Security
Welcome
In the security section you will learn about network security and passwords. The knowledge you gain in this section will help you protect yourself against identity theft. In this section there may be references to other sections due to information fitting in multiple sections.
Network Security
You can protect yourself and network by only connecting to secure and safe wi-fi. When you connect to a wi-fi you want to make sure it is one that will not damage your network or allow someone to steal your information. When connecting to wi-fi you should not connect to a public wi-fi unless you know it is a safe one. Examples of safe public wi-fi's would be your schools or local public libraries wi-fi. You should never just connect to a random wi-fi, weather public or secured. You should not just assume a wi-fi is safe because it is secure. Several people set up secure accounts with the goal of getting your information. When you go to connect to a wi-fi you want to make sure it is a safe and trusted wi-fi.
Passwords
Lack of knowledge on how to develop a proper and secure password is a major reason why accounts are easily hacked. There is five rules you should always remember when it comes to creating passwords. Those five rules are: 1. the password should be seven to twelve characters long (unless otherwise specified), 2. the password should contain at least one uppercase letter, 3. the password should contain at least one lowercase letter, 4. the password should contain at least one number, and 5. the password should contain at least one special character. While it is tempting to put follow these rules by putting them in the common places in passwords you should not put them in these common places. The common place don'ts are: uppercase letter in the front of password, the number at the end of password, and the special character at the end of password. You should write down your username and password and store it somewhere safe and where you will remember it.
Personal Identity
You need to protect your identity when you are online and creating accounts. When you choose security questions to you put true answers or fake answers? You have probably been told that you need to choose security questions that you actually know the answer to. However, you should not do this as it makes it easier to get your information. When you choose a security question it can be something you know the true answer to or something you don't. No matter what you choose to be your security question you should not put the true answer down. You should always write down the website, username, password, security questions, and answer to security questions. You should then store the paper you wrote in down on somewhere safe and where you will remember is at.
Social Engineering
Social engineering is geotagging of pictures, background of pictures, and communicating to much information. Geotagging of pictures is where your device embeds in the picture the location, date, and time the picture was taken. Predators lurking on the web will use geotags to figure out your schedule. You should not share pictures that have a background that can give away your location. Pictures you share should have backgrounds that cannot let predators determine your location. Tweens communicate to much information online about what they are doing and end up putting their selves in harm. You share never tell the online community where you are going until after you have gone there. You should also not give a ton of details about what you did as it is an easy way for predators to find other people who where there and find you in their pictures. You also should not give a lot of details about things you are planning on doing as it gives predators places to look for you at.
Cyber bullying
To get started take this short cyber bullying survey below.
This is a simple survey about cyber bullying. Please type your answer in the space provided. If their is multiple answers type them all in the space provided.
What is cyber bullying? Cyber bullying is using technology to intimidate, scare, or humiliate others. If you do not understand cyber bullying you should talk to a trusted adult. If you are a victim or witness you should report cyber bullying even if you are told not to.
Lesson Review
Complete the following activity to review the information in the lesson.
Drag the items from the bottom to the slots on the right. | |
This content requires JavaScript enabled.
|