BE SAFE ONLINE: Lesson Plan

Similar documents
& INTERNET FRAUD

Don t Fall Victim to Cybercrime:

Malware & Botnets. Botnets

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Protecting Yourself from Identity Theft

Cyber Security. Securing Your Mobile and Online Banking Transactions

National Cyber Security Month 2015: Daily Security Awareness Tips

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Learn to protect yourself from Identity Theft. First National Bank can help.

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

How to stay safe online

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

Identity Theft Protection

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Corporate Account Takeover & Information Security Awareness. Customer Training

Remote Deposit Quick Start Guide

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Desktop and Laptop Security Policy

Cyber Security Awareness. Internet Safety Intro.

Protecting your business from fraud

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Information Security Awareness

Infocomm Sec rity is incomplete without U Be aware,

Module 5: Analytical Writing

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Deter, Detect, Defend

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Activities for Protecting Your Identity and Computer for Middle and High School Students

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Payment Fraud and Risk Management

PREVENTING HIGH-TECH IDENTITY THEFT

Retail/Consumer Client. Internet Banking Awareness and Education Program

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

What are the common online dangers?

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Top 10 Tips to Keep Your Small Business Safe

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Internet threats: steps to security for your small business

Tips for Banking Online Safely

Advice about online security

2009 Antispyware Coalition Public Workshop

Cyber Security Survival Guide

General Security Best Practices

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Corporate Account Take Over (CATO) Guide

High Speed Internet - User Guide. Welcome to. your world.

Frequently Asked Questions (FAQ)

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

OIG Fraud Alert Phishing

Internet basics 2.3 Protecting your computer

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Countermeasures against Spyware

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Cybersecurity Best Practices

Understand What s Going On

Information Security. Louis Morgan, CISSP Information Security Officer

Protection from Fraud and Identity Theft

Business ebanking Fraud Prevention Best Practices

3 day Workshop on Cyber Security & Ethical Hacking

Security Fort Mac

Protect yourself online

Threat Events: Software Attacks (cont.)

Avoid completing forms in messages that ask for personal financial information.

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

CHAPTER 10: COMPUTER SECURITY AND RISKS

Computer Security Literacy

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

What you need to know to keep your computer safe on the Internet

Network Security and the Small Business

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Transcription:

BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take to avoid being vulnerable to online predators. Lesson Objective(s) Identify and avoid potential online fraud Time 1 class period Background Digital devices make life simpler in some respects and more complicated in others. For every app that makes your life easier or more interesting there are frauds and scams that can make your life more difficult. While fraudsters continuously create new ways to capture your personal information and/or your hard earned cash, using a few simple rules can help anyone be safe online. Materials Lesson Content Vocabulary List Vocabulary List Prompts Podcast/Video-Be Safe Online Student Activity-Be Safe Online:,, Prompts-Be Safe Online:,,,, Maybe if.. Signs Procedures 1. Print and post, and Maybe if signs. 2. Distribute Student Activity-Be Safe Online:,, and give students time to complete. 3. When the activity sheets are completed, read statement number one aloud and ask participants to stand and move to the sign that reflects their educated opinion. NOTE: Tell participants that the discussion that follows will be about complex ideas and issues and knowledge of technology may affect their answers. An educated opinion is one that can be explained by using facts. 4. Ask a sampling of participants under each sign to explain or defend their position. Leader can add facts and ask questions of the participants. 5. As opinions and facts surface allow participants a chance to move to another location. 6. View Be Safe Online. 7. Review Student Activity-Be Safe Online:,, Ask students what opinions changed after viewing the video and having the discussion. Extension 1. Distribute Vocabulary Worksheet 2. Assign students to define only the vocabulary they are confident they understand. 3. Discuss and define vocabulary with students Discussion Questions 1. What personal information have you shared online in the past? What prompted you to share? 2. Why might a prospective employer be interested in your social networking profile? 3. Do you think teenagers or adults are more aware of safeguarding their online information? Explain.

ConsumerMan Video for LifeSmarts 4: Be Safe Online Vocabulary List Name: adware anti-spyware computer forensics cybercrime spam firewall hacker identity theft worm virus Trojan keystroke logger malware phishing ransomware smishing

ConsumerMan Video for LifeSmarts 4: Be Safe Online Vocabulary List Prompts adware Software that has advertisements embedded into the program anti-spyware Software that detects and removes spyware from a computer computer forensics cybercrime Investigation and analysis techniques that gather and preserve data from a computing device Criminal acts using computers, networks and/or the Internet spam Electronic junk mail firewall hacker identity theft worm virus trojan keystroke logger or keylogger malware phishing ransomware smishing Hardware or software that blocks unauthorized communications to or from your computer; helps prevent hackers from accessing your computer Person who uses the Internet to access personal or business computers without permission All types of crime in which someone obtains and uses another person's personal data in a way that involves fraud or deception, typically for economic gain A sub class of virus that can travel without being attached to a program or data file and without human action; a worm can replicate itself thousands of times Malicious code embedded in a data or program file, spread from one device to another by opening an executable file. A virus is spread by human action Malware that appears to be a legitimate program, but when activated often causes loss or theft of computer data Software that can record every keystroke you make on your computer. Used to record and capture data input. (Keyloggers are often used by employers to insure computer use is work related) Short for malicious software; includes viruses and spyware that steal personal information, send spam and commit fraud Email sent that misrepresents the sender as legitimate and with the intent of having the recipient reveal private information that can be used for identity theft Malware that locks a computer system or encrypts computer files until a "ransom" fee is paid A variation of phishing using SMS (short message service) to send misleading text messages

ConsumerMan Video for LifeSmarts 4: Be Safe Online Discussion Prompts 1. If you know how, online posts and cell phone texts can be permanently deleted. Nothing sent into cyberspace is ever really gone. Files may be deleted from servers, but there is no way to know if they are in storage. 2. Experts say it is safe to follow a link in a friend s email or on a trustworthy website. Experts say to enter the website you want to visit in your browser. It is safer than clicking through. 3. Smart phones do not need security software, but your computer and notepad do. Smart phones need security software and system updates just like your computer. 4. Worms, Trojans and viruses are names for the same thing. They are all forms of malware, but each operates a little differently. Viruses are code embedded in a data or program file. Worms are separate from other applications and run in the background on your computer. Trojans are sneaky, you think they are one thing, but they are something else that is purposely designed to cause problems. 5. Identity theft is a crime aimed at adults, not teens. Identity thieves steal information from people of all ages. Your personal information can create an identity for someone else to use for many purposes. 6. One type of computer malware can log your keystrokes, recording everything you type on your keyboard, including your passwords. Keystroke loggers want to steal your private information and use it for their gain. 7. It is more difficult to distinguish between a fake and an authentic webpage on a mobile device than it is on a computer. On a mobile device, the screen is small and it is difficult to see the entire URL bar, the main piece of information that could alert you to phishing. 8. Most teenagers know what private information to protect when using the Internet. You would never reveal your social security or bank account numbers, but teenagers routinely reveal birthdates, addresses and unique information that is very helpful to an identity thief. 9. If you do not open a digital file, there is no risk of infecting your computer or smart phone with a virus. Viruses and malware can enter your devices in a wide variety of sneaky ways. It is important to have and update security software. 10. The three most common passwords used in the United States are password, password1 and 123456. These most common passwords are an invitation to hackers.

ConsumerMan Video for LifeSmarts 4: Be Safe Online DIRECTIONS: Check the box next to each statement that best describes your current opinion. In the Because space below each explain why you think your answer is correct. 1. If you know how, online posts and cell phone texts can be permanently deleted. 2. Experts say it is safe to follow a link in a friend s email or on a trustworthy website. 3. Smart phones do not need security software, but your computer and notepad do. 4. Worms, Trojans and viruses are names for the same thing. 5. Identity theft is a crime aimed at adults, not teens. 6. One type of computer malware can log your keystrokes, recording everything you type on your keyboard, including your passwords. 7. It is more difficult to distinguish between a fake and an authentic webpage on a mobile device than it is on a computer.

8. Most teenagers know what private information to protect when using the Internet. 9. If you do not open a digital file, there is no risk of infecting your computer or smart phone with a virus. 10. The three most common passwords used in the United States are password, password1 and 123456.