NID RESULTS 2013 | ENTRANCE EXAM COACHING NID NIFT CEED MIT PEARL | STUDIO TEST COACHING
Cyber Challenges NID Administrator Conference
description
Transcript of Cyber Challenges NID Administrator Conference
![Page 1: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/1.jpg)
November 10, 2009
![Page 2: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/2.jpg)
Acceptable use Internet Filtering Social Web (MySpace, Facebook, etc.) Cyberbullying Plagiarism Phishing
![Page 3: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/3.jpg)
Why do we need to have such a document?
What things need to be covered? NID’s Technology Acceptable Use
document
![Page 4: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/4.jpg)
The goal of the acceptable use document is to outline how the tools: computers, network, internet, resources (printers, scanners, personal storage devices) are to be used in your school or office.
To protect both the students and staff from using these tools improperly. Also to know what is or is not allowed with these resources.
![Page 5: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/5.jpg)
Hardware – what is available, what it can be used for, at what times
Internet – understanding that the content and material is not under the control of the school and that care with this tool must be taken in use of it.
Internet use as a educational tool, not a entertainment or personal communication tool (web, e-mail)
![Page 6: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/6.jpg)
In what ways tools like the Internet are acceptable, how e-mail should be used as a contact tool.
What information can be taken or brought into the school using storage devices (CD, Flash Drives, etc)
![Page 7: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/7.jpg)
The NID website at www.ni.lcms.org provides a outline of a Technology Acceptable use document at : https://ni.lcms.org/ClientData/1074/Assets/documents/school/curriculum/technology/acceptable%20use%20policy.doc
![Page 8: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/8.jpg)
The Internet is a online version of the real world, and there is good and bad, objectional, offensive content, along with some great educational tools.
Internet Filtering attempts to limit access to objectional content and materials.
There are Free and Commercial tools to help schools with this problem.
![Page 9: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/9.jpg)
DNS system - OpenDNS for K-12 - http://www.opendns.com/solutions/k12
A variety of Software, specifically Internet Filtering, or Security with Internet filtering (antivirus)
Internet Filtering devices – Internet routers, firewall devices, internet filtering appliances.
Internet providers who filter - http://www.illinois.net/services/filtering/index.htm
![Page 10: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/10.jpg)
There are many social websites that are used for contacting friends, companies, entertainers
Most popular Social Websites for all ages – MySpace, Facebook
Other Social Websites LinkedIn, Spoke, Twitter, Flickr, Bebo, YouTube, and many more.
Facebook and MySpace intend to remove accounts of people who are less than 13 years of age – based on the information provided.
![Page 11: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/11.jpg)
Keep in mind that there is no good way that allows these providers to know for sure the age of the person and the account(s) they may setup.
Never post information about your specific location, nothing you would not want printed in a paper about yourself.
People’s response differs when they are not face to face.
![Page 12: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/12.jpg)
Cyberbullying is the tormenting , threatening, harassing, humiliation or embarrassing, using the Internet, other digital technologies, or mobile phones.
Cyberbullying is people in the same age range or peer group, not someone older.
![Page 13: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/13.jpg)
Never give out personal information online Never tell others your password to
accounts Explain to children if they receive such a
message to share it with a parent, teacher or guardian.
Never put anything online that your would not want everyone to see.
Never send messages when you are angry
![Page 14: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/14.jpg)
Teach that you should interact with people online as you would interact with them in person.
Encourage parents to keep the computer in a busy area of the home
Know what people your child is interacting with online
Learn the variety of Acronyms Do not take away access – many hide this
activity in fear of loosing the privilege
![Page 15: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/15.jpg)
Cyber Bullying Web Sites http://www.ncpc.org/topics/cyberbullying http://www.cyberbullying.us/
IM and Texting Acronyms http://www.netlingo.com/acronyms.php http://www.aim.com/acronyms.adp?aolp=0
![Page 16: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/16.jpg)
Easy access to copy information from a variety of sources with the Internet. From books From magazines From authors From news (TV, Internet, and Newspapers) From online resources (encyclopedias,
dissertations, or other peoples work)
![Page 17: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/17.jpg)
Need to explain proper use Need to verify sources – especially on the
Internet – land of many “experts” Have students provide a reference of
sources to verify work Online tools – for verification
Turnitin - http://www.turnitin.com Learn to use Google to search Internet
sources
![Page 18: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/18.jpg)
Phishing is the attempt to trick people into providing information to sources other than the one being presented.
Phishing exists in e-mail, web sites One of the most popular forms of web
phishing is presenting the user with a pop-up that makes the user think the computer is infected and that they need to purchase the product they are presenting to clean it – products that either cause more troubles or do nothing.
![Page 19: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/19.jpg)
This type of web phishing is quite common on social web sites since there is a high volume of viewers.
Some the of the most popular forms of e-mail phishing are personnel department requests, banking requests, and computer upgrades that require you to provide information about your accounts, or personal information to defraud you.
![Page 20: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/20.jpg)
Use a current web browser – make sure the phishing protection is turned on. Internet Explorer 7 & 8, Firefox 3 & 3.5
Verify the URL the last two parts for example (good: support.att.net) (bad: support.att.badprovider.com)
Good Antivirus, Spyware tools to keep these types of things reaching you in the first place.
http://www.onguardonline.gov/topics/phishing.aspx
![Page 21: Cyber Challenges NID Administrator Conference](https://reader035.fdocuments.in/reader035/viewer/2022062807/56815144550346895dbf641d/html5/thumbnails/21.jpg)
Government – OnGuard Online - http://www.onguardonline.gov
Microsoft Online Safety and Privacy http://www.microsoft.com/protect/default.aspx
Symantec – Risks http://www.symantec.com/norton/security_response/index.jsp
Content that I have gathered on these subjects http://cais.cus.edu/spicemk/computersafety.html