NetDay Cyber Security Kit for Schools



Similar documents
ONLINE SAFETY TEACHER S GUIDE:

Similes, Metaphors. & Personification. Writing. Objective: To write own poems, experimenting with active verbs and personification.

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

LESSON 2: JESUS, THE LIGHT OF THE WORLD, IS BORN

YPS Technology, Internet, and Learning Management Systems (LMS) Acceptable Use Agreement (AUP)

Human Rights in the U.S.


1. imagery 2. plot 3. foreshadowing. 10. structure 11. symbol 12. narrative. 13. motif 14. conflict 15. theme

Children who succeed in school have parents who provide lots of support at home! Photo by istockphoto

Haddon Township School District Acceptable Use of Information and Communication Technology for Students

Foxboro Falcons Newsletter

Read the chapter out loud. Describe the main ideas of the chapter in your own words, out loud or in writing.

Florida Standards Assessments. Grades 3-5 English Language Arts Reading, Language, and Listening Answer Key. American Institutes for Research (AIR)

HEADS up. stop think connect

Materials and Preparation Preview the video, Mindful Messaging, and prepare to show it to students.

SCHOOL ALL ABOUT. unit. What school activities do you see in the pictures? Write the numbers. going on a field trip. giving a presentation

How To Teach Your Students To Be Respectful

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

THEME: God has a calling on the lives of every one of His children!

It was late at night and Smartie the Penguin was WIDE awake He was supposed to be fast asleep but tomorrow was his birthday. He was so excited; all

I Wanna Rock Music VIdeo Workshop

Saint Martin s Catholic Academy

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Empowering Your Ministry

Online Safety for Middle and High School

Teaching paraphrasing to year three (3) and four (4) students exhibiting reading difficulties will lead to increased reading comprehension

Cyber Safety For Parents

Lighthouse Christian School Responsible Use Agreement Version 2.0 ( )

The Secret of Cell Phones By R. Howard

STOP. THINK. CONNECT. Online Safety Quiz

Albany Senior High School

100+ Practice Questions for Teacher Interviews

Activities for Protecting Your Identity and Computer for Middle and High School Students

That's the Way I Like It

It s easy to protect our files our school work, our music, our photos, our games everything that we save on our computers from loss by malware.

Homework Activities for Kindergarten

seamless simplicity to a single sign-on for everything.

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

The Story of Your Invention

Stocks and Mutual Funds

Here are the top ten Christmas activities 2009

LESSON TITLE: The House Built on the Rock

TECHNOLOGY. Telecommunication. Tools. What is cyberspace? How does the. Internet work? How do you protect. your computer? Focus

OBJECTIVES. How can I use the phone and to communicate effectively with adults? Phone and Etiquette

Private Today, Public Tomorrow

Computer Lab Rules. Before you enter the lab: Keep your hands clean. Do not bring food or drinks. Throw away your candy or gum to the trash.

14.95 USD Euro Kč. Copyright 2010 by AVG Technologies, N.V. Claude Debussylaan 46, NL-1082 MD, Amsterdam, Netherlands

Cyberbullying. Understanding and Addressing Online Cruelty. Students Handouts and Supporting Materials for Teachers

DW Radio Learning by Ear Computers and the Internet Programme 6 Richard Lough Konstanze von Kotze

Overexposed: Sexting and Relationships & Private Today, Public Tomorrow Grades 9-12

Using Google Docs in the classroom: Simple as ABC

DIGITAL CITIZENSHIP QUIZ

Christmas Theme: The Greatest Gift

SKT for Real Estate Broker

The Money Jars Activity Lesson Use with Camp Millionaire and The Money Game

Guideline on Windows 7 Parental Controls

Lesson Plan: Citing Text Evidence Use with Two Days With No Phone, pages 4-6, and Teens and Texting, page 24

STUDENT S PACKET FOR THE SCIENCE FAIR PROJECT

Introduction to Computer Security

PARAGRAPH ORGANIZATION 1 Worksheet 1: What is an introductory paragraph?

Nursing School 101: What Professors Won t Tell You

What did I learn from participating in the career fair, and how did my presentation contribute to my classmates knowledge?

Intro Lesson (Ages 8-14)

YOUNG PEOPLE, MUSIC & THE INTERNET A GUIDE FOR PARENTS, CARERS AND TEACHERS ABOUT DIGITAL MUSIC AT HOME, AT SCHOOL AND ON THE GO

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

FIRBANK GRAMMAR SCHOOL

Grade 4 Writing Curriculum Map

Kim: Thank you Todd, I m delighted to be here today and totally looking forward to our conversation.

Devotion NT347 CHILDREN S DEVOTIONS FOR THE WEEK OF: LESSON TITLE: The Hall of Faith. THEME: God wants us to trust Him. SCRIPTURE: Hebrews 11:1-40

Grades 3 5 ELA Training Test Answer Key

7 Secrets To Websites That Sell. By Alex Nelson

MEDIA KIT. /kidswrite4kids. /kidswrite4kids.

Introduction to Writing Traits and Writing Strategies

SAMPLE TEST INFORMATION -- English Language Test (ELT) General Information There are three parts to the ELT: Listening, Reading, and Writing.

Mcmillon masters thesis south texas >>>CLICK HERE<<<

Technology Handbook Module 6

i-safe America Internet Safety Tips for Parents

CYBERBULLYING TEACHER S GUIDE:

GAcollege411 Site Overview Transcript

Matthew Searle: Promoting Positive Youth Development through Interaction in an Era of. Isolation

Viruses, Worms, and Trojan Horses

Year 3 Grammar Guide. For Children and Parents MARCHWOOD JUNIOR SCHOOL

Valentine's Tradition By Kelly Hashway

Mammon and the Archer

The Anatomy of a Press Release

ONE DOLLAR AND EIGHTY-SEVEN CENTS.

Internet Safety Kit. A wake-up call for safer surfing online for the young people in your life.

Connectedness and the Emotional Bank Account

IN A SMALL PART OF THE CITY WEST OF

Kingsley Park Primary School. 1-1 ipad Program BYOD

Task 4 Extended writing: The advantages and disadvantages of using mobile phones

It is my pleasure to welcome families, friends, teachers, and our. younger students to graduation day at Wilmington Montessori

ESL Websites. Can Teach A basic website, that offers sound advice and information for teachers. Provides links to hundreds of additional ESL websites.

Save GO QUEEN GO LORD BAN. Froggypop

Bring your Own Device Information and Policy 2015

Classroom Behavior Management Plan

MOBILE PHONE & COMPUTER USE POLICY

EADS up. stop think connect

Self-Acceptance. A Frog Thing by E. Drachman (2005) California: Kidwick Books LLC. ISBN Grade Level: Third grade

Transcription:

NetDay Cyber Security Kit for Schools : A Story about Cyber Security for Children Introduction: This short, entertaining story discusses the importance of computer security and online safety for children. The story was written by Diane Horton, a 4 th grade teacher, and is appropriate for 3 rd 5 th graders. For Classroom Use: Teachers are encouraged to read the story aloud with their class and use the content to discuss computer safety with students. There are also lesson suggestions for how to use the story to illustrate grammar rules. NetDay urges teachers to send the story, along with the companion, : Action Items to Secure your Home Computer, home with the students to encourage families to learn together about safe computing practices. For Families: Read this story with your children, and discuss how your family is practicing safe computing in your home. Use the : Action Items to Secure your Home Computer to find practical suggestions about improving your home computer use and care, and also how to keep your children safe and secure in the online world. About NetDay: NetDay's mission is to connect every child to a brighter future by helping educators meet educational goals through the effective use of technology. NetDay (www.netday.org), a national non-profit organization known for its successful school wiring programs, today manages community and web-based programs that promote enhanced student achievement through the effective use of technology.

A Story about Cyber Security for Children This is the story of a family, and since families come in many arrangements, you will have to fit the story to your family. My story has a girl named Nina and her parents Mame and Perry. Mame and Perry were very good parents, loving their daughter and wishing to make the world her oyster. (A phrase that means if you have money, you can have anything you want.) While they had an abundance of love, they didn t have the kind of money it takes to give Nina the world. Every night after putting Nina to bed, Mame and Perry would sigh and say, If only we could give our only child the gift of knowing all the beautiful and wondrous places in this world -- to bring her the art, music, literature and culture of civilizations old and new. Why, if we had the money, we could even send her exploring through space to discover the universe! At this very moment, a magical robot named Grok heard their wish. Your wish was intercepted in virtual reality, and I m here to tell you that it s not money you need, but technology. A home computer with Internet access (and a few fun games) is the only thing needed to bring the world the universe to your beloved Nina. Perry and Mame jumped up and down with excitement. At last they could give Nina every opportunity, every experience, and all knowledge at her fingertips and they never had to leave home! They began to thank Grok with great enthusiasm, when suddenly s/he shouted, Silence! The world, the universe is full of wonder and beauty and great knowledge, but it is also full of danger, difficulties, and challenges. As loving, responsible parents you must educate yourselves, and then your daughter Nina, in cyber safety. Think of a computer 2

(continued: A Story about Cyber Security for Children) as a passport to universal travel. You wouldn t leave the safety of your home without travel plans. You will need a computer use plan as well. I m going to make this easy. There are eight points in a computer use plan and they conveniently spell the word C-O-M-P-U-T-E-R. I provided boxes so you can check off each item as you learn it and put it into practice. And by the way, I m a robot made by teachers, so there could be a quiz at the end of this lesson. C Central location is important. We can all C (see) the computer. It must be a place that s Convenient for everyone, and some place that can be seen from a distance. A central location is like a great seat at a baseball game. You can C everything so well. O Only Open email from friends. If you don t know whom it s from, delete it before opening or reading it. Unknown email is a rotten apple you can t throw in the trash fast enough. M Monitor your child s computer use. Limit Internet, email, instant messaging, and chat room access. Make sure you always know where your child is going, where s/he s been, and with whom. Make sure you know who her friends are online. Meticulous monitoring keeps computer misuse at a minimum. P Passwords and other Personal information are secrets. Never give anyone account information like your password, address, phone number, or personal information about your age or appearance over the phone or by email. Psst! Wow, passwords and personal information must be kept secret. 3

(continued: A Story about Cyber Security for Children) U Use available anti-virus software. Protecting your home computer from viruses is an important part of keeping your computer healthy, happy, and a valuable member of the family. If you treat your computer with loving concern, you will have a friend for many years. You can purchase any commercially available anti-virus software at a computer store, or download it from the Internet. T Take the Time to backup your files. Keep backup copies of all the files on diskettes or re-writeable CD-roms. Make sure these backup copies are stored in a safe place. This will be a lifesaver if your computer ever breaks down. Or if you accidentally delete files. E Email attachments can cause viruses, so you should never open email attachments that you are not supposed to be receiving, and also if you receive a strange email from a friend s email address, send them a message before opening the email attachment just to be sure it is not a computer virus. R - Responsible parents know the web sites their child has visited and track the work done on the computer. This responsibility applies to children of all ages. 4

Quiz: A Story about Cyber Security for Children (I warned you there could be a quiz.) Use the acronym C-O-M-P-U-T-E-R to find the following: 1. a simile 2. a metaphor 3. an example of alliteration 4. an example of onomatopoeia 5. an example of personification 6. a sentence fragment 7. a run on sentence 8. what responsible parents do Bonus!: Find the phrase that originated in a Shakespeare play. Extra Credit: A teacher designed and built Grok. What do you think s/he looks like? Draw it. List or draw some of the capabilities of a teacher-designed robot. 5

Quiz Answers: A Story about Cyber Security for Children Answers: 1. A central location is like a good seat at a baseball game. 2. Unknown email is a rotten apple you can t throw in the trash fast enough. 3. Meticulous monitoring keeps computer misuse at a minimum. 4. Psst! Wow, passwords and personal information must be kept secret. 5. Protecting your home computer from viruses is an important part of keeping your computer healthy, happy, and a valuable member of the family. If you treat your computer with loving concern, you will have a friend for many years. 6. Or if you accidentally delete files. 7. Email attachments can cause viruses, s0 you should never open email attachments that you are not supposed to be receiving, and also if you receive a strange email from a friend s email address, send them a message before opening the email attachment just to be sure it is not a computer virus. 8. Responsible parents know the web sites their child has visited and track the work done on the computer. 6

Additional Activities: A Story about Cyber Security for Children Bonus! Extra Credit: The phrase make the world her oyster or more accurately, "Why, then the world's mine oyster, Which I with sword will open," is from Shakespeare s play The Merry Wives of Windsor (II, ii, 2-3). Hint: You could have looked that up on your computer using the Internet. That s what I did. It was easy, and it only took me a few minutes. Ah, the advantages of technology used responsibly of course! And they all lived happily, safely, and intelligently ever after. The Beginning (of a wonderful relationship with your computer). 7