SlideShare a Scribd company logo
1 of 39
Be CyberSMART! Addressing Safe and Appropriate Technology Use in Northside Administrator Institute  July 26, 2006   Kelly Smith Assistant Superintendent for Technology Services
Ripped from Recent Headlines! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CyberSMART Principles   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scenarios for Discussion ( print version ) ( print version ) Classroom Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object],Office  Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object]
S = Security M   =  Manners A     =  Acceptable Use R     =  Responsibility T     =  Training
Security:  Why Worry? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security:  Why Now? ,[object Object],[object Object],[object Object]
Security:  Your Role ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Passwords and Security
Passwords and Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Passwords and Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Protect that Data! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Student Safety ,[object Object],[object Object],[object Object],[object Object]
S     =  Security M = Manners A     =  Acceptable Use R     =  Responsibility T     =  Training
Effective E-mail Netiquette Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Effective E-mail Netiquette Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion Break Let’s discuss those scenarios! Great idea! What do you think about Mr. Carter?
S     =  Security M   =  Manners A = Acceptable Use R     =  Responsibility T     =  Training
[object Object],[object Object],Acceptable Use:  AKA “Digital Citizenship”
Digital Citizenship at Work: Principle #1 ,[object Object]
Digital Citizenship at Work: Principle #2 ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Digital Citizenship at Work: Principle #3 System use is  electronically monitored.
E-mail Acceptable Use
[object Object],[object Object],[object Object],[object Object],E-mail Acceptable Use Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION
[object Object],[object Object],[object Object],E-mail Acceptable Use Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],E-mail Acceptable Use Source:  TEC-08 DISTRICT E-MAIL USAGE REGULATION
[object Object],[object Object],[object Object],E-mail as a Public Record Source: TEC-09 DISTRICT E-MAIL RETENTION REGULATION
S     =  Security M   =  Manners A  =  Acceptable Use R = Responsibility T     =  Training
[object Object],[object Object],[object Object],[object Object],Model and Emphasize Data Confidentiality
Know the Acceptable Use District Policies & Regs  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Educate Others  ,[object Object],[object Object],[object Object],[object Object]
Report Incidents / Violations  ,[object Object],[object Object],[object Object],[object Object]
Manage the Paperwork ,[object Object],[object Object],[object Object],[object Object],[object Object]
S     =  Security M   =  Manners A  =  Acceptable Use R  =  Responsibility T = Training
Online Acceptable Use Class ,[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion Break Let’s discuss those scenarios! Great idea! What are some important points?
Classroom Scenario Points  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Office Scenario Points  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Be CyberSMART! Addressing Safe and Appropriate Technology Use in Northside Administrator Institute  July 26, 2006   Kelly Smith Assistant Superintendent for Technology Services

More Related Content

What's hot

Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and securitymdhague
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 

What's hot (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Phishing
PhishingPhishing
Phishing
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
How to Stop Cyber Bullying
How to Stop Cyber Bullying How to Stop Cyber Bullying
How to Stop Cyber Bullying
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Stop Cyberbullying
Stop CyberbullyingStop Cyberbullying
Stop Cyberbullying
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 

Similar to Cybersmart

Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdfHemprasad Badgujar
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber securitydivyanigarg2
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 Bjboulanger
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devicesUmer Saeed
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfJihithaJP
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09Tammy Clark
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxlorainedeserre
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Future Education Magazine
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?Srashti Jain
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
 
EMPOWERMENT TECHNOLOGIES Q3 W2.pptx
EMPOWERMENT TECHNOLOGIES Q3 W2.pptxEMPOWERMENT TECHNOLOGIES Q3 W2.pptx
EMPOWERMENT TECHNOLOGIES Q3 W2.pptxIrishFaye5
 

Similar to Cybersmart (20)

Employee Technology Handbook.pdf
Employee Technology Handbook.pdfEmployee Technology Handbook.pdf
Employee Technology Handbook.pdf
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Star Kamal 9 B
Star Kamal 9 BStar Kamal 9 B
Star Kamal 9 B
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
Why Education Sector Needs To Prioritize Cybersecurity? 7 Helpful Importance ...
 
E-Safety
E-SafetyE-Safety
E-Safety
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
SAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docxSAFETY ISSUES NOTES.docx
SAFETY ISSUES NOTES.docx
 
Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
EMPOWERMENT TECHNOLOGIES Q3 W2.pptx
EMPOWERMENT TECHNOLOGIES Q3 W2.pptxEMPOWERMENT TECHNOLOGIES Q3 W2.pptx
EMPOWERMENT TECHNOLOGIES Q3 W2.pptx
 
Acl esafety awareness
Acl esafety awarenessAcl esafety awareness
Acl esafety awareness
 

Cybersmart

  • 1. Be CyberSMART! Addressing Safe and Appropriate Technology Use in Northside Administrator Institute July 26, 2006 Kelly Smith Assistant Superintendent for Technology Services
  • 2.
  • 3.
  • 4.
  • 5. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 6.
  • 7.
  • 8.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 15.
  • 16.
  • 17. Discussion Break Let’s discuss those scenarios! Great idea! What do you think about Mr. Carter?
  • 18. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 19.
  • 20.
  • 21.
  • 22.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. S = Security M = Manners A = Acceptable Use R = Responsibility T = Training
  • 35.
  • 36. Discussion Break Let’s discuss those scenarios! Great idea! What are some important points?
  • 37.
  • 38.
  • 39. Be CyberSMART! Addressing Safe and Appropriate Technology Use in Northside Administrator Institute July 26, 2006 Kelly Smith Assistant Superintendent for Technology Services

Editor's Notes

  1. Consider these questions : Would you want your own SS# shared with just anyone? Would you want your own child’s name and address shared with just anyone? Have you come to rely on our network and information systems and want them to be tamper-proof and available? Do you want the community to trust our ability to protect sensitive data? Why – student safety, voter support, etc. Do you want to be “at fault” if and when sensitive data is compromised?
  2. As more districts centralize academic and other information to make data-driven decisions—as encouraged under No Child Left Behind —they leave themselves even more vulnerable to risk. Open environment = data is available / accessible for parents, employees, and students when they have a legal or legitimate need to know (CMS, Parent Connection, Winocular, etc.) Reports of students’ in other districts gaining access to school networks to change grades, delete teachers’ files, or steal data are becoming more common. Unlike 10 years ago, people don’t have to be computer geeks to become hackers. Online chat rooms, listservs, and Web sites give step-by-step directions on how to hack and make it easy for students—and anyone else—to tap into networks rich with confidential data.
  3. TEC-02 USER/WORKSTATION SECURITY MEASURES Use passwords that are unique and not easily guessed. Passwords should not be easily accessible to others or stored near the computer. Recommended password guidelines are as follows: a. Minimum of 8 characters in length b. Alphanumeric c. Upper and lower case d. At least one special character TEC-01 ELECTRONIC COMMUNICATION AND DATA MANAGEMENT TEC-10 MOBILE TECHNOLOGY EQUIPMENT SECURITY MEASURES Set a password that is not easily guessed on mobile devices · Laptops Computers · Personal Digital Assistants (PDA) · Pocket Personal Computers (Pocket PCs) · Password Capable Storage Devices (e.g. USB Flash Drives)
  4. TEC-10 MOBILE TECHNOLOGY EQUIPMENT SECURITY MEASURES Be extremely careful about the type of data stored on the mobile equipment. Personnel are responsible for the NISD data stored on the mobile equipment. Do not store sensitive or confidential data on the device without realizing the risk assumed by doing so. The disclosure of certain types of information does violate federal regulations such as CIPA, HIPPA, FERPA, etc. and could result in a federal violation. Do not share or loan your device with others for non-business use at any time. Personnel are responsible for the physical safeguarding of District mobile technology equipment TEC-02 USER/WORKSTATION SECURITY MEASURES lock the workstation or log out when leaving the area requires password protected screensavers Keyloggers : a type of surveillance software that has the capability to record every keystroke you make to a log file. A keylogger can record account information (i.e., usernames and passwords), e-mail, and any information you type at any time using your keyboard. The log file can then be used by someone to gain unauthorized access to your data. Keyloggers are not illegal and HS students know all about them! Dumpster diving : going through the garbage fo paper copies of sensitive data Phishing : uses a combination of e-mail messages and fake Web sites to convince users they are dealing with a major company to try to trick someone into electronically sharing personal data such as a Social Security or credit card number. Social engineering / pre-texting : influencing and manipulating people into innocently giving away confidential data, often by pretending to be somebody in an “official” capacity
  5. The Internet is an important teaching tool used in Northside ISD classrooms and libraries. The Internet can, however, provide students with access to inappropriate material. Federal law ( CIPA - Children's Internet Protection Act, 2001 ) requires school districts to use "filtering" software to block access to content that is obscene, pornographic, inappropriate for students, or harmful to minors, as defined by CIPA and as determined by the District. NISD currently filters content in approximately 35 categories / subcategories, reviewed annually (e.g., Nudity, Gambling, Racism and Hate; see online document for others) Internet Safety Committee reviews requests to unblock / block specific sites as necessary
  6. Openness = nothing is ever truly anonymous online