RISKS OF SPYWARE. Lesson Procedures



Similar documents
i-safe K 12 CURRICULUM SCOPE 06-07

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

i-safe CURRICULUM SCOPE Elementary Grades K - 5

National Cyber Security Month 2015: Daily Security Awareness Tips

Spyware and Adware What s in Your Computer?

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

Computer Security Maintenance Information and Self-Check Activities

1 Understanding the Radio Station 2 Frequencies AM 535 to 1700 khz FM 88 to 108 mhz 3 FCC Jurisdiction over the use of all airwaves in the United

In order to use the Pearson English Interactive Placement Test, you must first set the test up as a course at MyEnglishLab.com.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Administrator Quick Start Guide

mbank Introduces Personal Security Image MFA* for Consumer on-line banking *Multi-Factor Authentication

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Malware & Botnets. Botnets

User Manual for School Administrators

Faculty Introduction to Self-Service

Retail/Consumer Client. Internet Banking Awareness and Education Program

COMPUTER-INTERNET SECURITY. How am I vulnerable?

CUSTOMER INFORMATION COMMZOOM, LLC PRIVACY POLICY. For additional and updated information, please visit our website at

Degree Programs Offered. Minors Offered. Special Requirements. 236 School of Journalism and Mass Communications

FTC Fact Sheet Identify Yourself

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

STOP. THINK. CONNECT. Online Safety Quiz

YOUNG PEOPLE, MUSIC & THE INTERNET

2011 Cisco NetRiders EMEA National Competitions Frequently Asked Questions (FAQ)

Advertising. Chapter 14. Read to Learn Define advertising. Section 14.1 Advertising Media

Common Cyber Threats. Common cyber threats include:

Thank You! Contents. Promoting SmartDollar Implementing SmartDollar SmartDollar Resource Center Internal Communications...

Introduction to WSU

The Care and Feeding of Your Computer Troubleshooting and Maintenance

HOW TO USE THE ACCESS CODE. Adding Members to Your Group Using the Access Code

HAIKU LMS PARENT MANUAL

Stock Market Challenge Maths, Business Studies and Key Skills Development. Dealing Room Game Teacher s Guide

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Welcome to the NetClassroom Cheat Sheet!

Student Guide to Using Blackboard Academic Suite ver. 8.0

Chapter 3: Teaching Learning Strategies in the Learner- Centered Classroom

The online business simulation game that makes learning fun! Using the School Management Console

Music and the Internet. A guide for parents and teachers

Maryland Technology Literacy Standards for Students

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

National Cybersecurity Awareness Campaign. Kids Presentation

Using the Stock Market Game in Ten Easy Steps!

Electronic Resource Policy and Acceptable Use Guidelines. Kent School District

Creating a Jeopardy Review Game using PowerPoint software.

Florida Standards Assessments

Understanding Native Applications, Tools, Mobility, and Remote Management and Assistance

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

How Spyware and Anti-Spyware Work

Media and Photography

In a browser window, enter the Canvas registration URL: silverlakemustangs.instructure.com

ARE YOU INTERESTED IN A JOB IN BROADCASTING?

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

Student Financial Aid Newsletter

Deter, Detect, Defend

Original brief explanation

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

How to Use Science Media Effectively for Enhancing Teaching and Learning

Protecting Yourself from Identity Theft

SKoolAide Privacy Policy

Website Privacy Policy Statement York Rd Lutherville, MD We may be reached via at

FiOS Quantum TM. Gateway GUEST WI-FI SETUP GUIDE FOR BUSINESS CUSTOMERS

Trustkeeper PCI Compliance Guide for Merchants

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

Business of the Web - CPNT 265 Module 1 Planning a Web site Instructor s Guide

WELCOME TO EASTERN IOWA COMMUNITY COLLEGE

ESL Websites. Can Teach A basic website, that offers sound advice and information for teachers. Provides links to hundreds of additional ESL websites.

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

What you need to know to keep your computer safe on the Internet

Personal Online Banking:

Module 5: Analytical Writing

Frequently Asked Questions Mindful Schools Online Courses. Logging In Navigation s & Forums Tracking My Work Files...

What s the difference between my Home Banking password and my Enhanced Login Security?

NCEPTION REPORT. Short Introduction to use of MESA Training Distance Education LMS

Victoria College Online Course Guide

Version 2 January 2015

Helping Distance Learning

High Speed Internet - User Guide. Welcome to. your world.

Frequently Asked Questions

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Welcome to e2020! Included in this Guide. Tips to Help You Succeed with e2020. Focus on 3 Things: Space, Time, Productivity

WELCOM E Your Set up Guide f or HTC High-Speed Int er net

Application Tracking System for Brokers and Agents

Countermeasures against Spyware

Law College Computer and Technology Information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Self-serve Incentive Program (SIP) User Guide Version 3.0. For use by Industrial Customers for Lighting System and Compressed Air projects

Weston Public Schools Virtual Desktop Access Instructions

Transcription:

i-safe Lesson Plan Suggested Grade Levels Middle Grades RISKS OF SPYWARE Learning Objectives Students will: understand the term spyware and the types of programs it applies to understand the security risks associated with downloading items online understand how personal information may be compromised via spyware Enrichment Goal i-safe enrichment activities are designed so that they can be implemented by students. Provide your students with the necessary reference materials included with this lesson plan and guidance on how they can complete this activity. Suggestions include getting support from an adult advisor, school club, student council, technology team, etc. i-safe also offers a wide range of online support for students who register (free of charge) at www.isafe.org, including the i-mentor Training Network videos. In this lesson, learners will develop Public Service Announcements (PSA) to inform others about spyware. The enrichment activity will provide guidance to broadcast one or more of the PSAs at school or through local news media. Materials / Preparation online access to the i-safe assessments, if appropriate for this lesson a copy of the reference page for each student a copy of the activity page for each student student registration in mentor program at www.isafe.org Pre Assessment If beginning the i-safe program with this lesson, administer the pre assessment online at www.isafe.org by clicking on the link, Assessments, prior to the lesson. To verify School ID#, login at isafe.org, go to the My Info page and select Find your school ID. Lesson Procedures All students participating in the i-safe curriculum are considered to be mentors. If they haven t done so already, have students enroll online by clicking on Create Account at www.isafe.org to take full advantage of the support and incentives offered. This may be done at any time during the lessons, or students may complete this registration at home. If you would like to register your students yourself simply go to http://www.isafe.org/teachermentorprogram and fill out the information for your students and email to outreach@isafe.org. Your students will then be enrolled to receive information about sharing internet safety with other students and will be registered to participate in contests to win prizes. 2006 i-safe Inc. Risks of Spyware 1

Discussion Ask students if they have ever downloaded anything from online (games, papers, music, software, etc). Ask students if they have ever read a disclosure/privacy statement from an online website. Did they understand what they were reading? Ask students if they know the terms spyware and adware and to self define them. Activity Pass out the reference page. Break students into small groups. Have students read through the information and develop a list of types of websites that might install spyware on users computers. Meet back as a large group and discuss the lists. Discuss possible ways to prevent or safeguard against the risks of spyware. Ask for examples from students of ways, if any, that they already deal with spyware Peer-to-Peer Activity Allow students to meet back in their small groups. (Groups of 2-3 may work best. Or have students work individually) Hand out the activity page to students. Have each student group develop a Public Service Announcement informing others on possibility of spyware and adware bundled into downloads. Share PSAs among class. Concluding Discussion Review what spyware is and the necessity for precautions when downloading items online. Discuss why it is important to discuss cyber security issues with others and how to be proactive in dealing with it. Ask students who they think would benefit from this information and why. Discuss ways to broadcast the PSAs outside the classroom. Lead into a discussion about the Enrichment Activity. Enrichment Activity Youth who participate in activities to share what they have learned about Internet safety are more likely to practice safe habits online. Additional lessons and support for students, teachers, and parents on Internet safety topics are available from i-safe Inc. www.isafe.org. Broadcast Public Service Announcements Students will find broadcast one or more of the PSAs developed in during the lesson over the school s public address system, during assemblies, and/or school news broadcasts, or videotape for distribution. Student instructions: 1. Find a Media Outlet will it be at your school or in the larger community? Brainstorm where can PSAs be played in your school or in your city? 2006 i-safe Inc. Risks of Spyware 2

Some possibilities: over the school PA system, at assemblies, over the radio, on a local news station, over the PA at a baseball game. What new ones can you come up with? 2. If going outside of the school, contact the media outlets to develop a cooperative agreement for broadcasting the PSAs. Contact the media outlet before preparing your PSA to get their specific requirements regarding length, format, etc. Be prepared on your topic so you can sell them on the idea over the phone Broadcast/Deliver PSA Based upon media outlet select media type audio, video, or live Fine tune your PSA do you need to make any changes or final edits for the selected broadcast format? (i.e. audio, video, etc.) Record the PSA (unless doing it live) Provide PSA through the selected media outlet. Let i-safe know about your success. Email outreach@isafe.org. Post Assessment Administer the post assessment online at www.isafe.org by clicking on the link, Assessments, if this is your last lesson for i-safe. To verify School ID#, login at isafe.org, go to the My Info page and select Find your school ID. Contact us We d like to hear from you! E-mail teachers@isafe.org to share any unique ideas and/or experiences you had during implementation of this lesson. Students who participate in enrichment activities may be eligible for i-safe s monthly Most Valuable Mentor award let us know about deserving students. 2006 i-safe Inc. Risks of Spyware 3

Have you noticed that your computer and/or Internet connection is running slowly, or that you are getting lots of pop-ups? These are signs that your computer might have a spyware program running on it. Spyware are programs that are typically loaded onto your computer without your knowledge when you download another program. These programs gather information about you and report it back to a monitoring program using your Internet bandwidth to do so. Spyware can monitor a user's web activity, scan files, create popup ads, log keystrokes, change the default page on the web browser, and even gather personal information such as password and credit card information. Sometimes spyware is listed as adware in disclosure notices. So read carefully before downloading! In fact many downloads can advertise NO Spyware but that doesn t mean you aren t getting adware! Guard Against Spyware! Taking steps against spyware will help to keep your computer safe and secure and keep your personal information private. Follow these 4 steps to computer security and protection: Step 1 use a firewall Step 2 update your operating system regularly Step 3 use virus protection software Step 4 use spyware protection software Remember that virus and spyware protection software will only work if you use it. Run a scan regularly. 2006 i-safe Inc. Facts About Spyware

Public Service Announcements - PSA Grab people s attention and educate them at the same time! Your Goal Explore the safety issues involved with spyware and develop a public service announcement to educate others about how to defend your computer against spyware attacks. The PSA can be audio, video, or live. Part of the project is locating a broadcast medium. Materials/Preparation Background knowledge on spyware and other cyber security risks Computer with Internet access (recommended) Materials of choice for developing PSA (video, audio, etc.) Obtain cooperation with school media outlet, radio, TV, or other broadcast medium Issues Take a minute and think about the following before you decide how to present your information. How can Internet Safety PSAs be of service to others? What information do you consider critical when it comes to information about spyware. Who is this information critical for? How can you grab people s attention and make them listen to your important message? Based on what you know about spyware, what information will be most beneficial? Preparation 1. Go to www.isafe.org and review the celebrity PSAs 2. Find a Media Outlet will it be at your school or in the larger community? 3. Brainstorm where can PSAs be played in your school or in your city? Some possibilities: over the school PA system, at assemblies, over the radio, on a local news station, over the PA at a baseball game. What new ones can you come up with? 4. If going outside of the school, contact the media outlets to develop a cooperative agreement for broadcasting the PSAs. Contact the media outlet before preparing your PSA to get their specific requirements regarding length, format, etc. Be prepared on your topic so you can sell them on the idea over the phone Develop and Deliver PSA 1. Based upon media outlet select media type audio, video, or live 2. Write the script that pertains to your topic and presentation style (i.e. audio, video, etc.) 3. Record the PSA (unless doing it live) 4. Edit the PSA with original music and titles. (i-safe provides a free library of legal music and graphics at www.isafe.org.) 5. Provide PSA through the selected media outlet. 6. Let i-safe know about your success. Email outreach@isafe.org. www.isafe.org ~ Send a copy of your own PSA to i-safe so we can hear about your creativity. Your PSA may be used in future T-Kits! ~