SAMPLE. 1 ICT CyberSecurity Essentials. Lesson 1: Protecting Your Identity

Size: px
Start display at page:

Download "SAMPLE. 1 ICT CyberSecurity Essentials. Lesson 1: Protecting Your Identity"

Transcription

1 1 ICT CyberSecurity Essentials Lessn 1: Prtecting Yur Identity LESSON SKILLS KEY TERMS After cmpleting this lessn, yu will be able t: Define privacy, and relate it t the term digital ftprint. Explain the risks assciated with giving ut persnal infrmatin. Describe the pssible cnsequences f psting persnal messages nline. Suggest ways in which peple can behave psitively in cyberspace. blcking digital ftprint dssier nline predatrs nline prfile privacy privacy settings risk scial netwrk stranger

2 ICT CyberSecurity Essentials - Lessn 1: Prtecting Yur Identity 1-2 Pints t Pnder These Pints t Pnder are designed t help yu fcus n key elements in this lessn. They are als suitable fr use t spark discussins r individual research. Define the term "privacy," and "Internet privacy." List all f the infrmatin yu are required t share when pening an nline accunt such as Facebk. This includes yur first and last name, a cell number r , and yur birthday, s Facebk knws yu are 13 r lder. Nw cnsider the infrmatin yu can share n their Facebk prfile there's a lt f it! Define the term Digital ftprint. Think abut this: "Suppse yu lst yur mbile device tday and it had n passwrd prtectin. What infrmatin n yur device wuld yu be mst wrried abut?" Please think abut accunt any passwrds that are saved in yur apps, especially nes that link t scial media r financial infrmatin, e.g. Ggle Play Stre r in-app purchases. Define dssier. Hw aware are yu f the tracks yu leave behind? View the vide "Digital Dssier" (Adbe Flash vide, 4 mins). This vide is an excellent explanatin f the digital ftprint. Create a T-chart with the headings "Persnal Infrmatin" and "Never Pst Online." Identify the types f infrmatin that yu wuld cnsider t be persnal. List examples f infrmatin that yu shuld never pst nline Certificatin Partners, LLC. All Rights Reserved. Versin 2.0

3 ICT CyberSecurity Essentials - Lessn 1: Prtecting Yur Identity 1-3 Overview This lessn brings awareness t yu abut nline privacy and ways t be respnsible digital citizens. It fcuses n the risks invlved with scial netwrking and ways t prtect persnal identity. Yu will examine the pssible dangers f psting persnal infrmatin n the Internet. Yu will als learn ways t identify risky situatins and ways t guard their privacy. Nte: Cntent in this lessn was develped mainly fr middle schl students. Sme peple may cnsider it inapprpriate r t intense fr elementary schl students. We recmmend that elementary and middle schl teachers wh want t integrate this tpic int their instructin shuld preview in advance all nline resurces cited in the lessn, and shuld exercise their judgment in determining the suitability f this cntent fr the students in their classes. Prtect Yur Identity and Yur Privacy Objectives 5.1.1: Describe risks assciated with scial netwrking sites (e.g., Facebk, Myspace, Twitter), and identify ways t reduce these risks : Define privacy, and relate it t the term digital ftprint : Practice cybersafety techniques t prtect yur persnal infrmatin when using Internet searches, , chat rms and scial netwrk Web sites. While the Internet ffers yu a wide variety f pprtunities, it als has its risks. These risks can be anything frm cyberbullying t actual physical harm, if the wrng peple get yur infrmatin. Privacy What are the things yu like t d nline? Yu may believe yu are ttally annymus when playing games, watching YuTube, reading bks n yur e-reader, etc. Privacy, accrding t Dictinary.cm is, the state f being free frm unwanted r undue intrusin r disturbance in ne's private life r affairs; freedm t be let alne: Turists must respect the tribe s privacy (Dictinary.cm, 2016). Hw des this apply t yu? Hw des the meaning change between the real wrld and the nline wrld? Hw much privacy d yu have nline when ding each f the things yu mentin? Privacy is affected when smene knws yur name r address. What if smene reads yur ? What if smene fllws yu arund all day? These examples represent a lss f privacy. Peple nline, ften strangers, may try t btain infrmatin abut yu. Link t Learn Mre Girls Think U Knw - YuTube vide, 3 mins Yu can accidentally pen yurself up t danger withut meaning t; giving ut persnal infrmatin is ften dne in dribs and drabs, and there are peple wh will add up the little things t be able t figure ut where yu are and hw t find yu. Fr example, imagine yu're in a chat rm and there's smene there wh's pretending t be a kid but is really an nline predatr: smene wh intentinally targets peple fr harm using nline chat rms r scial media. Yu're smart and yu dn't give ut yur phne 2016 Certificatin Partners, LLC. All Rights Reserved. Versin 2.0

4 ICT CyberSecurity Essentials - Lessn 1: Prtecting Yur Identity 1-4 number, yur schl, r even yur last name: yu think yu're being really careful. But yu mentin that yu play sccer fr a cunty team, and yu tell them which cunty yu're in. N biggie, right? There are tns f peple in the cunty. Yu pst a picture f yurself in yur jersey again, n biggie, because they dn't knw yur name and finding ne persn in a whle cunty can't be easy. But nw the predatr knws yur team name and clrs, and which cunty yu're in. All he has t d is lk up the team Web site and find ut which team is yurs and when they're playing, then shw up at a game. Bing. He's fund yu, frm a picture and the name f yur cunty alne, and nly has t fllw yur parents' car hme after the game t knw where yu live. Always, always assume that any stranger n the Internet has bad intentins and will cause harm if given the chance; that may nt be the case, but just as yu dn't trust randm strangers in public with yur hme address r a key t yur huse, dn't trust randm strangers nline with infrmatin that can prvide a key t yur privacy. On scial media, such as Facebk, yu're safest t lck yur accunt dwn s that nly peple n yur friends list can see what yu pst and be very, very picky whm yu friend. Link t Learn Mre Digital Dssier (Adbe Flash vide, 4 mins). Scial Smarts (Graphic Nvel, PDF) Digital Ftprint Yur digital ftprint means that when yu update yur status, check-in t a lcatin r pst a pht, these things are being saved and tracked, bth by the cmpanies that prvide the services and, prbably, by yur brwser in files called "ckies". That's hw brwsers remember yur favrites and yur previus searches, and can fill in fields fr yu. Ask yurself which breaches f privacy wuld wrry yu. Which infrmatin d yu nt mind sharing with the wrld? What kind f infrmatin needs t be kept secret? A dssier is a detailed reprt, usually abut a persn. A digital ftprint is like a dssier: everything yu d nline, everything yu pst, everything yu share, is saved smewhere n a server and can, theretically r in truth, be accessed, even years later. Clleges and ptential emplyers lk at yur scial media ftprint when they're cnsidering whether t yu admit yu. That stupid picture f yurself when yu were fifteen hlding yur dad's can f beer can be used against yu five, ten, fifteen r mre years later. What are sme Web sites where yu might g? What kind f ftprint wuld yu leave there? (i.e., if smene at a cllege admissins ffice r yur ptential bss saw it, what wuld they think?) What kind f things d yu pst? They dn't g away. Even the stuff yu send n Snapchat is saved n their servers and can be retrieved. Tp Tips fr Internet Safety Treat yur passwrd like yur tthbrush: dn t share it with anyne and change it ften. Always remember t lg ff when yu have finished with an nline service. Use yur wn digital ftprints t remember yur favrite Web sites, like the histry buttn and yur bkmarks. Remember that mst f the Web sites yu visit will make a nte f yur visit, and may als track the Web sites yu visit befre and after their Web site! 2016 Certificatin Partners, LLC. All Rights Reserved. Versin 2.0

5 Lgging My Daily Schedule In this activity, yu will create a seven-day lg detailing yur daily schedule using the MyDailySchedule spreadsheet file, which shuld be prvided by yur teacher as either an Excel spreadsheet r a shared Ggle Sheets file. 1. Open the file MyDailySchedule, and save it as [YurName]DailySchedule. 2. At the bttm f the sheet, yu will see tabs with the names f the week (and ne Example tab). 3. Click n the Example tab and review the sample f hw yu will cmplete the remaining sheets. 4. Fr each day f the week, cmplete the fields by lgging every activity yu cmplete frm the time yu wake up until yu g t sleep. 5. After yu have entered yur activities fr all seven days: a. Categrize yur daily activities by name and the amunt f time yu have spent within that categry. Fr example, playing vide games wuld be marked as 1.5 hurs fr the first day. b. Cmplete Step 5a fr all f the days f the week t determine the weekly categries and amunt f time spent per categry each week. 6. Create a graph shwing hw much time yu spent n each activity. Yu can d this within the sheet r by adding a new tab at the bttm. Reflectin: Smetimes we d nt realize hw much time we really spend nline until we see it written dwn and cunted (as we did in this activity).

6 Directins Case Study: Safety and Revealing T Much Frm teams f tw t three students r wrk with a few friends. Read the fllwing case study scenari. Then cmplete the assignment that fllws with yur team. Be prepared t share yur results with the class. Scenari Jdy is a high-schl sphmre wh happens t be a star player n the girls' varsity basketball team. She has a Facebk accunt that her parents knw abut, and she frequently psts pictures f her basketball team and their big wins n her main page. The pictures nrmally shw the girls in their team unifrms with subtitles that indicate the game dates and times. One day befre schl, Jdy receives a creepy message frm an unknwn persn asking fr details abut when and where the next game will be. At first Jdy ignres the stranger, but the persn becmes mre determined and keeps sending messages, nw asking persnal questins abut Jdy and her teammates. Jdi blcks the stranger frm her Facebk page and tells her parents what is happening. When her parents check her prfile page, they becme mre cncerned. The pictures and updates Jdy has psted reveal a lt f persnal infrmatin, including what schl she ges t, when the girls practice, and where they are playing upcming games. Jdy didn t mean t reveal persnal infrmatin, and in fact she was careful abut what she did and didn t pst. What can an interested stranger d with a small amunt f infrmatin? Assignment Help Jdy and her teammates stay safe. Use yur knwledge f cybersafety techniques and the WWW Decisin Tl technique t answer the fllwing questins. 1. Create a list f checkpints t evaluate Jdy s gd and bad chices. 2. Using varius search engines, explre websites that discuss this tpic. 3. Using a wrd prcessr, summarize the infrmatin and write a ne-page paper abut the recmmended steps that Jdy shuld take t stay safe nline. 4. Include in yur research paper a bibligraphy citing the infrmatin yu used frm Internet surces. 5. Save the file in yur dcuments flder.