Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University
|
|
- Madlyn Johns
- 7 years ago
- Views:
Transcription
1 5-E Classroom STEM Activity: ETHICAL HACKING: HOW LONG DOES IT TAKE TO BREAK YOUR PASSWORD? Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University
2 CYBER SECURITY // HOW TO PROTECT YOURSELF FROM HACKERS DON T BE A VICTIM! Are you taking the STEM Type quiz? HOW TO PROTECT YOURSELF FROM HACKERS HACKERS ARE BECOMING MORE ADVANCED AND EVERYONE IS AT RISK. BY STEPHANIE PETIT Ever get an from a friend with a weird link? Or saw a friend start posting strange tweets? They probably got hacked and it can happen to you, too. Here s how to protect yourself from these hackers. STEM JOBS // LATE FALL 04 // STEMJOBS.COM
3 USE DIFFERENT PASSWORDS Most people use one or two passwords for all of their accounts, but that makes it easy for hackers if one password is revealed, they suddenly have access to your , bank account, social media accounts and more. It may be a little harder to remember different passwords for different accounts, but it s also harder to hack. It also doesn t hurt to change your passwords every few months. MAKE PASSWORDS LONG AND COMPLEX ABC or password isn t going to cut it. Use upper and lower case letters, numbers and symbols in your passwords so that they aren t guessed easily. The length of your password is also important. Hackers use programs that sort through combinations of letters and numbers at lightning speed. Longer passwords mean more work for hacking software and hackers generally want quick results. USE AND UPDATE ANTIVIRUS SOFTWARE There are many good antivirus programs out there that protect you from 95 percent of the danger that s out there. A free one is Microsoft Security Essentials. It provides protection from spyware, malware and viruses. BE CAREFUL WHERE YOU CLICK Never open an if you don t know the sender especially not attachments. Be suspicious if a friend appears to have sent you an with no subject line, a subject line that only says RE or FW or is uncharacteristically vague or brief like Hey. It may be a good idea to call them and ask if they sent the . Also, don t click links that promise prizes or free things like movies it s tempting, and that s why hackers use them, but they re not legit. It s sad that these people are using their computer skills in all the wrong ways you can actually get paid to hack. Jobs for ethical hackers are increasing because businesses and government-related organizations want to ensure their networks, applications and computer systems are strong enough to prevent theft and fraud. It pays well, too! In your first years as an ethical hacker, you can earn anywhere from $50,000 to $00,000 per year depending on the company that hires you, your IT experience and education. With several years of professional experience, you could command $0,000 or more per year. And the big bonus no risk of jail time like those not-so-ethical hackers. Potential ethical hackers should start by earning a A+ Certification and getting experience in a tech support position. After some experience and additional certification such as Network+ or CCNA, move up to a network support or admin role and then to network engineer after a few years. Earn security certifications and eventually work toward the Certified Ethical Hacker (CEH) certification offered by the International Council of Electronic Commerce Consultants. Along with these skills and certifications, you ll need a strong work ethic, good problem-solving skills and the ability to say motivated. Even with your skills, remember to never intrude anyone s network without their permission not even your ex-boyfriend or girlfriend. STEMJOBS.COM // LATE FALL 04 // STEM JOBS
4 ETHICAL HACKING: HOW LONG DOES IT TAKE TO BREAK YOUR PASSWORD? Here are some ideas for how high school teachers could use this story as a launching point for integrated STEM learning. Our activities follow the 5-E Learning Cycle Model, and the activity below is intended to last three to four one-hour class periods (although portions of the activity could be used in shorter time periods). Part : Engage 4 Ask students: What do you think the most common passwords that people use are? Why is it a bad idea to use a really common password? Why is it a bad idea to use the same password for multiple websites? Show students the 5 most common passwords on the following site: cbsnews.com/news/the-5-most-common-passwords-of-0. Have students read the STEM Jobs SM article How to Protect Yourself from Hackers. Ask students if they ve ever had to create a password for a website that had particular requirements for the password (e.g., has to have a certain number of characters, has to have symbols, etc.). What are the pros and cons of a website requiring a complicated password? Ask students: What mathematical concepts could we use to figure out how difficult a password is to break? For instance, how could we figure out how much harder it is to break a six-character password compared to a seven-character password? Students should hopefully discuss probability and permutations here. Part : Explore Show students the following scenario on a worksheet or on the projector: You are being interviewed for a job as an ethical hacker, and as part of your interview you have to break into a secure website in a limited time period. You have the choice of four websites you can try to hack. Which website would you choose? A. A website that requires a password consisting of seven characters which must be numbers and lowercase letters. B. A website that requires a password consisting of six characters that must be uppercase letters, lowercase letters, numbers and the symbols above the numerical keys on a typical keyboard. C. A website that requires a seven-character password of upper and lowercase letters and numbers, but where no character can be repeated. D. A website that requires a 0-character password of upper and lowercase letters and numbers, where no character can be repeated and the order of the characters does not matter (i.e., if the password was set as , the system would also accept as correct). Work in groups and be ready to provide a mathematical argument for why your choice is the best one. Have students discuss with partners and make an initial prediction about which of the four options they feel would be easiest to hack, then have a class discussion where students give their prediction and their reasoning for choosing that option. Have students work in groups to use the mathematical concepts of combination and permutation to figure out which of the four websites would be the best choice (note: students will need a calculator capable of handling large numbers). STEMjobs.com Ethical Hacking: How Long Does It Take to Break Your Password?
5 Part : Explain 4 See a review of combinations and permutations here if needed: mathsisfun.com/combinatorics/combinations-permutations.html. Have each student group give their choice and discuss the mathematical reasoning they used to provide evidence that their choice was the best one. Project student work on the overhead and discuss concepts of combinations and permutations, and how the formulas change when repetition is allowed or not allowed. Have students revisit their predictions and rate how well their intuition about the best option matched their actual calculations. If their prediction was far off, have them come up with an explanation why. Engage students in a discussion of what password requirements they typically see on sites they go to, and what other security procedures sites use, other than having particular requirements for passwords (e.g., use SiteKeys, track if you re logging on from a different device, have security questions, ask you to enter characters from a picture). Part 4: Elaborate 4 Ask students: How many password tries do you think hacking software can make every second? Have students read the following article: zdnet.com/article/cheap-gpus-are-rendering-strong-passwords-useless. Tell students: The article we just read says that a CPU (Central Processing Unit) can make 9.8 million password guesses per second. On a GPU (Graphics Processing Unit), however, the rate is. billion passwords per second. In their groups, have students respond to the following prompt: For the CPU and for the GPU, on average, how long would it take you to guess the password that you chose for your ethical hacking interview? (See Explore phase above.) What is the range of times it would take to guess the password? Extension: If your hacking software guessed the words in the English dictionary first, and the password was a word in the dictionary, how long would it take to crack the password? Part 5: Evaluate Have students work on the following problems individually in their math journals: You re designing a new social media website, and you want to balance password security with the users being able to easily access the site. What security measures would you put in place with respect to users logging in? Use mathematical reasoning to support your response. You re designing a new banking website, and you want to balance password security with the users being able to easily access the site. What security measures would you put in place with respect to users logging in? Use mathematical reasoning to support your response. Standards: CCSS.Math.Content.HSS.CP.B.9. Use permutations and combinations to compute probabilities of compound events and solve problems. CCSS.Math.Practice.MP. Construct viable arguments and critique the reasoning of others. STEMjobs.com Ethical Hacking: How Long Does It Take to Break Your Password?
6 STEMjobs.com
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
More informationTHE LITTLE BIG BOOK OF BADNESS
THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you
More informationInternet basics 2.3 Protecting your computer
Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More informationComputer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
More information6th Grade Lesson Plan: Probably Probability
6th Grade Lesson Plan: Probably Probability Overview This series of lessons was designed to meet the needs of gifted children for extension beyond the standard curriculum with the greatest ease of use
More informationRelative and Absolute Change Percentages
Relative and Absolute Change Percentages Ethan D. Bolker Maura M. Mast September 6, 2007 Plan Use the credit card solicitation data to address the question of measuring change. Subtraction comes naturally.
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationC-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:
Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationCyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
More informationSet up an email account with Hotmail
Set up an email account with Hotmail *This guide was last updated 18 April 2011. Please note that the real system and process may differ from this guide. 1 1. Get started Hotmail is an email service provided
More informationNCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
More informationScams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationPEER PRESSURE TEACHER S GUIDE:
TEACHER S GUIDE: PEER PRESSURE LEARNING OBJECTIVES Students will be able to identify peer pressure as both a positive and negative force. Students will understand how peer pressure impacts everyone. Students
More informationComputer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015
Computer Network and Internet Security Awareness and Responsible Use Indian River County School District 2014-2015 1 Through the availability of electronic resources provided by the School District of
More informationScams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives
Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against
More informationThe Windows Command Prompt: Simpler and More Useful Than You Think
The Windows Command Prompt: Simpler and More Useful Than You Think By Ryan Dube When most people think of the old DOS command prompt window that archaic, lingering vestige of computer days gone by they
More informationFraud Protection module
Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning
More informationCould you spot a scammer?
Could you spot a scammer? Keeping you safe and secure Fraud can affect anyone whatever your background, age or experience And attempts can come in all shapes and sizes over the phone, on the internet or
More informationINTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account
INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs
More informationObjectives. What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer
1 Objectives What is Cloud Computing? Security Problems and Liability Privacy Concerns Solutions Recap Challenges for the Customer 2 What is Cloud Computing? Not single, agreed upon definition exists yet,
More informationA QUICK AND EASY GUIDE TO ONLINE BANKING AND BILL PAY
A QUICK AND EASY GUIDE TO ONLINE BANKING AND BILL PAY BY PAUL A. MURPHY, AUTHOR OF BANKING ONLINE FOR DUMMIES A Quick and Easy Guide to Online Banking and Bill Pay Disclaimer Concepts, strategies and procedures
More informationHEADS up. stop think connect
HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more
More informationBoston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
More informationJoseph in Egypt. Genesis 39:2-3 the LORD was with Joseph and gave him success in everything he did.
Joseph in Egypt Teacher Pep Talk: Joseph s brothers had seen their chance to get rid of him and they did. They sold him into slavery in Egypt. But the LORD was with Joseph in Egypt and gave him success
More informationInternet basics 2.2 Staying safe online. Beginner s guide to. Basics
Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and
More informationEADS up. stop think connect
EADS up stop think connect table of contents 2 4 8 12 Share with Care Interact with Tact The Protection Connection Word Search You text, you play games, you share photos and video. You update your status,
More informationTom wants to find two real numbers, a and b, that have a sum of 10 and have a product of 10. He makes this table.
Sum and Product This problem gives you the chance to: use arithmetic and algebra to represent and analyze a mathematical situation solve a quadratic equation by trial and improvement Tom wants to find
More informationNTFS permissions represent a core part of Windows s security system. Using
bonus appendix NTFS Permissions NTFS permissions represent a core part of Windows s security system. Using this feature, you can specify exactly which coworkers are allowed to open which files and folders
More informationGrade 5 Unit. Lesson 2. Learning Goals. Facility. Materials. Cyberbullying and Lesson 2 of 4
Cyberbullying and Harrassment 30 Minutes* Curriculum Expectations Health and Physical Education - 1.3, C2.2, C3.2 Language: Media - 1.5 Lesson 2 Learning Goals By the end of this lesson, students will
More informationIt may look like this all has to do with your password, but that s not the only factor to worry about.
Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter).
More informationFinding the last cell in an Excel range Using built in Excel functions to locate the last cell containing data in a range of cells.
Finding the last cell in an Excel range Using built in Excel functions to locate the last cell containing data in a range of cells. There are all sorts of times in Excel when you will need to find the
More informationAre You A Sitting Duck?
The 7 Most Cricitcal I.T. Security Protections Every Business Must Have in Place Now to Protect Themselves from Cybercrime, Data Breaches, and Hacker Attacks Cybercrime is at an all-time high, and hackers
More information2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE
2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly
More informationHector s World Lesson plan Episode: Computer security: Oops Upper primary
Hector s World Lesson plan Episode: Computer security: Oops Upper primary BACKGROUND Students of this age are emerging users of internet-enabled computers. They may be involved in a range of online activities
More informationJoomla Admin Protection
Joomla Admin Protection We congratulate you on installation of our plug-in that will not only help you to protect your website but will also make your work with CMS much easier and secure. Our plug-in
More informationEasy Casino Profits. Congratulations!!
Easy Casino Profits The Easy Way To Beat The Online Casinos Everytime! www.easycasinoprofits.com Disclaimer The authors of this ebook do not promote illegal, underage gambling or gambling to those living
More informationMoney and shopping 8.1 Online banking. Beginner s guide to. Wider interests
Wider interests Use this document with the glossary Beginner s guide to Money and shopping 8.1 Online banking This activity will help you register to bank online and get you started with your online banking
More informationHow to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationVersion 2 January 2015
Version 2 January 2015 IT SUPPORT HANDBOOK FOR BYO DEVICES 2015 INSTALLING SOFTWARE... 1 Microsoft Office... 1 Setting up Office preferences... 5 Setting up your College email account for the first time
More informationGrade 2 Lesson 3: Refusing Bullying. Getting Started
Getting Started Lesson Concepts You can refuse to let bullying happen to you or to others. Being assertive is one way to refuse bullying. Key Words Refuse, assertive Objectives Students will be able to:
More informationThe 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation. *solve: to find a solution, explanation, or answer for
The 5 P s in Problem Solving 1 How do other people solve problems? The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation *solve: to find a solution, explanation, or answer
More informationDSHS CA Security For Providers
DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public
More informationAIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
More informationthings you haven t done to protect your business from cybercrime
5 things you haven t done to protect your business from cybercrime 5 things you can do to protect your business from cybercrime 27,000,000,000 27billion is a big number and is what the UK government estimates
More informationUnderstand What s Going On
Internet Safety Tips For Dummies In This Book Recognizing how online risks occur Staying safer with technology Taking care with shared photos Understanding how crooks collect information Reporting fraud
More informationOnline financial transactions be savvy and safe. Lesson description. Enduring understanding/deep learnings: Year level: Year 9 and 10
Online financial transactions be savvy and safe Year level: Year 9 and 10 Duration: 60 minutes (lesson 1 of 2 connecting lessons) Key learning area: English, Mathematics, *Economics and business Lesson
More informationPresentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise
Presentations Phrases Prepositions Pairwork Student A Choose one of the sections below and read out one of the example sentences with a gap or noise instead of the preposition. Your partner can guess the
More informationChapter 2. Making Shapes
Chapter 2. Making Shapes Let's play turtle! You can use your Pencil Turtle, you can use yourself, or you can use some of your friends. In fact, why not try all three? Rabbit Trail 4. Body Geometry Can
More informationWhy should I back up my certificate? How do I create a backup copy of my certificate?
Why should I back up my certificate? You should always keep a backup copy of your ACES Business Certificate on a location external to your computer. Since it s stored locally on your computer, in the Windows
More informationHigh Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
More informationPersuasive. How to Write Persuasive. Social Media Proposals
Persuasive Social Media Proposals How to Write Persuasive Social Media Proposals How to Write Persuasive Social Media Proposals! You got started in social media because you wanted to connect with people
More informationSociety tells us otherwise. Our broke family and friends tell us otherwise.
Breaking the Bondage of Debt Text: Proverbs 22:7 I. Intro a. You can t believe everything you hear. Think about it for a second: Who taught you that borrowing money was a good idea? i. Was it your broke
More informationMobile Banking Frequently Asked Questions
Registration and Activation FAQs Why do I have to register my phone? Mobile devices must be enrolled to use First Federal Lakewood in order to securely validate that only your device has access to your
More informationDesktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
More informationChapter 28: Expanding Web Studio
CHAPTER 25 - SAVING WEB SITES TO THE INTERNET Having successfully completed your Web site you are now ready to save (or post, or upload, or ftp) your Web site to the Internet. Web Studio has three ways
More informationT H E L E G I S L A T I V E B R A N C H
T H E L E G I S L A T I V E B R A N C H Introduce students to the legislative branch in one class period with this easy lesson plan. First, kick students off with our optional sponge activity while you
More informationIdentity Protection Guide. The more you know, the better you can protect yourself.
Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious
More informationWHITE PAPER The Five Step Guide to Better Social Media Security
WHITE PAPER The Five Step Guide to Better Social Media Security A Hootsuite White Paper The Five Step Guide to Better Social Media Security A Hootsuite White Paper In 2013, not a single month went by without
More informationSPIN Selling SITUATION PROBLEM IMPLICATION NEED-PAYOFF By Neil Rackham
SITUATION PROBLEM IMPLICATION NEED-PAYOFF By Neil Rackham 1. Sales Behavior and Sales Success Small Sales Selling Techniques The traditional selling techniques that most of us have been trained to use
More informationAdvance Fee Loans. Computer Malware Scams. Credit Repair Scams
Advance Fee Loans Scam artists can trick you into paying money to qualify for a loan or credit card. Despite their guarantees, you do not receive a loan, credit card, or any money. Never pay money to qualify
More informationWhy is it important?
Keeping safe online Why is it important? The obvious reason avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone
More informationCyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
More informationViruses, Worms, and Trojan Horses
Viruses, Worms, and Trojan Horses Be a Power Reader Make Personal Connections As you read this article, think to yourself, How can I apply this knowledge? How will what I m learning be useful to me? You
More informationIt s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.
Activities for Protecting Your Identity and Computer for Elementary and Middle School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these
More informationSongwriting. Geniuses. for. 25 Tips for the Genius in Everyone. By Gene Burnett
Songwriting for Geniuses 25 Tips for the Genius in Everyone By Gene Burnett Songwriting for Geniuses iii Introduction This little book is entitled Songwriting For Geniuses and is comprised of various tips
More informationReading Strategies by Level. Early Emergent Readers
The charts below were created as a common language for teachers and students in the Wallingford Public Schools in kindergarten through eighth grade. The level of the chart selected for use in the classroom
More informationQ: What types of businesses/industries can benefit from the SBA loan programs? A: Most small owner-operated business can benefit from SBA loans
Interview with Alan Thomes, President, SBA Loan Division State Bank and Trust Company For many new start-ups and small businesses, an SBA loan may be an appropriate form of financing. In this interview
More informationProtecting Yourself From Identity Theft
Protecting Yourself From Identity Theft We re hearing a lot more about identity theft these days from hackers stealing credit card numbers from big banks and retail stores to individuals opening up credit
More informationPaymentNet Federal Card Solutions Cardholder FAQs
PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How
More informationDon t Click That Link and other security tips. Laura Perry Jennifer Speegle Mike Trice
Don t Click That Link and other security tips Laura Perry Jennifer Speegle Mike Trice About Us Laura Perry Information Security Jennifer Speegle Firewall Administrator Mike Trice Network Engineer Mail
More informationActivities for Protecting Your Identity and Computer for Middle and High School Students
Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be
More informationThe Concept of Present Value
The Concept of Present Value If you could have $100 today or $100 next week which would you choose? Of course you would choose the $100 today. Why? Hopefully you said because you could invest it and make
More informationHow To Proofread
GRADE 8 English Language Arts Proofreading: Lesson 6 Read aloud to the students the material that is printed in boldface type inside the boxes. Information in regular type inside the boxes and all information
More informationCYBERBULLYING TEACHER S GUIDE:
TEACHER S GUIDE: CYBERBULLYING LEARNING OBJECTIVES Students will understand the meaning of cyberbully. Students will learn to recognize different forms of cyberbullying. Students will learn different strategies
More informationVoipSwitch Security Audit
VoipSwitch Security Audit Security audit was made at 1 st January 2013 (3.00 PM 10.00 PM UTC +1) by John Doe who is Security Advisor at VoipSwitch Company. Server's IP address : 11.11.11.11 Server has
More informationViewing my Electronic Health Record
Viewing my Electronic Health Record An Introduction for Patients Online Electronic Health Record Empowering and Educating Patients Patient Information Guide Supported By Greater Huddersfield Clinical Commissioning
More informationHow to Use StartWire
How to Use StartWire How to Use StartWire StartWire is a free site you can use to manage your job search from getting recommendations on where to apply to getting automatic updates on the status of your
More information1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works.
MATH 13150: Freshman Seminar Unit 18 1. The RSA algorithm In this chapter, we ll learn how the RSA algorithm works. 1.1. Bob and Alice. Suppose that Alice wants to send a message to Bob over the internet
More informationYour Digital Dollars Online & Mobile Banking
Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding
More informationTeachingEnglish Lesson plans. Kim s blog
Worksheets - Socialising (3): Social networking TeachingEnglish Lesson plans Previous post Posted Friday, 25 th November by Kim Kim s blog Next post What I learned about social networking I used to think
More information2 nd - Watch My Online Neighborhood Video: https://www.commonsensemedia.org/videos/my- online- neighborhood
K- Going Places Safely Essential Question: How do I go places safely on the computer? Students will: discover the Internet can be used to visit far- away places and learn new things; compare how staying
More informationSelf-Acceptance. A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3. Grade Level: Third grade
Self-Acceptance A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN 0-9703809-3-3 This Book Kit was planned by Lindsay N. Graham Grade Level: Third grade Characteristic Trait: Self Acceptance
More informationThe following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
More informationHector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9
Hector s World Lesson Plan Interactive Episode Computer Security: Oops Ages 8 9 OBJECTVES: 1. Children understand that strong passwords can help protect computer files and information. 2. Children undrestand
More informationEducation for children with disabilities in South Africa What needs to change
Education for children with disabilities in South Africa What needs to change 2015 Diane McCarthy/Human Rights Watch 2015 Diane McCarthy/Human Rights Watch Who are we? We are called Human Rights Watch.
More informationDefense Media Activity Guide To Keeping Your Social Media Accounts Secure
Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something
More informationUnit 2 Module 3: Generating Examples and Nonexamples
Unit 2 Module 3: Generating Examples and Nonexamples Section 1 Slide 1 Title Slide Welcome to the third module in the Vocabulary Instructional Routines unit, Generating Examples and Nonexamples. Slide
More informationWRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
More information( F O R M E R LY M Y A C C O U N T ) Quick Reference Guide - Updated Sept 21, 2015
MANAGING YOUR MGE ONLINE ACCOUNT ON CUSTOMER CONNECTION ( F O R M E R LY M Y A C C O U N T ) Quick Reference Guide - Updated Sept 21, 2015 WELCOME TO CUSTOMER CONNECTION Customer Connection is a new online
More informationOCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875
OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
More informationHandouts for teachers
ASKING QUESTIONS THAT ENCOURAGE INQUIRY- BASED LEARNING How do we ask questions to develop scientific thinking and reasoning? Handouts for teachers Contents 1. Thinking about why we ask questions... 1
More informationA crash course in credit
A crash course in credit Ever get the feeling that you re being watched? That someone s keeping an eye on how you handle your money? Well, you re not just imagining things. Banks, credit card companies,
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationPage 18. Using Software To Make More Money With Surveys. Visit us on the web at: www.takesurveysforcash.com
Page 18 Page 1 Using Software To Make More Money With Surveys by Jason White Page 2 Introduction So you re off and running with making money by taking surveys online, good for you! The problem, as you
More information