hecctw11

45
1 HECC Driver’s Education for the Information Highway

Upload: bneligan

Post on 19-Jan-2015

293 views

Category:

Education


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: HECCTW11

1

HECCDriver’s Education for the Information Highway

Page 2: HECCTW11

2

Driver’s Education for the Information Highway

• Analogous to driving a car• Benefits and risks• We work hard to make sure

our students have skills and knowledge they need

Page 3: HECCTW11

3

Driver’s Education for the Information Highway What we’ll cover today

• Protect your vehicle and yourself– Major risks we face when working online and using email– Ways we can minimize these risks– Protect your passwords

• Stay safe when sharing the road– Risks we encounter when using social networking sites (e.g. cyberbullying)– What technology and education experts recommend for managing those risks

• Drive carefully– Is information you post really private?– When we delete it, is it really gone?

• Know the rules of the road– Verify content accuracy– Guard against plagiarism

Page 4: HECCTW11

4

Safe Driving on the Information Highway:Protect your vehicle

• Risks– Unsafe disclosure of personal

information• Active and passive

– Malware (Malicious Software)

Page 5: HECCTW11

5

Safe Driving on the Information Highway: Protect your vehicle

Page 6: HECCTW11

6

Safe Driving on the Information Highway: Protect your vehicle

• Unsafe disclosure of personal information– What

• Usernames

• Passwords

• Social Security numbers

• Credit card numbers

• PIN numbers

• Information that can be used to locate you, like address, phone number, etc.

Page 7: HECCTW11

7

Safe Driving on the Information Highway: Protect your vehicle

• Unsafe disclosure of personal information– How

• You reveal

– Social engineering

– Unintentional sharing

• Stolen by malware

Page 8: HECCTW11

8

Safe Driving on the Information Highway: Protect your vehicle

• Social engineering– Art of manipulating people into

performing actions or divulging confidential information• Phishing

• Baiting

Kevin Mitnick

Page 9: HECCTW11

9

Safe Driving on the Information Highway: Protect your vehicle

• Phishing– Email appears

legitimate– Urgent– Site requests

information– Often contains

malware

Page 10: HECCTW11

10

Safe Driving on the Information Highway: Protect your vehicle

• Phishing– Seems obvious, but people reply

Page 11: HECCTW11

11

Safe Driving on the Information Highway: Protect your vehicle

• Phishing: How to protect yourself– Be aware and make sure students are aware no legitimate business or

organization will EVER ask you to send personal information via email or unsecured site

– Never click on a link in an email unless you know source

– Whenever entering information in a site, look carefully at url

– Use anti-virus program that has phishing filter

Page 12: HECCTW11

12

Safe Driving on the Information Highway: Protect your vehicle

Page 13: HECCTW11

13

Safe Driving on the Information Highway: Protect your vehicle

• Baiting– Attacker leaves malware infected

media in location sure to be found– Makes label enticing– Malware loaded when media

inserted into computer

Page 14: HECCTW11

14

Safe Driving on the Information Highway: Protect your vehicle

• How to protect yourself from baiting

– Simple. Never insert a flash drive, cd etc into your computer that is not yours or from a source you trust

Page 15: HECCTW11

15

Safe Driving on the Information Highway Protect your vehicle

• Unintentional sharing: What is it?

– Photos with identifying information– Public messages (Myspace wall)

with identifying information

Page 16: HECCTW11

16

Safe Driving on the Information Highway Protect your vehicle

• Unintentional sharing: How to avoid

– Carefully look at and coach your students to carefully look at and think through all information they post online

Page 17: HECCTW11

17

Safe Driving on the Information Highway Protect your vehicle

• Malware– Once loaded can work 24 hours a

day• Transmitting your personal

information

• Downloading advertisements

– Hijack your computer for its own use

Page 18: HECCTW11

18

Safe Driving on the Information Highway Protect your vehicle

• How malware gets installed– Trick you into clicking link

• File download

• Active X

– Sometimes act of canceling or trying to close pop up will activate installation

– Trojan in freeware• Screensavers, etc.

Page 19: HECCTW11

19

Safe Driving on the Information Highway Protect your vehicle

• How to protect yourself from malward– Anytime you are installing freeware

• Read license agreement carefully

• Check publisher’s website carefully

• Do web search with keywords: name of program, adware, spyware

– Install pop up blocker– If you click on link and see install dialog box

don’t hit yes unless you are sure of source

Page 20: HECCTW11

20

Safe Driving on the Information Highway Protect your vehicle

• Protect your passwords– Use strong passwords

• 8-13 characters

• Letters and numbers or special characters

• Not complete words

– First letter or each word in a phrase

– Hard to guess. Easy to remember.

Page 21: HECCTW11

21

Safe Driving on the Information Highway Protect your vehicle

• Don’t use– “password” “passcode” “admin” etc.– Anything people would know about you

• Pets name, child’s name, birthday, etc.

– Swear word

Page 22: HECCTW11

22

Safe Driving on the Information HighwayProtect your vehicle

• Protect your passwords– Never share it– Never write it down

Page 23: HECCTW11

23

Safe Driving on the Information HighwayProtect your vehicle

• Summary– Don’t open email if you don’t know who it is from

– Don’t click on a link in email unless you trust source

– Don’t open an attachment or download a file unless you trust source

– If you ever do click on a link in an email, carefully check url

Page 24: HECCTW11

24

Safe Driving on the Information HighwayProtect your vehicle

• Point your browser to http://hecctw11.ning.com/• Click sign up• Upload your photo if you brought one and fill out your

profile• Click on “My Settings” and edit/add to “About me,”

“Privacy,” and “Email.”• Under privacy, for today’s purposes, I recommend letting

anyone view and comment on your pages.

Page 25: HECCTW11

25

Driver's Education for the Information HighwayStay safe when sharing the road

• Myspace = 200 million

• Facebook = 39 million

Page 26: HECCTW11

26

• 93% of American teens use internet (12-17) 1

• 96% of students with online access report they have used Driver's Education for the Information Highway 2

• 51% of boys, 58% of girls created profiles on social networking sites 3

• 9-17 year olds spend about 9 hours a week on social networking activities 1

Driver's Education for the Information HighwayStay safe when sharing the road

Page 27: HECCTW11

27

How do teens use social networking sites?

Teens & Friends on Social Networking Sites

What are the different ways you use social networking sites? Do you ever use those sites to…?

Yes No

Stay in touch with friends you see a lot 91% 9%

Stay in touch with friends you rarely see in person 82 18

Make plans with your friends 72 28

Make new friends 49 50

Flirt with someone 17 83 Source: Pew Internet & American Life Project Parents & Teens Survey, October-November 2006. Based on teens who use social networking sites [N=493] Margin of error is ±5%.

Driver's Education for the Information HighwayStay safe when sharing the road

Page 28: HECCTW11

28

• Social networking sites: Risks

– Unsafe disclosure of personal information1

– Cyberthreats1

– Risky sexual behavior1

– Dangerous communities1

– Addiction1

– Anonymity2

– Cyberbullying1 (let’s take a closer look)

1 Source: Nancy E. Willard, A Briefing for Educators: Online Social Networking Communities and Youth Risk. 2006.http://csriu.org/cyberbully/docs/youthriskonlinealert.pdf2 Source: Magid, Larry, and Collier Anne. MySpace Unraveled: a Parent's Guide to Teen Social Networking. Berkeley, CA: Peachpit Press, 2007

Driver's Education for the Information HighwayStay safe when sharing the road

Page 29: HECCTW11

29

• Cyberbullying: What is it?– Flaming – Harassment– Denigration– Impersonation– Outing– Trickery– Exclusion– Cyberstalking

Source: Nancy E. Willard. “Educator’s Guide to Cyberbullying and Cyberthreats. April 2007. http://www.cyberbully.org/cyberbully/docs/cbcteducator.pdf

Driver's Education for the Information HighwayStay safe when sharing the road

Page 30: HECCTW11

30

Driver's Education for the Information HighwayStay safe when sharing the road

• Cyberbullying: What’s different?– 24/7 and the invasion of

home/personal space – The audience can be very large

and reached rapidly – People who cyberbully may

attempt to remain anonymous

Source: Childnet International. 2007. http://safesocialnetworking.com/img/safety/Cyberbullying_1.pdf

Page 31: HECCTW11

31

Driver's Education for the Information HighwayStay safe when sharing the road

• Cyberbullying: What to do?– No single solution – Five key areas

• Understand and talk about cyberbullying

• Update existing policies and practices

• Make reporting cyberbullying easier

• Promote the positive use of technology

Source: Childnet International. 2007. http://safesocialnetworking.com/img/safety/Cyberbullying_1.pdf

Page 32: HECCTW11

32

Driver's Education for the Information HighwayStay safe when sharing the road

• Social networking sites: Safety resources

Page 33: HECCTW11

33

Driver's Education for the Information HighwayStay safe when sharing the road

• Social networking sites: Safety resources

Page 34: HECCTW11

34

• Guide students to:

– Be kind to others online.1

– Think before you post. Not private. 1 – Report to an adult if someone posts threats of violence

to self/others. 1 – Develop “stranger danger” detection skills. 1

– Report to adult if you think you’ve been contacted by predator. 1

– Do not check “remember box” on public computer. 2

– Don’t post personal information that will make you vulnerable. 2

– Never share your password. 2

1 Nancy E. Willard. “The MySpace Phenomenon” www.Galeschools.com2 Source: Magid, Larry, and Collier Anne. MySpace Unraveled: a Parent's Guide to Teen Social Networking. Berkeley, CA:

Peachpit Press, 2007

Driver's Education for the Information HighwayStay safe when sharing the road

Page 35: HECCTW11

35

• “For the most part, these (MySpace users) are just average everyday, good kids . . . and this is part of their social life.”

Detective Frank Danahey15 year veteran Youth Division police officer in Rocky Hill, Connecticut

Source: MySpace Unraveled: A Parent’s Guide to Teen Social Networking, Larry Magid and Anne Collier (p16)

Driver's Education for the Information HighwayStay safe when sharing the road

Page 36: HECCTW11

36

• Educate staff, students, and parents about safe and responsible internet use

• Using a filter to block social networking sites is not an effective strategy

• Set guidelines the direct students not to access social networking sites at school

• Know terms of site Use Agreement and use them

• Incorporate online speech into School threat assessment and suicide prevention plans

• Define process to effectively respond to misuse reports

Source: Willard, Nancy E.. “A Briefing for Educators: Online Social Networking Communities and Youth Risk” (2006)

Driver's Education for the Information HighwayStay safe when sharing the road

Recommendations for schools

Page 37: HECCTW11

37

Driver's Education for the Information HighwayStay safe when sharing the road

• NSBA report– Explore social networking sites

– Consider using social networking for staff communications and professional development

– Find ways to harness the educational value of social networking

– Ensure equitable access

– Reexamine social networking policies• Safety policies remain important, as does teaching students about online

safety and responsible online expression — but students may learn these lessons better while they’re actually using social networking tools

Page 38: HECCTW11

38

Driver's Education for the Information HighwayStay safe when sharing the road

• Exercise

Page 39: HECCTW11

39

Social Networking TechnologiesDrive carefully

Public

Access through friend of a friend

Hacking

PermanentCachingWayback

Make sure students understand everything they post online is

Mitrano, Tracy. Thoughts on Facebook. April, 2006. Cornell University. Ithica, NY <http://www.cit.cornell.edu/policy/memos/facebook.html>

Page 40: HECCTW11

40

Social Networking TechnologiesDrive carefully

• Exercise

Page 41: HECCTW11

41

Magid, Larry and Collier Anne. MySpace Unraveled: A Parent’s Guide to Teen Social Networking

Social Networking TechnologiesKnow the rules of the road

Page 42: HECCTW11

42

Magid, Larry and Collier Anne. MySpace Unraveled: A Parent’s Guide to Teen Social Networking

Social Networking TechnologiesKnow the rules of the road

Page 43: HECCTW11

43

Social Networking TechnologiesDrive carefully

• Exercise

Page 44: HECCTW11

44

Social Networking TechnologiesDrive carefully

• Exercise

Page 45: HECCTW11

45

Thank you!