Cyber-Security

Introduction

Michael was going through his e-mail. There was a great offer for a free laptop. All he had to do was go to this website and enter a contest. The form asked for his name, address, phone number, and e-mail address....

Terry was downloading some music off a p2p website. Suddenly his computer has a virus.

Activity:

Describe the problem and create a list of guidelines to help students protect their privacy, personal information, and their computers.


Focusing Questions


  • In what way does one need to secure their computer?
  • What common approaches do cyber-crooks use to get your private information? How can you stop them from being successful?
  • Vocabulary:
    • Phishing
    • Worms
    • Trojans
    • Spyware, Malware, Adware
    • Spam
  • How would you recognize if a site is secure?

http://www.teachertube.com/view_video.php?viewkey=21445772454cbddf0cac


http://www.teachertube.com/view_video.php?viewkey=4c7073c81c32a6d750b9


http://www.teachertube.com/view_video.php?viewkey=0a6df8f40c4490e2053b

Resources:

Phishing Scams: In Plain English
http://www.commoncraft.com/phishing

1. Block, Sandra. "Identity theft's a big pain, but." USA Today 6 Feb. 2007. 2
Sept. 2008 <http://usatodayeducate.com/wordpress/?dl_id=7>.

2. Youngs, Laura. "Common scams to be aware of as a consumer, business owner ."
The Augusta Chronicle (GA) 11 Mar. 2007. Newspaper Source. EBSCO. 7
Sept. 2008 <http://search.ebscohost.com/login.aspx?direct=true&db=nfh&AN=2W62W61884891039&site=src-live>.

3. http://www.staysafeonline.org/content/safe-and-secure-practices

4.http://www.staysafeonline.org/content/ncsa-awareness-videos (video #3)

5. http://www.us-cert.gov/cas/tips/