Technology | Business Day | Personal Tech Friday, September 20, 2013 For the latest updates, go to nytimes.com/bits » Daily Report A Proposed Reset Button for Children Online | California legislators, faced with the problem of reckless online behavior by children, and of the sometimes outsize and life-changing repercussions from that behavior, are trying to solve the problem with the first […]
StaySafeOnline.org - Cyber Safety Guidelines:
- Keep a Clean Machine.
- Keep security software current: Having the latest security software, web browser, and operating system
are the best defenses against viruses, malware, and other online threats.
- Automate software updates: Many software programs will automatically connect and update to defend
against known risks. Turn on automatic updates if that’s an available option..
- Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems,
and other web-enabled devices also need protection from viruses and malware.
- Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security
software to scan them.
Protect Your Personal Information.
- Secure your accounts: Ask for protection beyond passwords. Many account providers now offer
additional ways for you verify who you are before you conduct business on that site.
- Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to
create a more secure password.
- Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.
- Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure
place away from your computer.
- Own your online presence: When available, set the privacy and security settings on websites to your
comfort level for information sharing. It’s ok to limit how and with whom you share information.
Connect with Care.
- When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way
cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to
delete or if appropriate, mark as junk email.
- Get savvy about Wi- Fi hotspots: Limit the type of business you conduct and adjust the security settings
on your device to limit who can access your machine.
- Protect your $$: When banking and shopping, check to be sure the sites is security enabled. Look for web
addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your
information. “Http://” is not secure.
Be Web Wise.
- Stay current. Keep pace with new ways to stay safe online. Check trusted websites for the latest
information, and share with friends, family, and colleagues and encourage them to be web wise.
- Think before you act: Be wary of communications that implores you to act immediately, offers something
that sounds too good to be true, or asks for personal information.
- Back it up: Protect your valuable work, music, photos, and other digital information by making an
electronic copy and storing it safely.
Be a Good Online Citizen.
- Safer for me more secure for all: What you do online has the potential to affect everyone – at home, at
work and around the world. Practicing good online habits benefits the global digital community.
- Post only about others as you have them post about you.
- Help the authorities fight cybercrime: Report stolen finances or identities and other cybercrime to
http://www.ic3.gov (Internet Crime Complaint Center), the Federal Trade Commission at
Visit http://www.stopthinkconnect.org for more information.
OSHA Ergonomics Checklist:
WORKING POSTURES–The workstation is designed or arranged for doing computer tasks so it allows your
WORK AREA–Consider these points when evaluating the desk and workstation. The work area is designed or arranged for doing computer tasks so the
24. Thighshave sufficient clearance space between the top of the thighs and your computer table/keyboard platform (thighs are not trapped).
25. Legsandfeethave sufficient clearance space under the work surface so you are able to get close enough to the keyboard/input device.
ACCESSORIES–Check to see if the
26. Document holder, if provided, is stable and large enough to hold documents.
27. Document holder, if provided, is placed at about the same height and distance as the monitor screen so there is little head movement, or need to re-focus, when you look from the document to the screen.
28. Wrist/palm rest, if provided, is padded and free of sharp or square edges that push on your wrists.
29. Wrist/palm rest, if provided, allows you to keep your forearms, wrists, and hands straight and in-line when using the keyboard/input device.
30. Telephonecan be used with your head upright (not bent) and your shoulders relaxed (not elevated) if you do computer tasks at the same time.
The Developing Minds and Digital Media Project(also known as DM2) is a study of the myriad ways in which “new digital media”—such as the internet, cell phones, and the like—influence the culture, psychology, and creativity of young people and of adolescence as a developmental phase. Contact: Katie Davis, Project Specialist.
The Good Participation Projectseeks to explore forms of contemporary youth civic and political participation, and to discern broader notions of citizenship held by contemporary youth. Contact: Carrie James, Research Director.
The GoodPlay Projectexplores the ethical character of young people’s activities in the new digital media. Contact: Carrie James, Research Director.
The GoodWork® Toolkitis a Guidebook and a set of Narratives and Value Sort Cards designed to inspire conversation and reflection about excellent, ethical, and engaging work. The primary purpose of the Toolkit is to engage individuals in reflective questions that all professionals should consider. Contacts: Wendy Fischman, Project Manager; Lynn Barendsen, Project Manager.
Teaching About Cybersecurity: Taking Steps to Improve Online Safety and Prevent Data Breaches
Overview| Fromdata breachesat Target, Home Depot, JPMorgan and even the White House tocelebrities’ stolen photos, cybersecurity and online privacy have been making the headlines every week. But how do data breaches at companies and government institutions affect individuals? What can individuals do to enhance their digital security?
In this lesson, students will learn about the extent of cyberattacks just in the past year and the risks they pose for companies, governments and individuals. They also will learn about the steps individuals and organizations can take to better protect their data online, and will reflect on their own digital security practices.
Materials| Computers with Internet access
Warm Up| Initiate a quick brainstorm about computer security with your students, as a way to assess their level of understanding. Ask questions such as: What have you heard in the news recently about people harming companies or other organizations by gaining unauthorized access to their computer systems? How do these people break into the computers, and what steps can we take to keep this from happening in the future?
Have a short conversation about the main points raised in the video. What is the Internet, and how did connecting computers into networks introduce the vulnerabilities that criminals take advantage of today? What are some of the ways in which networked computers can be compromised, and why is it difficult to prevent these kinds of attacks?
Related| In the Bits post“Hacked vs. Hackers: Game On”, Nicole Perlroth explores the explosive growth in cyberattacks against governments, companies and individuals over the past decade:
Paul Kocher, one of the country’s leading cryptographers, says he thinks the explanation for the world’s dismal state of digital security may lie in two charts.
One shows the number of airplane deaths per miles flown, which decreased to one-thousandth of what it was in 1945 with the advent of the Federal Aviation Administration in 1958 and stricter security and maintenance protocols. The other, which details the number of new computer security threats, shows the opposite. There has been more than a 10,000-fold increase in the number of new digital threats over the last 12 years.
The problem, Mr. Kocher and security experts reason, is a lack of liability and urgency. The Internet is still largely held together with Band-Aid fixes. Computer security is not well regulated, even as enormous amounts of private, medical and financial data and the nation’s computerized critical infrastructure — oil pipelines, railroad tracks, water treatment facilities and the power grid — move online.
Read the entire article with your class, using the questions below.
Questions| For discussion and reading comprehension:
What is digital security, and why are experts in the field concerned about its “dismal state” in the United States?
What is data and what are some of the kinds of data that are increasingly being stored online? What is a“data breach,”and what are some of the consequences of data breaches for governments, organizations and individuals?
In the post, Perlroth states, “…at every level, there has been an awakening that the [cyber] threats are real and growing worse, and that the prevailing “patch and pray” approach to computer security simply will not do.” What evidence does she use to support the argument that threats to computer security are growing worse? Cite three specific examples.
What steps can companies take to prepare for online attacks, and why are these steps helpful?
What are firewalls and why should these be only one part of a broader computer security scheme?
In this activity, students will read additional coverage ofmajor online data breachesand assess their scope and impact. They also will review security experts’ suggestions for preventing these kinds of attacks in the future and assess the protections they have in place for their own online data.
Part 1: Assessing the Impact
Divide the class into groups and assign one of the articles listed below to each group.
Each group should briefly summarize the article, noting:
The name of the organization attacked;
The nature of the data breach — Were credit card numbers stolen? Passwords? Personal information?
The extent of the breach: How many people did it affect? How much money does the organization estimate it lost as a result of the data breach? What other information was compromised?
How the cyberattack occurred, if known. Did the organization, for example, take any missteps that allowed for data to be easily compromised?
What, if anything, could have prevented it.
What should individuals do if they are concerned their financial or personal information might have been stolen?
Then have groups briefly present what they learned. You might record the key pieces of information about the nature and extent of major data breaches in a table at the front of the room.
How to Create a Secure Password
Four easy tips to protect your digital accounts from the next breach.
Video by Wendi Jonassen, Molly Wood and Vanessa Perez onPublish DateNovember 5, 2014.Photo by Mel Evans/Associated Press.
Part 2: Taking Steps to Improve Security
Watch the video“How to Create a Secure Password,”and talk about tips for creating secure passwords. Those students withsmartphonesmight also assess how secure these devices are and make notes on how they might improve their security settings as well.
Have students assess the passwords they use in light of the information they just learned. How secure are their passwords? Do they think they should come up with more secure passwords? Do they currently use the same password on more than one website or device? Now that they have learned more about how to protect their own data online, what changes might they make to their online behavior?
Finally, have students read“Getting a Clear Picture of a Computer Network’s Security.”Why does Hitesh Sheth call the fight to keep hackers out of corporate computer systems a “race you cannot win?” What are some ways in which computer security systems are trying to win this race? How doeshuman errorsometimes thwart even the best security software, and why are retailers who use credit and debit card systems especiallyvulnerableto data breaches?
1. Cybersecurity:You might delve deeper into the topic of cybersecurity by firstlearning about the Internetin the first place — how did it develop, and how did its design unintentionally lead to the kinds of vulnerabilities we are seeing more and more every day? Then, have students play the NOVA LabsCybersecurity Labgame, in which they take steps to protect a company from increasingly sophisticated cyberattacks. You can also have students respond to our Student Opinion question,“Whom Would You Share Your Passwords With?”
2. Online Privacy:To further explore online privacy, students could log intoTake This Lollipop, an interactive Facebook app that shows users the degree to which their personal information is available on Facebook. The app incorporates the user’s own photographs, posts, and other personal information into a short “horror movie” in which the user becomes the subject of a cyberstalker. [Note: the movie, while short, may be disturbing to some students; use discretion when deciding whether to share with your class]. Follow up with a conversation about what students saw. How did it feel to see their information being used in this way? Were they surprised by how much of their information the app could access?
Alternatively, students might visitPrivacy Grade, an online tool that grades popular apps, such as Instagram and Angry Birds, for their privacy safeguards. And, they can read what other students have to say on the topic, and share their own opinions, through our Student Opinion question,“Do You Wish You Had More Privacy Online?”