Cybersecurity for Kids: STOP. THINK. CONNECT.

S
T
O
P
.
T
H
I
N
K
.
C
O
N
N
E
C
T
N
A
T
I
O
N
A
L
 
C
Y
B
E
R
S
E
C
U
R
I
T
Y
 
A
W
A
R
E
N
E
S
S
 
C
A
M
P
A
I
G
N
K
I
D
S
 
P
R
E
S
E
N
T
A
T
I
O
N
ABOUT STOP.THINK.CONNECT.™
In 2009, President Obama asked the
Department of Homeland Security to create
the Stop.Think.Connect. Campaign to help
Americans understand the dangers that come
with being online and the things we can do to
protect ourselves from cyber threats.
Stop.Think.Connect.™ reminds Americans that
cybersecurity is a shared responsibility – at
home, at school, and in our communities.
WHAT IS CYBERSPACE?
Cyberspace is anything that has to
do with the Internet.
We use the Internet to communicate and stay
connected to our friends and family.
W
e
 
p
l
a
y
 
v
i
d
e
o
 
g
a
m
e
s
,
 
d
o
w
n
l
o
a
d
 
m
u
s
i
c
,
 
a
n
d
 
w
a
t
c
h
T
V
 
s
h
o
w
s
 
a
n
d
 
m
o
v
i
e
s
 
a
f
t
e
r
 
h
o
m
e
w
o
r
k
 
i
s
 
d
o
n
e
.
Grownups do things like banking, shopping, and
other important everyday activities online too.
WHY DO WE NEED TO
PROTECT CYBERSPACE?
Crimes that happen in real life – such as stealing – also
happen on the Internet.
Just like you have to look both ways before crossing the
street, you have to be careful when using the Internet.
The Department of Homeland Security helps you protect
yourself from dangers on the Internet by teaching you
what to look out for online.
Often, we might not realize that our actions online might
hurt us, our families, and even our country. Learning
about the dangers online and taking action to protect
ourselves is the first step in making the Internet a safer
place.
KIDS LEAD DIGITAL LIVES
K
i
d
s
 
a
g
e
s
 
8
-
1
8
 
s
p
e
n
d
 
7
 
h
o
u
r
s
 
a
n
d
 
3
8
 
m
i
n
u
t
e
s
 
p
e
r
 
d
a
y
o
n
l
i
n
e
I
f
 
a
 
c
h
i
l
d
 
s
l
e
e
p
s
 
8
 
h
o
u
r
s
 
p
e
r
 
n
i
g
h
t
,
 
t
h
a
t
 
m
e
a
n
s
 
O
N
E
 
H
A
L
F
o
f
 
t
h
e
 
t
i
m
e
 
t
h
a
t
 
h
e
 
o
r
 
s
h
e
 
i
s
 
a
w
a
k
e
 
i
s
 
s
p
e
n
t
 
o
n
l
i
n
e
33% Online
33% Offline (awake)
33% Asleep
Some common online issues kids face include:
Cyber Predators
Cyber Bullying
Identity Theft
Source: 
National Cyber Security Alliance
CYBER PREDATORS & BULLIES
C
y
b
e
r
 
p
r
e
d
a
t
o
r
s
 
a
r
e
 
p
e
o
p
l
e
 
w
h
o
 
s
e
a
r
c
h
 
o
n
l
i
n
e
 
f
o
r
 
o
t
h
e
r
p
e
o
p
l
e
 
i
n
 
o
r
d
e
r
 
t
o
 
u
s
e
,
 
c
o
n
t
r
o
l
,
 
o
r
 
h
a
r
m
 
t
h
e
m
 
i
n
 
s
o
m
e
 
w
a
y
.
C
y
b
e
r
b
u
l
l
y
i
n
g
 
i
s
 
t
h
e
 
e
l
e
c
t
r
o
n
i
c
 
p
o
s
t
i
n
g
 
o
f
 
m
e
a
n
-
s
p
i
r
i
t
e
d
m
e
s
s
a
g
e
s
 
a
b
o
u
t
 
a
 
p
e
r
s
o
n
,
 
o
f
t
e
n
 
a
n
o
n
y
m
o
u
s
l
y
.
C
y
b
e
r
 
T
i
p
s
 
f
o
r
 
K
i
d
s
Keep your personal information private; avoid sharing your name, address, telephone number,
birthday, passwords, and the name of your school when using the Internet.
Think twice before you post or say anything online; once it is in cyberspace, it’s out there
forever.
Treat others like you want to be treated.
Speak up. If you see something inappropriate, let the website know and tell an adult you trust.
Don’t stand for bullying—online or off.
IDENTITY THEFT
I
d
e
n
t
i
t
y
 
t
h
e
f
t
 
i
s
 
t
h
e
 
i
l
l
e
g
a
l
 
u
s
e
 
o
f
 
s
o
m
e
o
n
e
 
e
l
s
e
'
s
 
p
e
r
s
o
n
a
l
i
n
f
o
r
m
a
t
i
o
n
 
t
o
 
s
t
e
a
l
 
m
o
n
e
y
 
o
r
 
c
r
e
d
i
t
.
C
y
b
e
r
 
T
i
p
s
 
f
o
r
 
K
i
d
s
If you have your own email account, let your parents know if you ever receive an email that
asks for your personal information. Some emails look official, as if they were sent from a club
or school, but they could be a trick to get your personal information. Fake emails usually seem
urgent, and ask you to respond with your private information.
Choose a screen name or email address that isn't your real name to protect your identity. For
instance, instead of "Jack Smith," why not choose "Sk8boardKing75?"
Create strong passwords with eight characters or more that use a combination of letters,
numbers, and symbols. Don’t share your passwords with anyone.
Think before you click – don’t open emails from strangers and don’t click on links for unfamiliar
sites.
Use and check your privacy settings on social networking sites like Facebook and Twitter.
MOBILE SECURITY
W
h
e
n
 
y
o
u
 
p
l
a
y
 
g
a
m
e
s
,
 
v
i
d
e
o
 
c
h
a
t
,
 
o
r
 
s
u
r
f
 
t
h
e
 
w
e
b
 
o
n
 
a
c
e
l
l
 
p
h
o
n
e
 
o
r
 
t
a
b
l
e
t
,
 
y
o
u
 
a
r
e
 
a
c
c
e
s
s
i
n
g
 
t
h
e
 
I
n
t
e
r
n
e
t
 
o
n
t
h
e
 
g
o
.
 
W
e
 
n
e
e
d
 
t
o
 
b
e
 
c
a
r
e
f
u
l
 
w
h
e
n
 
u
s
i
n
g
 
c
e
l
l
 
p
h
o
n
e
s
j
u
s
t
 
l
i
k
e
 
w
e
 
a
r
e
 
c
a
r
e
f
u
l
 
w
h
e
n
 
u
s
i
n
g
 
a
 
c
o
m
p
u
t
e
r
.
C
y
b
e
r
 
T
i
p
s
 
f
o
r
 
K
i
d
s
K
e
e
p
 
a
 
c
l
o
s
e
 
e
y
e
 
o
n
 
y
o
u
r
 
m
o
b
i
l
e
 
d
e
v
i
c
e
.
 
N
e
v
e
r
 
l
e
a
v
e
 
y
o
u
r
 
m
o
b
i
l
e
 
d
e
v
i
c
e
s
 
u
n
a
t
t
e
n
d
e
d
.
K
e
e
p
 
I
t
 
L
o
c
k
e
d
.
 
A
l
w
a
y
s
 
l
o
c
k
 
y
o
u
r
 
d
e
v
i
c
e
 
w
h
e
n
 
y
o
u
 
a
r
e
 
n
o
t
 
u
s
i
n
g
 
i
t
.
 
U
s
e
 
s
t
r
o
n
g
 
p
a
s
s
w
o
r
d
s
 
t
o
p
r
e
v
e
n
t
 
o
t
h
e
r
s
 
f
r
o
m
 
a
c
c
e
s
s
i
n
g
 
y
o
u
r
 
d
e
v
i
c
e
.
 
N
e
v
e
r
 
s
h
a
r
e
 
y
o
u
r
 
p
a
s
s
w
o
r
d
s
 
w
i
t
h
 
s
o
m
e
o
n
e
 
o
t
h
e
r
t
h
a
n
 
y
o
u
r
 
p
a
r
e
n
t
 
o
r
 
g
u
a
r
d
i
a
n
.
K
n
o
w
 
Y
o
u
r
 
A
p
p
s
.
 
C
h
e
c
k
 
w
i
t
h
 
y
o
u
r
 
p
a
r
e
n
t
s
 
b
e
f
o
r
e
 
y
o
u
 
d
o
w
n
l
o
a
d
 
a
n
 
a
p
p
 
a
n
d
 
r
e
v
i
e
w
 
t
h
e
 
s
e
t
t
i
n
g
s
w
i
t
h
 
t
h
e
m
.
O
n
l
y
 
C
o
n
n
e
c
t
 
t
o
 
t
h
e
 
I
n
t
e
r
n
e
t
 
i
f
 
N
e
e
d
e
d
.
 
D
i
s
c
o
n
n
e
c
t
 
y
o
u
r
 
d
e
v
i
c
e
 
f
r
o
m
 
t
h
e
 
I
n
t
e
r
n
e
t
 
w
h
e
n
 
y
o
u
a
r
e
n
t
 
u
s
i
n
g
 
i
t
 
a
n
d
 
m
a
k
e
 
s
u
r
e
 
y
o
u
r
 
d
e
v
i
c
e
 
i
s
n
t
 
s
e
t
 
t
o
 
a
u
t
o
m
a
t
i
c
a
l
l
y
 
c
o
n
n
e
c
t
 
t
o
 
W
i
-
F
i
.
COMMON SENSE RULES
APPLY ONLINE
D
o
n
t
 
t
a
l
k
 
t
o
 
s
t
r
a
n
g
e
r
s
.
 
D
o
n
'
t
 
c
o
m
m
u
n
i
c
a
t
e
 
w
i
t
h
 
s
t
r
a
n
g
e
r
s
o
n
l
i
n
e
 
a
n
d
 
n
e
v
e
r
 
a
g
r
e
e
 
t
o
 
m
e
e
t
 
i
n
 
p
e
r
s
o
n
.
 
T
e
l
l
 
a
 
p
a
r
e
n
t
,
t
e
a
c
h
e
r
,
 
o
r
 
a
n
 
a
d
u
l
t
 
y
o
u
 
t
r
u
s
t
 
i
f
 
a
 
s
t
r
a
n
g
e
r
 
c
o
n
t
a
c
t
s
 
y
o
u
 
i
n
 
a
c
h
a
t
 
r
o
o
m
,
 
t
h
r
o
u
g
h
 
e
m
a
i
l
,
 
o
r
 
v
i
a
 
t
e
x
t
 
m
e
s
s
a
g
i
n
g
.
 
L
o
o
k
 
b
o
t
h
 
w
a
y
s
 
b
e
f
o
r
e
 
c
r
o
s
s
i
n
g
 
t
h
e
 
s
t
r
e
e
t
.
 
D
o
n
'
t
 
e
n
t
e
r
c
o
n
t
e
s
t
s
,
 
j
o
i
n
 
c
l
u
b
s
,
 
o
r
 
s
h
a
r
e
 
y
o
u
r
 
p
e
r
s
o
n
a
l
 
i
n
f
o
r
m
a
t
i
o
n
 
f
o
r
 
a
n
y
r
e
a
s
o
n
,
 
u
n
l
e
s
s
 
y
o
u
r
 
p
a
r
e
n
t
s
 
s
a
y
 
i
t
'
s
 
O
K
.
 
Y
o
u
r
 
n
a
m
e
,
 
a
d
d
r
e
s
s
,
a
g
e
,
 
p
h
o
n
e
 
n
u
m
b
e
r
,
 
b
i
r
t
h
d
a
y
,
 
e
m
a
i
l
 
a
d
d
r
e
s
s
,
 
w
h
e
r
e
 
y
o
u
 
g
o
 
t
o
s
c
h
o
o
l
,
 
a
n
d
 
o
t
h
e
r
 
f
a
c
t
s
 
a
b
o
u
t
 
y
o
u
 
a
r
e
 
p
e
r
s
o
n
a
l
 
a
n
d
 
s
h
o
u
l
d
n
t
b
e
 
s
h
a
r
e
d
 
w
i
t
h
o
u
t
 
c
h
e
c
k
i
n
g
 
f
i
r
s
t
.
I
f
 
t
h
e
 
o
f
f
e
r
 
s
e
e
m
s
 
t
o
o
 
g
o
o
d
 
t
o
 
b
e
 
t
r
u
e
,
 
t
h
e
n
 
i
t
 
p
r
o
b
a
b
l
y
 
i
s
.
H
o
w
 
m
a
n
y
 
o
f
 
y
o
u
 
h
a
v
e
 
e
v
e
r
 
r
e
c
e
i
v
e
d
 
a
n
 
e
m
a
i
l
 
o
f
f
e
r
i
n
g
s
o
m
e
t
h
i
n
g
 
f
r
e
e
,
 
l
i
k
e
 
a
 
c
e
l
l
 
p
h
o
n
e
 
o
r
 
c
o
n
c
e
r
t
 
t
i
c
k
e
t
s
?
 
T
h
e
s
e
 
a
r
e
t
r
i
c
k
s
 
d
e
s
i
g
n
e
d
 
t
o
 
g
e
t
 
y
o
u
 
t
o
 
g
i
v
e
 
u
p
 
p
e
r
s
o
n
a
l
 
i
n
f
o
r
m
a
t
i
o
n
 
o
r
c
l
i
c
k
 
o
n
 
l
i
n
k
s
 
t
o
 
a
u
t
o
m
a
t
i
c
a
l
l
y
 
i
n
s
t
a
l
l
 
m
a
l
w
a
r
e
 
o
r
 
s
p
y
w
a
r
e
.
WE NEED YOUR HELP!
The Department of Homeland Security can’t protect the
Internet alone. We need help from all Americans – including
everyone here – to make smart and safe decisions when using
the Internet.
Once we understand the dangers, we need to tell other people
who might not be as cyber smart and savvy. Setting a good
example of online behavior is something you can do right now
to make a difference.
T
h
a
t
s
 
w
h
y
 
c
y
b
e
r
s
e
c
u
r
i
t
y
 
b
e
g
i
n
s
 
w
i
t
h
 
y
o
u
.
 
Y
e
s
,
 
y
o
u
!
 
E
v
e
r
y
I
n
t
e
r
n
e
t
 
u
s
e
r
,
 
n
o
 
m
a
t
t
e
r
 
h
o
w
 
y
o
u
n
g
 
o
r
 
o
l
d
,
 
i
s
 
o
u
r
 
N
a
t
i
o
n
s
 
f
i
r
s
t
l
i
n
e
 
o
f
 
d
e
f
e
n
s
e
 
a
g
a
i
n
s
t
 
p
e
o
p
l
e
 
w
h
o
 
m
i
g
h
t
 
w
a
n
t
 
t
o
 
h
a
r
m
 
u
s
.
If we all become more aware of who we talk to, what we say,
and what we share online – we can make a big difference.
CYBER EDUCATION
The Stop.Think.Connect. Campaign also promotes science,
technology, engineering, and math (STEM) education
among students. 
To help keep our computers and our country’s networks safe,
we need more cybersecurity professionals.
T
o
 
d
o
 
t
h
a
t
,
 
w
e
 
n
e
e
d
 
s
t
u
d
e
n
t
s
 
w
h
o
 
h
a
v
e
 
s
k
i
l
l
s
 
i
n
 
s
c
i
e
n
c
e
,
t
e
c
h
n
o
l
o
g
y
,
 
e
n
g
i
n
e
e
r
i
n
g
,
 
a
n
d
 
m
a
t
h
.
To learn more about STEM education and careers, visit the
National Initiative for Cyber Careers and Studies (NICCS)
Portal at 
www.niccs.us-cert.gov/
.
SCENARIO #1:
AIMEE’S COUNTRY COUNTDOWN
Aimee loves listening to country music any chance she gets and regularly downloads her
favorite songs onto the new MP3 Player her parents bought for her birthday. They gave her
firm guidelines for downloading music—one of the rules is that she must ask them to
approve the website she gets the music from to be sure it is a legitimate website and is
legally downloaded. Lately she has been downloading a lot of great tunes, so her parents
finally said, “No more! You have enough songs!”
Aimee’s friend at school just told her about the best country song from a new country
band’s album. Aimee loves this band and just has to have the new album! Her friend tells
her about a secret website where you can download this new album and get all the songs
for free. Aimee questions this for a minute, but trusts her friend, and eventually decides to
download the new album as soon as she gets home from school. She finds the website and
begins answering the questions the website requires. These include name, address,
birthday, and email address. At the bottom of the webpage, the website has an additional
link that offers 10 hit songs a month for only $1.99, but requires a credit card number to
activate.
What should Aimee do?
What were Aimee’s mistakes?
Did Aimee do anything illegal?
Is Aimee’s friend truly a friend?
Who were Aimee’s actions most unfair to? Why?
SCENARIO #2:
JAKE AND THE BAD VIRUS
Jake was using the Internet on his family’s home computer to research a
school project on dolphins. He just finished finding the perfect article to add to
his research and was about to log off the computer. Before shutting down Jake
decides to quickly check his email account. In his inbox, Jake sees two
messages including one from NO1GRANDPA@HAPPYMAIL.COM, which he
recognizes as his Grandfather’s email address, and another from
SWEEPSTAKES@WHOKNOWS.COM with a subject line that reads ―YOU’VE
WON $5,000.
Jake skips his Grandfather’s email and quickly opens the sweepstakes email to
collect his prize. After doing so, Jake receives a message instructing him to
provide personal information to verify his identity. Jake provides his full name,
birthday, home address and phone number. He hits submit and instantly starts
receiving messages saying his computer has been infected by a virus. Jake
panics because he doesn’t want to get into trouble. He quickly logs off, shuts off
his computer, and goes to bed, hoping his parents won’t know what happened
in the morning.
What were Jake’s mistakes?
What should Jake have done?
Y
O
U
 
H
A
V
E
 
A
N
I
M
P
O
R
T
A
N
T
 
R
O
L
E
H
E
L
P
I
N
G
 
U
S
 
P
R
O
T
E
C
T
C
Y
B
E
R
S
P
A
C
E
Slide Note
Embed
Share

The STOP. THINK. CONNECT. National Cybersecurity Awareness Campaign aims to educate kids about staying safe online. It covers topics like cyberspace, online dangers, internet safety tips, and common issues such as cyber predators and bullying. By teaching kids to protect their personal information, think before posting online, and stand up against cyberbullying, we can make the internet a safer place for everyone.

  • Cybersecurity
  • Kids
  • Online Safety
  • Cyber Predators
  • Internet Awareness

Uploaded on Oct 02, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN KIDS PRESENTATION

  2. ABOUT STOP.THINK.CONNECT. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help Americans understand the dangers that come with being online and the things we can do to protect ourselves from cyber threats. Stop.Think.Connect. cybersecurity is a shared responsibility at home, at school, and in our communities. reminds Americans that

  3. WHAT IS CYBERSPACE? Cyberspace is anything that has to do with the Internet. We use the Internet to communicate and stay connected to our friends and family. We play video games, download music, and watch TV shows and movies after homework is done. Grownups do things like banking, shopping, and other important everyday activities online too.

  4. WHY DO WE NEED TO PROTECT CYBERSPACE? Crimes that happen in real life such as stealing also happen on the Internet. Just like you have to look both ways before crossing the street, you have to be careful when using the Internet. The Department of Homeland Security helps you protect yourself from dangers on the Internet by teaching you what to look out for online. Often, we might not realize that our actions online might hurt us, our families, and even our country. Learning about the dangers online and taking action to protect ourselves is the first step in making the Internet a safer place.

  5. KIDS LEAD DIGITAL LIVES Kids ages 8-18 spend 7 hours and 38 minutes per day online If a child sleeps 8 hours per night, that means ONE HALF of the time that he or she is awake is spent online 33% Online 33% Offline (awake) 33% Asleep Some common online issues kids face include: Cyber Predators Cyber Bullying Identity Theft Source: National Cyber Security Alliance

  6. CYBER PREDATORS & BULLIES Cyber predators are people who search online for other people in order to use, control, or harm them in some way. Cyberbullying is the electronic posting of mean-spirited messages about a person, often anonymously. Cyber Tips for Kids Keep your personal information private; avoid sharing your name, address, telephone number, birthday, passwords, and the name of your school when using the Internet. Think twice before you post or say anything online; once it is in cyberspace, it s out there forever. Treat others like you want to be treated. Speak up. If you see something inappropriate, let the website know and tell an adult you trust. Don t stand for bullying online or off.

  7. IDENTITY THEFT Identity theft is the illegal use of someone else's personal information to steal money or credit. Cyber Tips for Kids If you have your own email account, let your parents know if you ever receive an email that asks for your personal information. Some emails look official, as if they were sent from a club or school, but they could be a trick to get your personal information. Fake emails usually seem urgent, and ask you to respond with your private information. Choose a screen name or email address that isn't your real name to protect your identity. For instance, instead of "Jack Smith," why not choose "Sk8boardKing75?" Create strong passwords with eight characters or more that use a combination of letters, numbers, and symbols. Don t share your passwords with anyone. Think before you click don t open emails from strangers and don t click on links for unfamiliar sites. Use and check your privacy settings on social networking sites like Facebook and Twitter.

  8. MOBILE SECURITY When you play games, video chat, or surf the web on a cell phone or tablet, you are accessing the Internet on the go. We need to be careful when using cell phones just like we are careful when using a computer. Cyber Tips for Kids Keep a close eye on your mobile device. Never leave your mobile devices unattended. Keep It Locked. Always lock your device when you are not using it. Use strong passwords to prevent others from accessing your device. Never share your passwords with someone other than your parent or guardian. Know Your Apps. Check with your parents before you download an app and review the settings with them. Only Connect to the Internet if Needed. Disconnect your device from the Internet when you aren t using it and make sure your device isn t set to automatically connect to Wi-Fi.

  9. COMMON SENSE RULES APPLY ONLINE Don t talk to strangers. Don't communicate with strangers online and never agree to meet in person. Tell a parent, teacher, or an adult you trust if a stranger contacts you in a chat room, through email, or via text messaging. Look both ways before crossing the street. Don't enter contests, join clubs, or share your personal information for any reason, unless your parents say it's OK. Your name, address, age, phone number, birthday, email address, where you go to school, and other facts about you are personal and shouldn t be shared without checking first. If the offer seems too good to be true, then it probably is. How many of you have ever received an email offering something free, like a cell phone or concert tickets? These are tricks designed to get you to give up personal information or click on links to automatically install malware or spyware.

  10. WE NEED YOUR HELP! The Department of Homeland Security can t protect the Internet alone. We need help from all Americans including everyone here to make smart and safe decisions when using the Internet. Once we understand the dangers, we need to tell other people who might not be as cyber smart and savvy. Setting a good example of online behavior is something you can do right now to make a difference. That s why cybersecurity begins with you. Yes, you! Every Internet user, no matter how young or old, is our Nation s first line of defense against people who might want to harm us. If we all become more aware of who we talk to, what we say, and what we share online we can make a big difference.

  11. CYBER EDUCATION The Stop.Think.Connect. Campaign also promotes science, technology, engineering, and math (STEM) education among students. To help keep our computers and our country s networks safe, we need more cybersecurity professionals. To do that, we need students who have skills in science, technology, engineering, and math. To learn more about STEM education and careers, visit the National Initiative for Cyber Careers and Studies (NICCS) Portal at www.niccs.us-cert.gov/.

  12. SCENARIO #1: AIMEE S COUNTRY COUNTDOWN Aimee loves listening to country music any chance she gets and regularly downloads her favorite songs onto the new MP3 Player her parents bought for her birthday. They gave her firm guidelines for downloading music one of the rules is that she must ask them to approve the website she gets the music from to be sure it is a legitimate website and is legally downloaded. Lately she has been downloading a lot of great tunes, so her parents finally said, No more! You have enough songs! Aimee s friend at school just told her about the best country song from a new country band s album. Aimee loves this band and just has to have the new album! Her friend tells her about a secret website where you can download this new album and get all the songs for free. Aimee questions this for a minute, but trusts her friend, and eventually decides to download the new album as soon as she gets home from school. She finds the website and begins answering the questions the website requires. These include name, address, birthday, and email address. At the bottom of the webpage, the website has an additional link that offers 10 hit songs a month for only $1.99, but requires a credit card number to activate. What should Aimee do? What were Aimee s mistakes? Did Aimee do anything illegal? Is Aimee s friend truly a friend? Who were Aimee s actions most unfair to? Why?

  13. SCENARIO #2: JAKE AND THE BAD VIRUS Jake was using the Internet on his family s home computer to research a school project on dolphins. He just finished finding the perfect article to add to his research and was about to log off the computer. Before shutting down Jake decides to quickly check his email account. In his inbox, Jake sees two messages including one from NO1GRANDPA@HAPPYMAIL.COM, which he recognizes as his Grandfather s email address, and another from SWEEPSTAKES@WHOKNOWS.COM with a subject line that reads YOU VE WON $5,000. Jake skips his Grandfather s email and quickly opens the sweepstakes email to collect his prize. After doing so, Jake receives a message instructing him to provide personal information to verify his identity. Jake provides his full name, birthday, home address and phone number. He hits submit and instantly starts receiving messages saying his computer has been infected by a virus. Jake panics because he doesn t want to get into trouble. He quickly logs off, shuts off his computer, and goes to bed, hoping his parents won t know what happened in the morning. What were Jake s mistakes? What should Jake have done?

  14. YOU HAVE AN IMPORTANT ROLE HELPING US PROTECT CYBERSPACE

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#