Skip to main content

Home/ educators/ Group items tagged cyber safety

Rss Feed Group items tagged

Fred Delventhal

Cyber Safety - 0 views

  •  
    Description: Information resources, workshop handouts, and games on these topics: identity safety, cyberbullying, cyber predators, piracy & plagiarism, social networks, and more from California Technology Assistance Project. Good for classroom use or parent/school board awareness programs. Subscribe to their listserv for the latest updates on events and program materials.
Vicki Davis

BBC News - The 12 cyber-scams of Christmas - 3 views

  •  
    If you discuss cyber safety and digital citizenship, this is an article tor read and share.
Martin Burrett

Cyber Tree House - 5 views

  •  
    A well made, child friendly flash site with videos, interactive games and other resources about Internet safety and smart thinking online. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Ted Sakshaug

Cybersafety - 10 views

  •  
    A site for grade 5 to adult to learn some basics of using the Internet.
Dave Truss

BPS Internet Safety Blog: Listen to the "Be Safe" CyberSafety Song - 0 views

  •  
    The BPS Cyber Superheroes long awaited release of the "Be Safe" song is available for download! You can listen to it here on the blog and download it from the Boston Public Schools Cybersafety website.
Jocelyn Chappell

How Dangerous Is the Internet for Children? - Pogue's Posts - Technology - New York Tim... - 0 views

  •  
    David Pogue write in The New York Times, "As my own children approach middle school, my own fears align with the documentary's findings in another way: that cyber-bullying is a far more realistic threat. "
EXECUTIVE DIRECTOR

Office of the Cyber General Safety Alert - 3 views

  •  
    Practice 2.1C - What You Do With ANY form of digital technology is Public & Permanent.
Jeremy Davis

Enhancing Child Safety and Online Technologies - 0 views

  •  
    Government Report 2008
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Dean Mantz

Online Sexual Predators - Myth and Fact - 0 views

  •  
    Wired Safety presentation by Art Wolinsky from WiredSafety.
Dean Mantz

Cyber, Are you still Bullying? - 0 views

  •  
    Memory game hosted by National Geographic. This game will test your short term memory.
EXECUTIVE DIRECTOR

Just 4 Quarters Reduces Cyber Crime and Saves Money (taxes) & Lives! - 4 views

  •  
    See How!
EXECUTIVE DIRECTOR

Are your students falling into these 2 Web danger zones? - 17 views

  •  
    College students' lives can be changed - and even destroyed - in the time it takes to click a mouse. Take a look at these real-life examples of the harm digital technology can cause.
1 - 17 of 17
Showing 20 items per page