Group+Five

Introduction
Michael was going through his e-mail. There was a great offer for a free laptop. All he had to do was go to this website and enter a contest. The form asked for his name, address, phone number, and e-mail address....

Terry was downloading some music off a p2p website. Suddenly his computer has a virus.

Activity:
Describe the problem and create a list of guidelines to help students protect their privacy, personal information, and their computers.

Focusing Questions

 * In what way does one need to secure their computer?
 * What common approaches do cyber-crooks use to get your private information? How can you stop them from being successful?
 * Vocabulary:
 * Phishing
 * Worms
 * Trojans
 * Spyware, Malware, Adware
 * Spam
 * How would you recognize if a site is secure?

http://www.teachertube.com/view_video.php?viewkey=21445772454cbddf0cac media type="custom" key="1895595"

http://www.teachertube.com/view_video.php?viewkey=4c7073c81c32a6d750b9 media type="custom" key="1895603"

http://www.teachertube.com/view_video.php?viewkey=0a6df8f40c4490e2053b media type="custom" key="1895625"

Resources:
Phishing Scams: In Plain English http://www.commoncraft.com/phishing

1. Block, Sandra. "Identity theft's a big pain, but." USA Today 6 Feb. 2007. 2 Sept. 2008 .

2. Youngs, Laura. "Common scams to be aware of as a consumer, business owner ." __The Augusta Chronicle (GA)__ 11 Mar. 2007. __Newspaper Source__. EBSCO. 7 Sept. 2008 .

3. http://www.staysafeonline.org/content/safe-and-secure-practices

4.http://www.staysafeonline.org/content/ncsa-awareness-videos (video #3)

5. http://www.us-cert.gov/cas/tips/