1 / 26

Communication Super Highway: Road hazards

Communication Super Highway: Road hazards. Today you will learn about…. Cryptology Encryption and decryption Secure vs. nonsecure websites Protecting your identity online Internet safety rules Social Networking Cyber Bullying. Understanding Cryptology.

elan
Télécharger la présentation

Communication Super Highway: Road hazards

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Communication Super Highway: Road hazards

  2. Today you will learn about… • Cryptology • Encryption and decryption • Secure vs. nonsecure websites • Protecting your identity online • Internet safety rules • Social Networking • Cyber Bullying

  3. Understanding Cryptology Cryptology is the process of making and using codes to secure the exchange of information. Why is encryption important?

  4. Encryption and Decryption • The process of converting ordinary information into something that is unreadable is known as encryption. • The method of reversing the encrypted message by reverting the unreadable text back into its original form is known as decryption. Encryption makes it hard to understand, and decryption makes it easy again!

  5. FACT TIME

  6. Cipher Methods A cipher is an algorithm for performing encryption or decryption. It is a series of well-defined steps that can be followed as a procedure. Example of a cipher method… Substitution Cipher Initial alphabet ABCDEFGHIJKLMNOP Encryption alphabet DEFGHIJKLMINOQRS

  7. History • 1900 B.C. - Hieroglyphics • 1500 B.C. - Mesopotamia • 500-600 B.C. - ATBASH • 487 B.C. - Skytale • 50-60 B.C. - Julius Caesar • 1790’s - Thomas Jefferson • WWII

  8. FACT TIME

  9. Https vs. Http Secure Socket Layer (SSL) & Transport Layer Security (TSL) • cryptographic protocols or set of rules) that provide security for communications over networks such as the Internet. • HTTPS is secure https://www.wellsfargo.com • Uses SSL to secure the transfer of information • HTTP is not secure http://www.facebook.com

  10. Identity Theft

  11. FACT TIME

  12. Social Networking • Sites: • Twitter • MySpace • Facebook • YouTube

  13. What are people posting? • Too much information! • Birthday • Address • Phone Number • Status Updates • Future Events • Pictures

  14. How does your profile represent you? • How can it affect you? • Potential scholarships? • Future employers? • Future in-laws? • Think about your online image • Who will see this? • What will they think?. **Assume that anything you put on the internet can be accessed later… It’s there FOREVER!

  15. FACT TIME

  16. Can it happen to you? • Burleson High School in Texas • Churubusco High School in Indianapolis • Paramus High School in New Jersey

  17. Social Networking Risks • Do you personally know all of your “friends”? • what can be done with the information you display • Do people really need to know what you’re doing 24/7?? • FBI monitoring networking sites

  18. Cyber Bullying • Cyber bullying is using terminology to embarrass, humiliate, threaten, or intimidate another • Flaming: online fighting • Harassment: repeat messages • Impersonation: identity theft • Denigration: “dissing”, gossip, rumors • Stalking: repeat harassment and denigration • Can lead to potential legal ramifications

  19. FACT TIME

  20. Protecting Your Identity Ever heard of… • Spyware? • Example • Malware? • Example • Phishing? • Example • Anti-virus software or Firewall? Identity theft!

  21. Internet Safety Rules • Protect your computer • Secure vs. unsecure networks • Look for the lock (https) • Bank Example • Up-to-date security software • Protect your privacy & the privacy of others (friends and family) • Only give necessary information when required

  22. Internet Safety Rules (cont.) • Protect your password • Tips for strong secure passwords • Beware of shoulder surfers • Do not click “remember me” on public computers • View all content critically

  23. FACT TIME

  24. Internet Safety Rules (cont.) • Beware of contests, clubs, prizes, and gifts • Common scams • Do you really need an account? • Beware of stranger danger • Cyber predators • Dateline: Predator • Don’t break the law • Cyber bullying • Plagiarism

  25. Tips for Using Public Computers • Always log out • Don’t leave your computer unattended • Erase your tracks • Don’t save log-in information • Don’t click “remember me” • Beware of shoulder snoops • Don’t enter sensitive information • Key logging software

  26. Game Time! • Beware of Spyware • Friend Finder • ID Theft Faceoff • Invasion of the Wireless Hackers • Phishing Scams - Avoid the Bait • The Case of the Cyber Criminal

More Related