishing Awareness By Chad Vantine Information Security Assistant What is Phishing? Phishing email messages, websites, and phone calls are designed to steal money or

More information