Five Steps to Becoming an Information Security Expert! Information Security Basics for Students

Similar documents
Speaking Notes for Grades 4 to 6 Presentation

The little BIG book of badness

(Children s e-safety advice) Keeping Yourself Safe Online

STOP! THINK! FOCUS! Stay Safe Online.

Online Safety & Security

INTERNET SAFETY. OBJECTIVES: 1. Internet safety what is true and what is false? 2. & Instant Messaging safety 3. Strangers on the Internet

Circle Link 1 Online Rules of the Road

How Teachers Can Help Me. Authored by

Suggest holding off until next time you visit, so you can ask your parents first.

To Get You From Crayons to College.

Assembly Script. Give children 30 seconds to talk to the person next to them. Take a couple of examples.

Created by Angela Jurgensen 2018

Child Friendly Safeguarding Policy

Scenario 1 In the Trash. Scenario 2 Playing PS2. Scenario 3 Hurt Feelings

Why do people set goals?

Resentment is like drinking poison and then hoping it will kill your enemies.

Appendix D: 7th-9th Grade Survey Instrument

LESSON PLAN: FEELING SAFE AND UNSAFE

ENTERTAINING CONTRARY VIEWS: SUSPEND CLOSURE AND BE OPEN-MINDED

Easy. 6 Steps. It s So Easy to Begin... Yello Dyno s Safety Party Curriculum. to safer kids - S A M P L E - Step 1: Review the Curriculum Script:

Everyone during their life will arrive at the decision to quit drinking alcohol and this was true for Carol Klein.

Mrs. Garrett s Classroom Procedures

Sample Student Reflections on Persuasive Piece. Writing

Revision Techniques. or how to pass exams

Temptation. Temptation. Temptation. Temptation. Temptation START. Lose A Turn. Go Back 1. Move Ahead 1. Roll Again. Move Ahead 1.

On the GED essay, you ll need to write a short essay, about four

EQUIPPED. Smart Catholic Parenting In a Sexualized Culture. Parent Conversation Guides

Middle School - Let s Talk Volume 2

If...Then Unit Nonfiction Book Clubs. Bend 1: Individuals Bring Their Strengths as Nonfiction Readers to Clubs

Writing Prompts. for grades 2-4. #18 Best/Worst Day Ever #19 Celebration #20 Scared

TELUS WISE footprint activity book. It s about your digital footprint, not your shoe size.

Polar Award: Self Awareness

Would You Like To Earn $1000 s With The Click Of A Button?

DAY 4 DAY 1 READ MATTHEW 7:24-27 HEAR FROM GOD LIVE FOR GOD. If you play an instrument, you know that it takes a LOT of practice.

You are going to be authors and illustrators!

Dude, Where s Your Brother?

Sarah has done something mean to you at school. Should you spread bad rumors about Sarah to hurt her back? What should you do?

Second Grade Launching Reading Workshop: RL1, RL5, RL7, SL1, SL3, SL4, L5 (S2-3.5)

Part 1 Grade 2 Lesson Three: Appropriate and Inappropriate Touching

Play Your Part SID 2016 Quiz

6NAVY LANGUAGE ARTS Expectations & Guidelines for

Would You Like To Earn $1000 s With The Click Of A Button?

PEER PRESSURE. Part 2

The Language of Instruction in the Writing Workshop: Some possibilities organized by teaching methods

Review; February 2017 My 5 KS3&4 YOUNG PERSONS GUIDE getting on with each other : growing up growing strong

Lesson Transcript. T = Teacher (Apryl Whitman, Meadowfield Elementary School, Columbia, SC), S = Students

what you need to know

SOAR Study Skills Lauri Oliver Interview - Full Page 1 of 8

Handling the Pressure l Session 6

A digital story is a short digital video that combines your voiceover, photos, video clips, and music to tell a true story from your own life.

"BIG AL" SCHREITER'S MAGICAL SEQUENCE OF WORDS

Industrial Technology Electricity Small Engines Welding Woodworking

Habit 1 - Be Proactive

Common Sense Media. The Power of Words

COPYWRITER CHECKLIST. Find Out If You ve Got What It Takes to Succeed

Jobs for Teens. A Short Guide - All you Need To Know About Working As A Teenager. Relax, It s not rocket science! First Edition September, 2018

Your information - but is it really yours?

DiscovererFutureThinker esencerelatingachieving CaringCompetingConfiden pendabilitydiscovererfuture

Autobiography Project

Grades 6-12 Bullying & Cyberbullying Survey (1/22/13) * Required

Friendly Advice for Second Graders and for Those Teenagers Who Just Don t Get it

Wipe Out Lesson 3 January 19/20 1

Would You Like To Earn $1000 s With The Click Of A Button?

Online Courses with the Writers Workshop

A Proven Method That 100% Guarantees you will lose up to 8-10lbs in the TWO Weeks

Legal Notice: The Author and Publisher assume no responsibility or liability whatsoever on the behalf of any Purchaser or Reader of these materials.

goals, objectives and the future Keeping track of your goals

Philosophy Paper. same exact philosophy about everything because everyone is different and has grown up in

Author. I m an Author! Are you? Maybe you enjoy writing down your feelings, or describing things you notice about your world.

Teacher Commentary Transcript

Suncorp #TeamGirls Ambassador, Rebecca Sparrow s guide to the tough conversations around keeping your girl playing sport.

Thank you, Honorable Chairperson- Being a good team member

Introducing a Writer s Life MATERIALS: Chart paper, markers, one daybook per child, pen or pencil per child, sample daybooks

25 minutes 10 minutes

Structured Trauma-Related Experiences and Symptoms Screener (STRESS)

The 100 Book Project. B. Dawson

Lesson 5: What To Do When You re Sad

This is a transcript of the T/TAC William and Mary podcast Lisa Emerson: Writer s Workshop

Lesson 2: Finding Your Niche Market

Grade 2 Weather Inquiry Unit Lesson 4: Create Video Scripts that are Interesting as well as Informative. Lesson Transcript

Raindrops Keep Falling on my Leaves

Introductory Psychology (1030H, 1101, & 2101) Spring 2016 Research Participation (RP) Information

Reflections and Suggestions for First Year Teachers

You find a wallet with money in it and keep it. You make fun of someone at school. You break your neighbor s window and you do not tell them.

DON T SABOTAGE YOUR DREAM.

WRITING A WINNING APPLICATION

GO mental. Rules of the Game

Online screenwriting degree programs. You may be wondering how this benefits you, the seller.

Things To Look For In A Headshot Photographer. Questions To Ask When Interviewing A Photographer. Headshot Reproduction Considerations

guide to Have plenty of downtime beforehand Have business cards close to hand Have a list of questions prepared Have a list of answers prepared


20 QUESTIONS TO HELP YOU DISCOVER WHAT YOU LOVE ABOUT YOURSELF

The $2 Game. To experience negotiations in a win/lose scenario. Each player should have a pen and paper. Set of Secret Instructions for each round.

Anne Reckling: Thank you so much for much taking the time today. Now how old were you when you were diagnosed?

Horticulture Agronomy Entomology Horticulture

Week 2: Your Unconditional Worth and Discovering Your Accurate Self-Image. By Henrik Edberg

Unit 1 Money. 1 loves 2 usually saves 3 doesn t want 4 doesn t like 5 always wants 6 doesn t spend. countable nouns (e.g.

Convocation Speech. Mark Richter. August 2008 (MSU)

Session 12. MAKING DECISIONS Giving informed consent

10 Strategies To Help

Transcription:

The Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University presents: Five Steps to Becoming an Information Security Expert! Information Security Basics for Students What is Information Security? And, why do kids need to know about it? Information Security refers to protecting important files, documents, and programs that are stored on the different parts of a computer. This includes protecting your schoolwork, games, or important personal information that you, your parents, or your teachers may keep on the computer. Kids need to know about Information Security, so that they can help to protect these important documents. By learning how to be security experts, kids can teach others the basics of Information Security. There are 5 Steps involved with becoming a security expert. Each of the steps is listed and described below. After practicing these steps, you ll always be in the habit of being secure! Step One: Protect Your Password! When you log in to use your computer at home or school, you may need to enter a password in order to enter the system. It is really important to protect that password by keeping it a secret from people who do not need to know it. More than likely, you will need to share your password with your parents and/or teacher and that s OK. But, it is NOT a good idea to tell your friends, lab partner, or strangers about your password. What s the big deal about a password? What can happen i f someone f inds out what mine is? Well, there are a couple of reasons why it is really important to protect your password. First of all, someone could use your password to enter your email system. Once they have access to your email, they could send mean letters to all of your friends. The emails would look like they came from you, and your friends would probably be upset. Or, the person could use your email

account to send viruses or malicious code to all of your email pals. Once again, it would look like you were the one who did all of the damage. What a mess to get out of! Another reason to protect your password is in order to protect your own personal work. For example, if someone got your password at school, they might be able to go into your files and change some of the words or pictures. The person making the changes might think this is funny, but if that file contained your big project or homework assignment you may not think it was funny at all. In fact, you may not be able to recreate the project as it was before, and that could hurt your grade in class. Finally, you want to protect your password so that you can protect important information that you might have stored on your computer. For example, maybe you have a hard time remembering the combination to your locker for gym class. So, you decide to type in the combination and store it in your network folder. If someone nasty gets a hold of your password, they could find the combination and damage or steal your property. Now that you know why to protect your password how do you do it? Below you will find some guidelines to follow when using passwords: 1. Do NOT post your password or store it near your computer. 2. Do NOT write your password in an obvious place such as on your class folder, your hand, or your backpack. 3. Make sure that your password is at LEAST 8 characters long. 4. Be sure to use numbers, punctuation marks, and capital letters in your password: Good Examples: Boiler*Maker 12girl#power Iam@work iluv2b@chs 5. Do NOT use passwords that are easy to guess: Bad Examples: password (this is the most commonly used password!) 123456 computer

6. Try to pick passwords that are not too easy for others to figure out: Avoid Using: your name your best friend s name your address your birthday your school name 7. Do NOT share your password with your friends. A true friend would understand why you need to keep it private. 8. Try not to type your password when other people are watching. 9. If you think someone saw you type in your password, ask your parent/teacher to help you get a new one. 10. ALWAYS remember to log out of the computer that you are working at! This is really important if you are checking your email in a public place! Step Two: Keep Your Files Safe! Keeping the files and documents that you store on your computer safe is really important. Imagine if you had just finished writing the *best* book report ever---and then your electricity goes out and you lose your document. Or, what if the computer you are working on malfunctions and deletes all of your work on a big project that is due the next morning? Or, what if someone stole your computer that had ALL of your science fair project on it? What would you do? What if you didn t have time to do it over? Sometimes, there is no way to prevent the loss of your work. But there are some steps that you can take to be sure to protect your work. First, we need to identify the different types of threats that occur with computers. There are 3 different types of threats to your files that you should be aware of: 1. Natural Threats: These threats cannot be controlled and occur directly through nature. Examples include: tornados, lightning, floods, snow-storms, and earthquakes. 2. Intentional Manmade Threats: These are threats caused by people who are trying to do harm. These people int entionally try to cause

damage to computers. Examples include: stealing computers, vandalism, purposely sending viruses, and hacking. 3. Unintentional Manmade Threats: These are threats caused by people who did not mean to cause any harm. These people have accidentally caused damage to computers. Examples include: spilled beverages, accidentally deleting files, equipment failure, power outages, and viruses. So, now that we know about the three types of threats to our computers what can we do to help prot ect our impor tant work? Here are some guidelines to follow to keep your files protected: 1. Make Back-ups!! It is really important that you get in the habit of making a back-up copy of any file that you want to protect. To do this, save your work on a separate disk that is NOT connected to your computer. Keep that disk in a safe place. By doing this, you have a made a SECURE copy of your work that you will have available to you even if the computer you work on blows up! Note: Your back-up copy needs to be saved in a different location than your original. Consider this: W hat i f you stored the original f ile and your back -up on the same disk and then you dropped that disk into the ocean? Would you have your back -up to use? What would have been a bet ter thing to do? 2. Do Not Have Drinks Near Your Computer! Even though you may work up quite a thirst while working on a school project, it is NOT a good idea to keep liquids near your workstation. We all know how easy it is to spill a drink and liquids can cause a really big mess when they land on computer equipment, disks, or near electrical outlets. Not only could you lose your work, you could also cause harm to yourself! If you do get thirsty, take a break and enjoy your drink outside of your workstation area. 3. Print out and Keep a Paper Copy of Important Work: It is also a good idea to print out a copy of important work (reports, projects, etc.), just in case you can t recover your original electronic version. At least with the paper copy (also called a hard copy ), you would have a record of the information you had written.

4. Clearly Label Your Disks: It is really important that you organize your files on your disks and that you keep your disks clearly labeled. For example, if you have a monthly book report to turn in for your social studies class, you may want to consider saving them all on the same disk which is labeled as Social Studies 7 th Grade. Most disks come with stickers that you can easily put on the outside of your disk. If you do not have labels, use a permanent marker. It is also a good idea to save your files with a name that you will understand. From the example above, that student may wish to save his documents by the last name of the author that he wrote his report about. (Ex: twain, rowling, cleary) By doing this, he can easily find the report if he needs to use it again. 5. Keep Magnets Away From Your Computer and Disks! Magnets will erase the information stored on disks and computers. It happens quickly, so be sure to keep your magnets far away from your workstation. Step Three: Things to Remember While You are Working Online: When you are using the Internet at school and at home, it is VERY important to remember that you need to use it responsibly. The computer equipment, Internet access, and everything else in your classroom belongs to your school. When you use these tools, you are reflecting upon the reputation of the school. Your actions will serve as a credit or discredit to your school. By following the basic safety guidelines listed below, you will be helping to protect your school, your files, and yourself from harm. 1. NEVER give out your personal information without permission from your parent or teacher. Personal information includes: your name, address, phone number, parent information, school information, etc. If you are on a site that asks you for this information, immediately tell your parents and/or teacher! 2. Chat rooms, personal email, online games, etc. are OFF-LIMITS when you are at school. Many times, these types of environments can lead to trouble. If your parents allow you to use these at home, it is CRITICAL that you remember to NEVER give out personal information

about yourself, your parents, or your school. If anyone says anything nasty to you---or makes you feel uncomfortable, IMMEDIATELY go tell your parents. But, remember, these places are NOT for school use. 3. Tell your teacher IMMEDIATELY if you come across information, words, or images that make you feel uncomfortable, or that you know are inappropriate. 4. NEVER open files or email from people that you do not know. They may contain a virus. 5. NEVER give out your password. (This includes friends, lab partners, and especially anyone online!) 6. Do NOT send pictures/information to anyone that you do not know. 7. While using technology at school, it is very important to remember to stay focused on the assigned task. By not following the directions of your teacher, you may risk losing your chance to use the computer. Step Four: Use Kid-Friendly Search Engines: The most important idea to remember when you are looking for information on the Internet, is that ANYONE with a computer and an Internet connection can post a site on the Web. This is one of the reasons that the Internet is so great; everyone can have a chance to express their creativity. It is also why the Internet is NOT so great; it allows people to post sites that contain dishonest information, mean pictures, or nasty attitudes. One easy way to prevent running into some of those nasty sites, is to use a Kid-Friendly Search Engine. A search engine is a program found on a Web site that searches the information on parts of the WWW for specific words that you have typed in. Once it finds all of the matches for your keywords, the search engine will list the sites it found. Kid-friendly search engines work the same way. The best part about these particular search engines is that they will find great sites without including ones that contain violent images, swear words, or other inappropriate information. Using a kid-friendly search engine will save you time by sorting through the junk sites before you even have to see them. This will help you to find the information you need much more quickly!

Step Five: Making Sure That Web Sites are Worthwhile: As a general rule, if you come across a site that makes you feel uncomfortable, or that you know is inappropriate for school tell your teacher or parent immediately. If they are not around, close down your Internet connection and go find them. Remember to use Kid-Friendly Search Engines to help avoid sites that are not right for you! So, how do you know which sites to trust? How can you tell if a site is worth using as a reference for your schoolwork? The best answer to these questions is to take a look at the background of the sites and ask a series of questions. Consider using the questions listed below: 1. What is the intent or purpose of the site? Look carefully at the content that is included on the site. Is something being sold? Is there a hidden purpose? Is the site trying change your opinion about something? If you answered yes to any of the above questions, the information contained on that site may be biased. It will be important for you to determine whether the information is fact or opinion based. 2. What is the Background of the Person/Organization Behind the Site? Does the person or organization that posted the site provide background information? Is there a way to contact the Webmaster for further information? If you answered no to those questions, it may mean that the person posting the site does not have a strong background in the content area. Or, it may also mean that they do not want to be known for posting the Web site. Either way, a site without a contact person/organization can mean trouble. 3. What is the Age of the Site? How old is the site? When was it last updated? Has it been abandoned? It is really important for you to know when the information on a Web site was written. If the site is old, abandoned, or undated, the information it contains may be outdated and no longer true. Sometimes, the information won t change (ex: the day Pearl Harbor was bombed), but some information changes rapidly (the name of the most popular movie at the box office). Ask your teacher or parent to

help you determine if the page is too old to contain relevant information. 4. What Type of Content is Included? Is the information on the site useful? Is the information on the site related to the purpose of the site? Is the site free from obvious typographical errors? If you answered no to the questions listed above, the site in question may not be the best resource for you. When you are looking for a site to use as a reference, it is important to find a site that contains credible (trustworthy) information. If a site is NOT well organized, contains many spelling errors, or refers to topics that are not related to the purpose of the site, it lowers the level of credibility of the site. The person or organization who posted this site may not really be a person who knows a lot about the topic; instead, the Webmaster may just be a person who knows a tiny bit about the topic---and is not an expert at all. 5. What is the Design of the Site Like? Is the site easy to use? Is the site set up to provide easy access to the information? Does the site offer a way to ask questions of the expert? If you answered yes to the questions above, chances are that the site is a good one. The people who have posted the site have taken the time to make sure that you could find information and ask questions if you need to. When you are evaluating a Web site, it is really important to think about all five of the questions listed above. You will need to consider ALL of those areas before you decide whether or not a particular site is useful. Well, that s it! Those are the 5 Steps involved with becoming a Security Expert! Remember to practice them everyday in order to protect your work, your school, your computer, and *most importantly* yourself from danger! If you have questions, comments, or suggestions about the 5 Steps to becoming a Security Expert Visit CERIAS K-12 at: http://www.cerias.purdue.edu/k-12 Or, contact: Judy Lewandowski at judyl@cerias.purdue.edu