Cyber Security Awareness: Empowering Students in the Digital World
Engage students with cyber security topics like malware, phishing, and protection strategies. Cover integrity, smart user practices, and ethical use. Includes activities, assessments, and resources.
Cyber Security Awareness: Empowering Students in the Digital World
E N D
Presentation Transcript
Participant Presentation Debbie Lamprecht Yu-Pa Ng Nicole Mitchell Diane Underwood
Current Courses Taught • Introduction to Computing • Computer Programming • Terrorisom
Target Audience No Background inCyber Security
Cyber Security Material Integration Plan • Student Awareness • Maintaining Integrity • Smart User
Student Awareness • Cover Relevant Topics • Malware • Phishing • Points of Vulnerability • Protection Options • Resource Availability • Consequences
Maintaining Integrity • Avoiding Dangerous Sites • Domain Name Clues • Intended Use • Ethical Use
Be a Smart User • Personal Data Protection • Passwords, SSN, Address, DOB • Compromising Pictures/Videos • Email Attachments & Links from unknown senders • Social Engineering • Protect Your Computing Devices
Graded Student Activity in Introduction to Computing • Produce an MLA Formatted Research Paper on a Cyber Security Related Topic • Produce a Class Presentation on a Cyber Security Related Topic
Concept Assessment Questions • Describe what is meant by cybercrime and who perpetrates it? • Name and describe the types of viruses from which I need to protect my computer? • Explain how you can protect a computer from viruses? • Explain how hackers attack computing devices and describe the harm they can cause? • Explain the purpose of a firewall and describe how it keeps a computer safe from hackers? • Identify 2 methods for password management?
Concept Assessment Questions & Activity • Illustrate how a person can surf the Internet anonymously and use biometric authentication devices to protect their data? • Describe the management of online annoyances such as spyware and spam? • Identify the data that should be backed up and describe the best methods for doing so? • Explain what is meant by social engineering and describe how someone can avoid falling prey to phishing? • Provide hands-on check for understanding
Final Student Tip……… Never, ever Double –Click!