260 likes | 429 Views
Communication Super Highway: Road hazards. Today you will learn about…. Cryptology Encryption and decryption Secure vs. nonsecure websites Protecting your identity online Internet safety rules Social Networking Cyber Bullying. Understanding Cryptology.
E N D
Today you will learn about… • Cryptology • Encryption and decryption • Secure vs. nonsecure websites • Protecting your identity online • Internet safety rules • Social Networking • Cyber Bullying
Understanding Cryptology Cryptology is the process of making and using codes to secure the exchange of information. Why is encryption important?
Encryption and Decryption • The process of converting ordinary information into something that is unreadable is known as encryption. • The method of reversing the encrypted message by reverting the unreadable text back into its original form is known as decryption. Encryption makes it hard to understand, and decryption makes it easy again!
Cipher Methods A cipher is an algorithm for performing encryption or decryption. It is a series of well-defined steps that can be followed as a procedure. Example of a cipher method… Substitution Cipher Initial alphabet ABCDEFGHIJKLMNOP Encryption alphabet DEFGHIJKLMINOQRS
History • 1900 B.C. - Hieroglyphics • 1500 B.C. - Mesopotamia • 500-600 B.C. - ATBASH • 487 B.C. - Skytale • 50-60 B.C. - Julius Caesar • 1790’s - Thomas Jefferson • WWII
Https vs. Http Secure Socket Layer (SSL) & Transport Layer Security (TSL) • cryptographic protocols or set of rules) that provide security for communications over networks such as the Internet. • HTTPS is secure https://www.wellsfargo.com • Uses SSL to secure the transfer of information • HTTP is not secure http://www.facebook.com
Social Networking • Sites: • Twitter • MySpace • Facebook • YouTube
What are people posting? • Too much information! • Birthday • Address • Phone Number • Status Updates • Future Events • Pictures
How does your profile represent you? • How can it affect you? • Potential scholarships? • Future employers? • Future in-laws? • Think about your online image • Who will see this? • What will they think?. **Assume that anything you put on the internet can be accessed later… It’s there FOREVER!
Can it happen to you? • Burleson High School in Texas • Churubusco High School in Indianapolis • Paramus High School in New Jersey
Social Networking Risks • Do you personally know all of your “friends”? • what can be done with the information you display • Do people really need to know what you’re doing 24/7?? • FBI monitoring networking sites
Cyber Bullying • Cyber bullying is using terminology to embarrass, humiliate, threaten, or intimidate another • Flaming: online fighting • Harassment: repeat messages • Impersonation: identity theft • Denigration: “dissing”, gossip, rumors • Stalking: repeat harassment and denigration • Can lead to potential legal ramifications
Protecting Your Identity Ever heard of… • Spyware? • Example • Malware? • Example • Phishing? • Example • Anti-virus software or Firewall? Identity theft!
Internet Safety Rules • Protect your computer • Secure vs. unsecure networks • Look for the lock (https) • Bank Example • Up-to-date security software • Protect your privacy & the privacy of others (friends and family) • Only give necessary information when required
Internet Safety Rules (cont.) • Protect your password • Tips for strong secure passwords • Beware of shoulder surfers • Do not click “remember me” on public computers • View all content critically
Internet Safety Rules (cont.) • Beware of contests, clubs, prizes, and gifts • Common scams • Do you really need an account? • Beware of stranger danger • Cyber predators • Dateline: Predator • Don’t break the law • Cyber bullying • Plagiarism
Tips for Using Public Computers • Always log out • Don’t leave your computer unattended • Erase your tracks • Don’t save log-in information • Don’t click “remember me” • Beware of shoulder snoops • Don’t enter sensitive information • Key logging software
Game Time! • Beware of Spyware • Friend Finder • ID Theft Faceoff • Invasion of the Wireless Hackers • Phishing Scams - Avoid the Bait • The Case of the Cyber Criminal