top ten things you should know about cyberethics, cybersafety, and cybersecurity in your classroom...

44
Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Upload: conrad-gallagher

Post on 12-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom

2:15 - 3:00Room 335

Portia Pusey & Davina Pruitt Mentle

Page 2: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#10

Passwords

Page 3: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Fact48% of UK consumers would sell their passwords for under 5£ 30% for under 1 £.http://www.scmagazineuk.com/easter-egg-more-valuable-than-corporate-password-to-employees/article/235285/

Page 4: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

You would not sell your password but…

Would you give it away?

Page 5: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

What is your password protecting?

• Student and personal identity information• Protected student information• Access • Your reputation

Page 6: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Passwords Remedies

• Create strong passwords• Using different passwords for important

information• Change your password if you have shared your

password• Use a password management software or use

a coded system

Page 7: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#9

Thumb Drives

Page 8: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

FactTwo thirds of one “lost and found” thumb drives were infected with malware. http://nakedsecurity.sophos.com/2011/12/07/lost-usb-keys-have-66-percent-chance-of-malware/

Page 9: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

What could be on your USB drive?

• Student data• Personal identity information• Lesson plans• School assignments• Pictures• Resume

Page 10: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Thoughts to consider

• Verify that your computer automatically scans for viruses

• Assume that any drive you are handed by someone else is infected

• Apple computers are equally vulnerable and can spread malware too

• Consider encrypting flash drives

Page 11: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#8

Reputations

Page 12: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

FactAnyone can make a social networking or web page about you.

Page 13: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

What information could someone see?

Page 14: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Manage your Online Reputation

• Positive – Promote yourself like a brand

• Set up alerts• Google Alerts• Me on the Web

• Use Multiple Search Engines• Check

– Technorati (blogs)– Board Tracker (forums)– MonitorThis (20 -rss feeds)– Reputation Defender – Spokeo

http://lifehacker.com/357460/manage-your-online-reputation

14

Page 15: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Control the Message• Flickr (photo sharing): Use your name in the title and description of the image. In

Flickr, you can also add links to comments and HTML. Also, take advantage of tags!• YouTube (video sharing): The title of your video can help a lot. Popular videos are

often ranked high in search results.• Digg (social news): Digg and other social news sites allow you to customize your

profile with your personal information and affiliated websites. There is also room for a short bio where you can emphasize key words.

• Wikipedia (collaborative encyclopedia): Wikipedia is a bit of a tricky one because you're not allowed to edit your own page or your company's page as per their guidelines. However, you can contribute to Wikipedia and use the Talk: page to engage in a discussion.

• Facebook (community): In order to display your profile in the Google results, you will need to change your privacy settings.

• Twitter (micro-blogging): Claim your username on Twitter (before someone else does) and fill out the short bio.

• http://lifehacker.com/357460/manage-your-online-reputation

Page 16: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#7

Bullying and Harassment

Page 17: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

FactSchool is the most common place youth report being bullied (31%)http://www.slideshare.net/PewInternet/cyberbullying-2010-what-the-research-tells-us-4009451

Page 18: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

No matter where, By any name, the results can be the same

• School Violence• Delinquency• Suicide• Depression• Psychological Problems• Substance Abuse• Weapons• Offline Vicitimization

Page 19: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

19

Proactive Approach• Reinforce positive behavior• Encourage Parents to Proactively monitor

– ask to see websites and accounts– search child’s real name, nickname, screen name, friends name,

school, clubs etc.– Check cell phone logs, stored pictures

• Block it– Use block settings

• Document it– List web addresses/emails and dates– Screen shots

• Report it– Local law enforcement– CyberTipLine– ISP of bully /cell phone provider

[email protected][email protected]

Page 20: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Steps for Educators

• If you know about it you must do something– Talk to parents– Inform school administration– Involve school counselors– Document your conversations

Page 21: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#6

Wireless Networks

Page 22: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

FactYou can be arrested for a crime you did not commit.

Page 23: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

School computers, Student Data WiFi

• Connecting to an unsecure wireless network can allow access to your data– Student data?– Personal Data?– Usernames and Passwords– Malware?

Page 24: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Good practice• Encrypt sensitive information

– When storing– When transmitting

• https

• Most Wi-Fi hotspots don’t encrypt the information you send over the internet and are not secure.

• Do not use the same password on different websites. It could give someone who gains access to one of your accounts access to many of your accounts.

• Many web browsers alert users who try to visit fraudulent websites or download malicious programs. Pay attention to these warnings, and keep your browser and security software up-to-date.

• Assure the firewall is working on your computer

Page 25: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#5

Inappropriate Content

Page 26: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

FactFilters fail to filter about 10% of inappropriate content.http://news.bbc.co.uk/2/hi/uk_news/education/8148287.stm

Page 27: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

What should you do?

• Be proactive. Inform students that filters are not 100% effective. If accidental access occurs, teach students to turn off the monitor or close the laptop and tell the teacher.

• Encourage self control, but if that fails. Explain that browsing history in schools is tracked.

• If illegal content is found on the school’s computer network, it’s essential that no-one downloads, prints or emails it (as this can be a criminal offence in itself) and that the suspect computer is not touched (not even turned on or off) so as to preserve the evidence.

• Report it

Page 28: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#4

Intellectual Property

Page 29: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Fact94% of teens go online to do research for school assignments. Almost half do so daily.

Page 30: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Plagiarism & The Internet• 15% have submitted a paper obtained in large part from a term paper

mill or website• 52% have copied a few sentences from a website without citing the

source• 90% of the students using the Internet to plagiarize have also

plagiarized from written sources. (The Web has ‘created’ few new cheaters - 6% of all students.)

Source: Center for Academic Integrity study: Student Cheating in American High Schools. Donald L. McCabe May 2004 http://www.academicintegrity.org

30Copyright 2009: Davina Pruitt-Mentle, Ph.D.: Permission to use

for educational purposes with credit given - 2009 NECC Conference

Page 31: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

“Some Teachers Ignore Cheating”

• 47% of students think teachers sometimes ignore cheating.

• The major reasons students think teachers ignore cheating are:– Don’t want to deal with hassle (18%)– Don’t care (11%)– Not worth trouble on small assignments (7%)

Source: Center for Academic Integrity study: Student Cheating in American High Schools. Donald L. McCabe May 2004 http://www.academicintegrity.org

31Copyright 2009: Davina Pruitt-Mentle, Ph.D.: Permission to use

for educational purposes with credit given - 2009 NECC Conference

Page 32: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Why Students Cheat• Lazy/don’t study/didn’t prepare (32%)

• To pass/get good grades (29%)

• Pressures to succeed (12%)

• Don’t know answers/understand (9%)

• Time pressure - too much work, etc. (5%)

• Other (13%)

Source: Center for Academic Integrity study: Student Cheating in American High Schools. Donald L. McCabe May 2004 http://www.academicintegrity.org

32Copyright 2009: Davina Pruitt-Mentle, Ph.D.: Permission to use

for educational purposes with credit given - 2009 NECC Conference

Page 33: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Strategies to Help Prevent Plagiarism

• Be clear about cheating and plagiarism policies• Discuss as a legal issue of fair use and intellectual property. • Demonstrate how easy it is to check paper mills and internet sources• Have students do an exercise

– Find if someone has plagiarized by using the web– Download a paper from one of the paper mill sites and have students analyze it to

see that these sites produce poor quality work in many cases• Assign current and local topics • Assign an initial research “short paper” on the topic of ethics, cybercheating, or

cyberethics• Be specific about the paper

– Not just general statement “ a paper on the Civil war”– Include how many pages for each section

• Change topics from semester to semester or from class to class• Make sure students know that you read carefully the papers that are handed in • Set example by using properly citied media with Creative Commons Licensing.

33

Source: Pruitt-Mentle, Cyberethics Seminar for Professional Educators: Ethical and Legal Implications for Classroom Technology Use University of Maryland, College Park: July 16-17, 2002

Page 34: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#3

Hacking

Page 35: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

FactIn general there are an average of 156 days between the compromise of a website and detectionhttps://www.trustwave.com/downloads/whitepapers/Trustwave_WP_Global_Security_Report_2010.pdf

Page 36: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Hacking• Miller says he recently heard about a server hijacking case in

Louisiana where a school district's server had been unknowingly usurped to disseminate pornography in China.

• "I remember one incident where students loaded some software onto a computer while the teacher was out of the room," says Charles Garten, director of information support services for the 33,000-student Poway Unified School District, north of San Diego, Calif.

• "Unfortunately for them, they didn't realize they weren't getting into the real grade book program," says Garten. "When the quarter ended and report cards went home, the kids who had purchased better grades got their real grades. There were a lot of unhappy students and a lot of unhappy parents when the students told their parents what had happened."

Page 37: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Students at Potomac school hack into computers; grades feared changed

• “Teachers were told to check grades for anomalies and correct them before first semester report cards are released Feb. 3, according to the sources. But because teachers at the school no longer keep separate log books of their grades, it might be difficult to go back and find a student's original grade, the sources said.

• Some teachers are careful to print out grades immediately after entering them in the system, one source said, but if grades were left on the computer system for any length of time before they were printed out, they could have been modified even on the printed version.”

• http://www.washingtonpost.com/wp-dyn/content/article/2010/01/28/AR2010012803494.html

Page 38: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Prevention Techniques

• Be careful with your password• Log off of a computer when you will not be in

eyesight• Avoid using student thumb drives on teacher

computers• Understand social engineering• If a website seems strange or new, do not log in• If your computer is running slowly or strangely

use care with authentications

Page 39: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#2

Social Engineering

Page 40: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

FactEighty-eight percent of e-mail globally is unwantedhttp://www.aasa.org/SchoolAdministratorArticle.aspx?id=8606

Page 41: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Email

Page 42: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

Don’t Phall for the Phish• Be skeptical• Look carefully at the sender’s address• Look at the header• Consider all attachments and links dangerous• Phishing can happen by phone or in person• HOAX ENCYCLOPEDIA: The About.com Antivirus site has a comprehensive

database of e-mail and virus hoax messages. Before you forward the next "urgent" alert to your family and friends, check for it on this List, find.pcworld.com/64327

• PHISHTANK: A community project, PhishTank is a database of known phishing sites. You can search the database to identify phishing sites, and you can add to the fist any new sites you've encountered, www.phishtank.com

• Report suspicious emails to your IT department and to www.fraud.org

Page 43: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#1

You!

Page 44: Top Ten Things you Should Know about Cyberethics, Cybersafety, and Cybersecurity in your Classroom 2:15 - 3:00 Room 335 Portia Pusey & Davina Pruitt Mentle

#1