Digital Citizenship Lesson

Size: px
Start display at page:

Download "Digital Citizenship Lesson"

Transcription

1 Digital Citizenship Lesson Categories: School Environment and Student Behavior/ Student Life Outside of School Environment Element: Digital Security Lesson: Malware Grade Level: 6-12 Part I Introduction [Overview of topic] brief description of the element and how it impacts the student. Malware is short for malicious software and is designed to steal information, inflict damage upon your computer, commit fraud, and spread spam. Types of malware are viruses, Trojan horses, and worms. Malware symptoms range from annoying popups to erasing your hard drive or even ruining your computer s processor. Learn how to spot Malware, how to eradicate it, as well as prevent it from getting into your computer. A word of caution: A program like Antivirus 2009 looks like a real warning that you have a virus and to click on the link or install button to fix the problem. In reality, you have just invited a virus into your computer by doing so. Only use programs that you know are legitimate antivirus or Internet security programs. Part II Class/Advisory Activities 1. Video 2. Discussion Questions 3. Activities Brainpop Computer Viruses (4:51 minutes) computerviruses/ Extortion Spyware (2:23 minutes) 1. Name several types of malware and explain what each can do to your computer. 2. What are the main ways malware can get into your computer? 3. How can malware be prevented? As a class or individually in a lab, go over On Guard Online Quizzes: Beware of Spyware The Case of the Cyber Criminal Part III Reflection 1. Writing Prompt(s) 2. Journal Writing How does malware affect the following: 1) your home computer, 2) a school computer, 3) a small or large business using multiple computers Do you know of someone whose computer was infected with malware? What were the symptoms? How long was it infected? How the problem was finally resolved? 1

2 Part IV Extension Activities 1. Class/Advisory School Activities See CyberSmart and On Guard Online resources below for lesson plans and activities. Choose ones that you and your students can relate to or that have made news lately. Lead a discussion on the Top 10 Cyber Security Tips with students. Go over CyberSmart Smart, Safe and Secure Online Worksheet with students. 2. Home Interaction Links Talk to your parents about Internet security on your home computers. Is your security software up to date? What basic rules should be followed to prevent malware from infecting your computer? Safeguarding Your Stuff, My Stuff, Our Stuff a checklist for planning a discussion with your family See page three of.pdf document. Click here for a lesson plan for this section. Part V Resources CyberSmart On Guard Online Microsoft Antivirus Reviews Free online workshops for educators to engage students in a digital world. You ll find lesson plans, activities and posters to help students use the Internet safely. Find lessons by grade level. U.S. Government site that provides accurate and up-to-date information about malware. Quick facts about spyware and how to help prevent spyware from infecting your computer. Quick facts about Identity Theft and what to do if your personal information has been compromised. Learn about safety risks and how to help avoid malware ware.mspx Which Antivirus software programs work best? PC.com Review CNet Review 2

3 Top ten Cyber security tips For Teens, their teachers and families Be a responsible cyber citizen. If you use the Internet, you're a citizen of a global community a cyber citizen. Just like being a citizen of your local community, being a cyber citizen has responsibilities. Use the Internet to share knowledge that makes people's lives better. Keep safe, use good manners and respect the laws. Use anti-virus software. A computer virus is a program that can invade your computer and damage or destroy information. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need to be updated regularly. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks! Do not open from unknown sources. Delete from unknown sources. Watch out for files attached to s, particularly those with an "exe" extension even if people you know sent them to you. Some files transport and distribute viruses and other programs that can permanently destroy files and damage computers and Web sites. Do not forward if you are not completely sure that any attached files are safe. Use hard-to-guess passwords and keep them private. Do not write passwords down on small pieces of paper taped to your computer. You would be surprised how many people are sloppy about keeping their passwords private. Passwords that are easy to-guess are a bad choice. In other words, if your name is "Dan" do not make your password "Dan." Change your passwords regularly and don t give your passwords to anyone! Tell your family that combinations of letters, numbers and symbols are harder to crack than just words. Protect computers with firewalls. Install firewalls for your family-it is not difficult. A firewall helps prevent hackers from breaking into your computer or the computers that belong to your family. Firewalls help prevent thieves from stealing and using private information including your phone number and credit card numbers, which may be stored on a family computer. Do not share access to your computers with strangers. Learn about file sharing risks. Your computer operating system may allow other computers on a network, including the Internet, to access the harddrive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. Check your operating system and other program help files to learn how to disable file sharing. Do not share access to your computer with strangers! Disconnect from the Internet when not in use. The Internet is a two-way road. You get information and also send information. Turning off the Internet makes sure that someone else on the Internet can t enter your computer and cause harm. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. Back-up your computer regularly. Help your family back up all household computers onto external media such as CD s or diskettes. Regularly download security protection update patches. Security flaws are regularly found in operating systems and application software. Companies that make software release quick fixes called "patches" that you should install to correct the latest software flaw. It is a good idea to check for security updates on the publisher's Web site for all the software you own. Help your family to check computer security on a regular basis. Evaluate computer security at least twice a year. To help remember, do it when you change the clocks for daylight-savings time! Check for all of the items listed previously. Visit for cyberspace security information. The National Cyber Security Alliance is a government/ industry partnership to help keep computers and cyberspace safe The National Cyber Security Alliance and The CyberSmart! School Program. Duplication permitted for school and home use only. CyberSmart! Visit for free curriculum copublished with McGraw-Hill Education that teaches the skills necessary for safe, responsible and effective computer and Internet use.

4 Smart, Safe, and Secure Online One day, Yukio gets a message online. Assuming it s from a friend, he opens it. Without much thought, Yukio clicks on the hyperlink. It takes him to a Web site showing photos that startle him. Embarrassed, Yukio tries to exit the site. However, new windows keep popping up. Finally, he quits his browser program and deletes the message. He wonders if he did something wrong. Would it have helped if Yukio had checked who sent the message? Explain. Subject: Date: To: From: Sept. 17 It s party time! YF3344@anymail.net jerrymoore@thecommons.com Dear Yukio, Want to party with us? Click here! Yukio also wonders how the sender found him. What do you think? Chat With jerrymoore How should Yukio handle messages from unknown senders in the future? It s party time! W Dear Yukio, ant to party with us? Click here! Smart, Safe, and Secure Online CyberSmart! Education. All rights reserved. Activity Sheet 1 of 3

5 We ve Got Spam for You! Thinking the message must be from a schoolmate, Yukio was excited to get a party invitation. In his haste, he ended up at an X-rated Web site. Had he checked who sent the message, he might have realized that it was from someone he did not recognize. Or he might not have. That s because the sender was trying to trick him into opening the message. It was from a company trying to sell things by sending out thousands of messages at a time. Commercial messages that you didn t ask for are called spam. Many spam offers sound too good to be true ( Make $10,000 a day from home! ), and usually they are! Others may contain messages, pictures, or links to Web sites that are offensive. These companies (called spammers) don t know if you re an adult or a kid everyone gets the same messages. They collect addresses and screen names from many sources, including chat rooms, message boards, and social network profiles. Sometimes they just guess, and often they re correct. Don t Read, Don t Reply When you read spam, the spammer knows your address is live. So if you don t know the sender, don t even open or click on the message even if it includes your name. Simply delete the or close the IM. If you do read the message, never reply even to say Take me off your list. This only encourages the spammer to send more messages. Beware of Attachments and Free Downloads! Spam may seem like no big deal, but it can create very real trouble for you and your family. These messages may have malware attached. Malware is malicious software, created to damage your personal files or your computer, or steal your private identity information. There are many types of malware, of which viruses are one type. Sometimes the malware is hidden in a picture (also called an image). So don t download images or other attachments unless you know the sender and what is in the attachments. Everyone likes the free animations, screen savers, and games you can find online. But think twice before downloading free software. It may be hiding malware. Unless the free software is from a site you and your family trust, don t download it. Smart, Safe, and Secure Online CyberSmart! Education. All rights reserved. Activity Sheet 2 of 3

6 Break the Chain! You know those messages that ask you to forward them to all your friends? They may contain jokes, sad but heart-warming stories, or warnings about dangers that are not true. Such messages are called Internet chain letters. The message comes from a friend, but its content has been passed all over the Internet possibly for years. Chain letters can hide malware that your friend didn t realize was there. So don t download a file attached to chain letters, and don t forward the message! Spam Gone Phishing Some spammers want to steal your private identity information. Such messages appear to come from places you know and trust, such as a bank or online store. The message may ask you to update your account information by clicking on a link. The link takes you to a phony Web site that looks exactly like the real thing. This trick is called phishing. Don t fall for it. Take Action! Create a cyber security cartoon or comic strip to hang at home. It can be serious or funny as long as it makes the point about staying safe and secure online. Sketch and write your ideas below. Help your family fight spam and malware. Always back up your computers update your operating system use and update antivirus and other security software be sure you know what new software does before you install it report spam or phishing to your ISP (Internet Service Provider) Smart, Safe, and Secure Online CyberSmart! Education. All rights reserved. Activity Sheet 3 of 3

7 SAFEGUARDING YOUR STUFF, MY STUFF, OUR STUFF Crime File: High School Hacker An 18-year-old high school senior enters the school building after school hours. He uses passwords stolen from teachers to hack into the school network, changing his grades and changing the grades of some of his friends as well. He installs malware, or malicious code, that allows him to re-enter the network from any computer outside school. Instead of attending his high school graduation, he sits consulting with his lawyer, charged with crimes that, added up, could possibly result in a 38-year prison sentence. What s the Problem? What actions did the young man take that were wrong, broke school rules, and may have been illegal? Who was affected by these actions? What if you were a student at that school how might his actions affect you? Notes: Crime File: Malicious IMs A 19-year-old hacker creates malware that spreads itself through instant messages. The messages, which look like they are from a buddy, invite the victim to look at a photo on a social networking profile. In reality, the link leads to a phony Web site that installs the malicious code on the victim s computer. As a result, all the information stored on the computer, including credit card numbers, can be viewed and copied by the hacker. What s the Problem? What could be the consequences for the victims of this young hacker s actions? Notes: Crime File: Roaming Robots An American employee of a company that sells kitchenware turns his company s computers into a network of virtual robots that earn him extra money while he sleeps. He uses his botnet to infect personal computers all over Europe with malware that displays pop-up ads on command. A second company, an advertising company in the Netherlands, pays him for each software installation. His trial results in a sentence of three and a half years in prison. What s the Problem? How did this person s actions affect his employer? How could they affect the people who owned the computers he infected? Notes: Safeguarding Your Stuff, My Stuff, Our Stuff CyberSmart! Education. All rights reserved. Student Sheet 1 of 3

8 SAFEGUARDING YOUR STUFF, MY STUFF, OUR STUFF Think About It Every day, different parts of the Internet are routinely scanned. There are many reasons people do these scans: Some do it to understand the Internet better, some to invent ways to make it work more efficiently for their business, and others to look for computers to attack. The attacks can come from lone teenage hackers, organized crime rings, or political organizations. Some do it for the bragging rights, while others do it to promote a cause, attack others homeland networks, make money, or steal money from others. The Internet is a two-way street: Information passes into computers and out of computers. So when you connect to the Internet, the computer you use may be open to damage or trickery from anywhere in the world from viruses, worms, Trojans, phishing, and pharming attacks. And because the technology is constantly changing, new threats are constantly being invented. That s why using the Internet means accepting responsibility to help protect your home computers, school computers, public computers, and even your country s computers from attacks. Find Solutions How can you defend your personal computers and the stuff on them against viruses, hackers, identity thieves, and botnet schemes? The best way is to stay informed about the latest security methods and use them regularly. Use critical thinking to evaluate online situations such as unsolicited s and IMs, file sharing, free downloads, and all the other temptations on the Web. Start at the place where your computer meets the network. All Internet connections require a modem. If your computer is connected directly to the modem, you need firewall software to keep the bad guys out. If you have more than one computer in your home or you use a wireless network, it is likely that you also have a router. Routers keep bad guys from scanning your computer. But there are still plenty of other ways for them to get to what they want from you. For example, phishing attacks try to trick you into connecting to a phony Web site and willingly giving out your private identity information. Take Action Have you and your parents had the talk? No, not that one, the one about cyber security. In this case, it s likely that you know more than your parents. So plan to talk to your family frankly about preventing cyber crimes on your personal computers and the public computers they use in the community. In class, do a role play to practice getting your talk just right. At home, answer your family s questions at their level of interest and knowledge. Together, create a list of actions to take to make the computers you routinely use and your information more secure. Don t wait until something bad happens to your computer (slowdowns, crashes, corrupted files, stolen identity information). Make a cyber security plan and stick to it! Safeguarding Your Stuff, My Stuff, Our Stuff CyberSmart! Education. All rights reserved. Student Sheet 2 of 3

9 SAFEGUARDING YOUR STUFF, MY STUFF, OUR STUFF Use the following checklist when planning your discussion with your family. Personal Computers Install antivirus software and update it regularly. Beware of files attached to s. They may be viruses. Don t open them unless you know what s in the file. Make sure you have a firewall on your computer or a router. If you have a wireless network, secure it with a password. Be very careful about the settings you choose when using file-sharing software. If you re not, you could accidentally give others access to private identity information. Disconnect from the Internet when you leave your computer. Back up your files onto external devices, CDs, or Internet servers. Download security and operating system upgrades regularly. Set up different accounts for each family member so that each person will have access only to the things he or she needs. Follow secure password management tips, including changing passwords often. Public Computers Make sure the browser, messaging software, and other programs are not set to remember login names and passwords. Never leave a public computer while you are signed in to one of your accounts. Beware of over-the-shoulder snoops who watch you key in your passwords. When finished, always click log out. Don t just close the browser window. When you are finished, clear the browser history, cookies, and any temporary files created as a result of your browsing. Don t do online banking or use a credit card. Check with owners of the public computers to find out what security precautions they have taken. If they don t have good answers, don t use the computer to log into personal accounts. Safeguarding Your Stuff, My Stuff, Our Stuff CyberSmart! Education. All rights reserved. Student Sheet 3 of 3

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Activities for Protecting Your Identity and Computer for Middle and High School Students

Activities for Protecting Your Identity and Computer for Middle and High School Students Activities for Protecting Your Identity and Computer for Middle and High School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these be

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Protection from Fraud and Identity Theft

Protection from Fraud and Identity Theft Table of Contents Protection from Fraud & Identity Theft... 1 Simple Steps to Secure Your Devices... 1 Setting Up Your Computer and/or Mobile Device... 2 Adding Security Software... 2 Internet Safety Tips...

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware. Activities for Protecting Your Identity and Computer for Elementary and Middle School Students Overview There are three posters about protecting your computer for this grade span. We recommend that these

More information

7 PRACTICES FOR SAFER COMPUTING

7 PRACTICES FOR SAFER COMPUTING 7 PRACTICES FOR SAFER COMPUTING The Committee on Social Responsibility Produced in cooperation with the Federal Trade Commission EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES

More information

Computer Security Self-Test: Questions & Scenarios

Computer Security Self-Test: Questions & Scenarios Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org

Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

October Is National Cyber Security Awareness Month!

October Is National Cyber Security Awareness Month! (0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

STOP THINK CLICK Seven Practices for Safer Computing

STOP THINK CLICK Seven Practices for Safer Computing Seven Practices for Safer Computing Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than earlier generations

More information

7 PRACTICES FOR SAFER COMPUTING

7 PRACTICES FOR SAFER COMPUTING 7 7 PRACTICES FOR SAFER COMPUTING EFFICIENT SHOPPING ACCESS TO INFORMATION, MUSIC, AND GAMES EDUCATIONAL RESOURCES TRAVEL PLANNING SPORTS, HOBBIES, AND SOCIAL NETWORKS CONNECTIONS TO FAMILY AND FRIENDS

More information

i-safe America Internet Safety Tips for Parents

i-safe America Internet Safety Tips for Parents i-safe America Internet Safety Tips for Parents Online predators are out there. They can infect your computer with viruses, they want to steal your personal information and possibly your identity, and

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

Protecting Your Online Identity

Protecting Your Online Identity 25 Chapter 2 Protecting Your Online Identity Overview The job-search process, as well as professional networking, can take place almost exclusively online. As you establish your online presence, it is

More information

Seven Practices for Computer Security

Seven Practices for Computer Security A WorkLife4You Guide Seven Practices for Computer Security Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

How to stay safe online

How to stay safe online How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware

More information

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013 BACKUP SECURITY AND THE CLOUD BACK UP ALWAYS BACK UP TO AN EXTERNAL DEVICE OR REMOVAL MEDIA- NEVER DIRECTLY ON TO YOUR COMPUTER IF

More information

Computer Security. Table of Contents

Computer Security. Table of Contents Computer Security This document was prepared by Barry The Computer Guy and is the sole property of My Computer Professional. Copyright 2004-2005 My Computer Professional British Columbia, Canada. Please

More information

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise

DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Saheel KHOYRATTY. Partner Technology Advisor

Saheel KHOYRATTY. Partner Technology Advisor Saheel KHOYRATTY Partner Technology Advisor The Internet = A World of Opportunities Look what s at your fingertips A way to communicate with friends, family, colleagues Access to information and entertainment

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

BUSINESS ADVISORY GUIDE TO SPYWARE AND VIRUSES

BUSINESS ADVISORY GUIDE TO SPYWARE AND VIRUSES BUSINESS ADVISORY GUIDE TO SPYWARE AND VIRUSES Cyber criminals lurk everywhere and are constantly finding new ways to harm you. Even legitimate websites have sophisticated methods of snooping into your

More information

Emerging Trends in Malware - Antivirus and Beyond

Emerging Trends in Malware - Antivirus and Beyond Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded

More information

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer?

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer? GSG Computers 698 W. Main Street Hendersonville, TN 37075 (615) 826-0017 (615) 826-0346 FAX The Computer People FREE Consumer Awareness Guide: How To Keep Your Computer Safe From Crippling Pop Ups, Viruses,

More information

Online Security Information. Tips for staying safe online

Online Security Information. Tips for staying safe online Online Security Information ProCredit Bank is committed to protecting the integrity of your transactions and bank account details. ProCredit Bank therefore uses the latest security software and procedures

More information

guide to staying safe online How to shop, bank, socialise and protect your identity online.

guide to staying safe online How to shop, bank, socialise and protect your identity online. THE Mcafee guide to staying safe online How to shop, bank, socialise and protect your identity online. contents 1 Introduction 2 Today s Internet: Proceed with Caution 3 Consider the Upsides 4 Be Aware

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are: Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online

More information

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Understanding Internet Security. What you need to protect yourself online.

Understanding Internet Security. What you need to protect yourself online. Understanding Internet Security What you need to protect yourself online. Understanding Internet Security What you need to protect yourself online. Table of Contents SECTION ONE Internet Security: What

More information

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are

More information

Network Security. Demo: Web browser

Network Security. Demo: Web browser Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

HEADS up. stop think connect

HEADS up. stop think connect HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

More information

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Internet Safety & Awareness. Dan Tomlinson 02/23/2013 Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Online Safety for Middle and High School

Online Safety for Middle and High School Online Safety for Middle and High School Presented by Warren County Schools Technology Department 2010-2011 Internet & Technology Safety The purpose of this presentation is to TEACH YOU about INTERNET

More information

Email Security. 01-15-09 Fort Mac

Email Security. 01-15-09 Fort Mac Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging

More information

Recognizing Spam. IT Computer Technical Support Newsletter

Recognizing Spam. IT Computer Technical Support Newsletter IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the

More information

C&G FLUX MARKET Internet Safety

C&G FLUX MARKET Internet Safety Internet Safety Introduction Viruses, Trojan horses, worms, and spyware are all threats that can damage our computer systems. We know we need to protect our computers, but with so many antivirus programs

More information

Online Security Tips

Online Security Tips Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

More information

Music, Film, TV and the Internet. A guide for parents and teachers

Music, Film, TV and the Internet. A guide for parents and teachers Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

More information

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY Note: This section can be taught by the technology teacher or classroom teachers with support from the librarian. Contents: 1. Introduction and Essential

More information

Class 3: Identify Tricks and Scams Online

Class 3: Identify Tricks and Scams Online Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services

Laura Royer, Extension Faculty, University of Florida/IFAS Osceola County Extension Services Consumer Choices: Computer Security Software Prepared by: Dave Palmer, Instructional Media Faculty, University of Florida/IFAS Extension, South Central Extension District Laura Royer, Extension Faculty,

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Why is a strong password important?

Why is a strong password important? Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Things you need to know and do to operate safely online INTERNET SECURITY ESSENTIALS FOR SMALL BUSINESS

Things you need to know and do to operate safely online INTERNET SECURITY ESSENTIALS FOR SMALL BUSINESS Things you need to know and do to operate safely online An initiative of the Australian Government that brings together existing resources, tools and websites to help small businesses understand and manage

More information

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY Hector J. Garcia, Jr., Texas A&M University-Kingsville Dr. Ralph Reilly, University of Hartford Dr. Jack D. Shorter, Texas A&M University-Kingsville,

More information

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Guideline for Prevention of Spyware and other Potentially Unwanted Software Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Case study: What the? Online scams and identity theft

Case study: What the? Online scams and identity theft Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions:

Cyber crime. lingua house. 1 Internet crime. Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + Match the following words to their correct definitions: A A GENERAL ENGLISH Lesson code: 9ZE5-4PDB-KC48 UPPER INTERMEDIATE + 1 Internet crime Match the following words to their correct definitions: 1. hacker a. a computer program which can make copies of itself

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

Preparing Your Personal Computer to Connect to the VPN

Preparing Your Personal Computer to Connect to the VPN Preparing Your Personal Computer to Connect to the VPN (Protecting Your Personal Computer Running Windows) Using the VPN to connect your computer to the campus network is the same as bringing your computer

More information

Internet Safety/CIPA Lesson Plan

Internet Safety/CIPA Lesson Plan Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

More information

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD

More information

Is your data secure?

Is your data secure? You re not as safe as you think Think for a moment: Where do you keep information about your congregants or donors? In an Excel file on someone s desktop computer? An Access database housed on your laptop?

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information