National Cybersecurity Awareness Campaign - PowerPoint PPT Presentation

About This Presentation
Title:

National Cybersecurity Awareness Campaign

Description:

Cyberbullying. Cyberbullying is bullying that happens online. It can happen in an email, a text message, an online game, or on a social networking site. – PowerPoint PPT presentation

Number of Views:257
Avg rating:3.0/5.0
Slides: 31
Provided by: edtechpol
Category:

less

Transcript and Presenter's Notes

Title: National Cybersecurity Awareness Campaign


1
National Cybersecurity Awareness Campaign
CyberWatch C3 Conference October 7, 2011
2
October is National Cybersecurity Awareness Month
  • This year a different critical cybersecurity
    issue will be featured each week in October
  • Week One emphasizes general cybersecurity
    awareness with events highlighting the
    Stop.Think.Connect. Campaign.
  • Week Two showcases the urgent need to develop
    cyber education programs to train the
    next-generation cyber workforce.
  • Week Three focuses on national and local efforts
    to prevent identity theft and other cyber crimes.
  • Week Four highlights strategies small- and
    medium-sized business owners can use to bolster
    their own cybersecurity defenses.

3
Stop.Think.Connect. Background
  • In May 2009, President Obama issued the
    Cyberspace Policy Review, which recommends the
    Federal government initiate a national public
    awareness and education campaign informed by
    previous successful campaigns.
  • The Stop.Think.Connect. Campaigns overarching
    goal is to help Americans understand not only the
    risks that come with using the Internet, but also
    the importance of practicing safe online behavior

4
Stop.Think.Connect. Partners
5
Stop.Think.Connect. Public Service Announcement
6
Issues Affecting You
7
Cyberbullying
8
Stop.Think.Connect. Public Service Announcement
9
Cyberbullying
  • Cyberbullying is bullying that happens online. It
    can happen in an email, a text message, an online
    game, or on a social networking site. It might
    involve rumors or images posted on someones
    profile or passed around for other people to see.
  • Dont stand for bullyingonline or off. Treat
    others the way you want to be treatedwhether
    youre interacting with them online, on your
    phone or in person.
  • Speak up. If you see something inappropriate on a
    social networking site or in a game or chat room,
    let the website know and tell an adult you trust.
    Using Report Abuse links can help keep sites
    fun for everyone.
  • Tell the bully to stop. Most kids dont bully,
    and theres no reason for anyone to put up with
    it. This mean behavior usually stops pretty
    quickly when somebody stands up for the person
    being bullied.

10
Cyber Predators
11
Cyber Predators
  • Cyber predators are people who search online for
    other people in order to use, control, or harm
    them in some way.
  • Cyber predators target teens and young adults
    both male and female on a regular basis,
    regardless of whether or not the victims are 18
    or above.
  • Social networking sites enhance a predators
    ability to target young Americans, especially if
    they share personal information in their profile.
  • 91 of young adults say they are social
    networking friends with people they dont know
    well
  • Protect yourself and your personal information,
    you never know who is behind the screen
  • Notify your family and the proper authorities
    immediately if you are being targeted or
    harassed online

Source http//www.staysafeonline.org/sites/defa
ult/files/resource_documents/Cyber20Education205
.3.1120PDF.pdf
12
Social Media Tips
  • US-CERT suggests ten steps that you can take to
    protect yourself on social networks
  •  
  • Limit the amount of personal information you post
  • Remember that the internet is a public resource
  • Be wary of strangers
  • Be skeptical Dont believe everything you read
    online.
  • Evaluate your settings dont stick with the
    defaults!
  • Be wary of third-party applications
  • Use strong passwords
  • Check privacy policies
  • Keep software, particularly your web browser, up
    to date
  • Use and maintain anti-virus software

Source The United States Computer Emergency
Readiness Team (US-CERT) www.us-cert.gov
13
Identity Theft
14
Identity Theft
  • Identity theft is the illegal use of someone
    else's personal information in order to obtain
    money or credit.
  • Every 3 seconds an identity is stolen- so for the
    length of this training session over 2,400
    identities may have been stolen.
  • Every year, 500,000 kids have their identity
    stolen.
  • Here are some simple tips to prevent identity
    theft
  • Dont use the same password twice.
  • Choose a password that means someone to you and
    you only.
  • If you have been compromised, report it to the
    Federal Trade Commission.
  • Lock your computer and cell phone.
  • Dont share personal information without knowing
    exactly who is on the receiving end.

15
Stop.Think.Connect. Public Service Announcement
16
Fraud Phishing
17
Fraud Phishing Tips
  • Fraud is the intentional perversion of truth in
    order to induce another to part with something of
    value or to surrender a legal right.
  • Phishing is a scam by which an email user is
    duped into revealing personal or confidential
    information that the scammer can use illicitly or
    fraudulently.
  • Most organizations banks, universities,
    companies, etc. - dont ask for your personal
    information over email. Beware of requests to
    update or confirm your personal information.
  • Dont open emails from strangers and dont click
    on unfamiliar sites if you think an offer is too
    good to be true, then it probably is.
  • Make sure you change your passwords often and
    avoid using the same password on multiple sites.
  • Always enter a URL by hand instead of following
    links.
  • Reporting of suspicious or unsolicited e-mails
    from unknown sources is key to preventing and
    mitigating the impacts of these attacks. Report
    any suspicious emails or links to US-CERT,
    Internet Crime Complaint Center, and the Federal
    Trade Commission.

18
Stop.Think.Connect. Website
www.dhs.gov/ stopthinkconnect
19
Toolkit
  • Chatting with Kids
  • Heads Up
  • Spread the Word
  • Brochure
  • Bookmark
  • Poster
  • PowerPoint

20
Chatting with Kids About Being Online
  • Chatting with Kids is a guide that instructs you
    how to talk to kids about online safety
  • The guide also covers hot button issues, such as
    sexting and cyberbullying
  • Use the guide to talk to kids directly or when
    you train parents how to talk to their kids.

21
Chatting with Kids About Being Online Tips
  • Have regular conversations about using the
    Internet.
  • Talk to kids about online manners.
  • Ask kids who they are in touch with online and
    what sites they visit.
  • Use parental control options that allow you to
    block and filter content, filter outgoing content
    and limit kids time online.
  • Develop computer and cell phone rules, such as no
    cell phone use at the dinner table, during
    homework or sleeping hours. 

22
Heads Up Stop.Think.Connect.
  • Heads Up is an online safety guide you can hand
    out to kids during cyber safety presentations or
    within the community at schools, recreation
    centers, libraries and other community centers.
  • Heads Up is designed specifically for kids on how
    and why to stay safe online, including a word
    search activity.
  • The guide provides Dos and Donts of online
    behavior.

23
Heads Up Tips
  • DO
  • DONT
  • Stop before you post something and think about
    how you will feel if your family, teachers,
    neighbors or coaches see it.
  • Limit your online friends to people you actually
    know.
  • Speak up if you feel uncomfortable or threated by
    something you see online.
  • Reply to text, email or pop up messages that ask
    you for personal information.
  • Open attachments or click on links that are
    suspicious or come from strangers.
  • Stand for bullying online or off.
  • Post videos or photos of someone without their
    approval.

24
Spread the Word Community Outreach Guide
  • This guide shows you how to use all of the
    materials in the Toolkit to give effective
    presentations on cyber safety.
  • It also provides tips on how to get the word out
    about Internet safety online and offline.
  • Spread the word to your family, colleagues, and
    communities.

25
Ice-Breaker Questions
  • For Kids
  • For Parents
  • Do you sleep with your cell phone in reach?
  • Raise your hand if you post pictures online. Have
    you ever posted anything youve regretted?
  • Raise your hand if you or one of your friends
    have ever received a mean text message.
  • Have you ever talked to your parents about
    something that bothered you online?
  • Raise your hand if you think your child knows
    more about the Internet and technology than you
    do.
  • Do your kids have their own computers? Do they
    have their own cell phones?
  • Do you set rules for Internet use? If so, what
    are they?
  • What are your main concerns about your children
    using the Internet?

26
Supporting Documents
  • Stop.Think.Connect. brochure, bookmark and poster
    included
  • CD including Chatting with Kids, Spread the Word
    and Heads Up Guides and PowerPoint presentation
  • The PowerPoint presentation may be customized to
    suit your needs
  • Toolkit materials may also be found on the
    Stop.Think.Connect. website

27
If you have been exposed to a cyber threat
  • You can report Internet -related frauds, scams
    and suspicious activity with the following
    organizations
  • National Center for Missing Exploited Children
    This nonprofit organization has a
    Congressionally-mandated Cyber Tipline as a means
    for reporting crimes against children. Reports
    may be made 24-hours a day, 7 days a week online
    at www.cybertipline.com or by calling
    1-800-843-5678
  • Department of Justice (DOJ) The DOJs Computer
    Crime Intellectual Property Section (CCIPS)
    tells you where to go to report hacking, password
    trafficking, SPAM, child exploitation and other
    Internet harassment. For more information visit
    http//www.justice.gov/criminal/cybercrime/
  • The Internet Crime Complaint Center (IC3) The
    IC3 (http//www.ic3.gov/) is a partnership
    between the FBI, the National White Collar Crime
    Center, and the Bureau of Justice Assistance,
    whose mission is to serve as a vehicle to
    receive, develop, and refer criminal complaints
    related to cyber crime

28
Call to Action
  • Cybersecurity is a shared responsibility
  • Visit our website and become a Friend of the
    Campaign
  • Use our Toolkit materials at your own cyber
    safety presentations
  • Spread the word about Stop.Think.Connect. to your
    peers

29
Remember to Stop.Think.Connect.
  • Stop
  • Stop hackers from accessing your accounts- set
    secure passwords
  • Stop sharing too much information- keep your
    personal information personal
  • Stop- trust your gut, if something doesnt feel
    right, stop what you are doing
  • Think
  • Think about the information you want to share
    before you share it
  • Think how your online actions can affect your
    offline life
  • Think before you act- dont automatically click
    on links
  • Connect
  • Connect over secure networks
  • Connect with people you know
  • Connect with care and be on the lookout for
    potential threats

30
Securing cyberspace starts with YOU
Write a Comment
User Comments (0)
About PowerShow.com