Information Security Fundamentals for K-12 Teachers

advertisement
Information Security Boot Camp:
Survival Techniques for Teaching
Teachers and Students Information
Security Basics
Melissa Dark
K-12 Outreach Coordinator
CERIAS, Purdue University
http://www.cerias.purdue.edu/education/K-12
dark@cerias.purdue.edu
Introductions
Name
 Home
 School Position
 First or Favorite Technology Use
 What do you hope to get out of this
workshop?

If you don’t know
where you’re
going….
You’ll probably end
up somewhere else.
---Yogi Berra
North Star Activity

Are we preparing kids for yesterday,
today, or tomorrow?

Do our schools currently focus upon
the skills of the past---or the skills of
the future?
What is Information Security?


Refers to the protection of Data,
Programs, and Information stored on
disks, networks, hard drives, etc.
Includes the issues of:
– Privacy
– Ethics
– Loss Prevention
How do You Protect
Your Home?
Brainstorming Activity…..
ANALOGY:
Information Security is
very similar to the
physical security
of your home.
How do You Protect
Your Computer?
Brainstorming Activity…..
IASEP Video
Joint Project Purdue’s School of
Education and CERIAS
 Video is shown nationwide
 Provides a quick overview of the
security concerns that teachers face.

Information Security:
The Basics







Physical Issues
Software Practices
Password Protection
Encryption
E-mail Protocol
Integrating the Internet Safely
Privacy Primer for Educators
Software Security
The Case of the Snappy
Screen Saver
Download and install a screensaver.
Computer stops working afterwards.
The Case of Surfing the Net
Download “free” software from the Web.
Later named in a law suit for distributing
student data.
Software Security:
(Viruses, Trojans, Unwanted Access)

Only install necessary and trusted software.

Beware of *free* games, screen savers, and
graphics.

Run and UPDATE anti-virus software!!

Keep a hard copy of the copyright release
for all “free” products!
Virus Growth
60000
50000
40000
30000
20000
10000
0
1988




1988:
1990:
1993:
1999:
1990
Less than 10 known viruses
New virus found every day
10-30 new viruses per week
45,000 viruses and variants
Source: McAfee
1993
1999
Pikachu Virus: A K-12 Nightmare
This dialog box appears
after the
PIKACHUPOKEMON.EXE
file has been activated.
Worm:
• Accesses Outlook Address Book
• Embeds code to delete Windows
and Windows Subfolders upon
Restart.
•
+:
Does ask for permission to
delete files with a “Y” command.
Viruses, Malicious Code,
& Other Nasty Stuff
Examples of
Nasty Stuff:
Viruses
 Trojan Horses
 Worms
 Logic Bomb
 Trapdoors

Firewalls:




Restrict Incoming and Outgoing Information
Provides you with control over your system.
Physical Firewalls v. Software-based
Firewalls
Zone Alarm: http://www.zonealarm.com
–
–
–
–
FREE
VERY Effective
Easy to Use
Blocks Incoming/Outgoing
Valuable Resources:
http://www.zonealarm.com
http://www.urbanlegends.com
http://www.vil.mcaffee.com
http://www.cerias.purdue.edu/K-12
Physical Security
The Case of No Backups
Hard Drive Replaced...erased all of your
data. No Back-ups are available.
The Case of the Stolen Laptop
Laptop is stolen.
No Backups are available.
Unprotected confidential information.
Physical Security Practices
(File Management, Lost Information, Lost Equipment)
Try not to advertise secure spots.
 Minimize external access:

– Maintain appropriate locks
– Additional security features if necessary

Keep a “safe” climate
– Fix the temp. between 50-80F
Physical cont’d…

Protect cables, wires, etc. from feet!

Lock laptops when not in use.

Use a log in for general Windows use.

Keep drinks and food away from
equipment!
Physical Security cont’d….

MAKE BACK-Ups!!!!!!!
– Store on a separate disk!
– Keep the disk in a separate location!
– Keep a hard copy of critical information.
– Pay attention to where you are saving documents.
– Clearly label disks and files.
– Keep all magnets away from equipment.
Encryption
The Case of the Sniffer
Email grades/files between school-home.
Parent notifies that they have been denied
insurance.
The Case of Prying Eyes
Support staff gains access to student
data by using your POSTED password.
Encryption
(Protecting sensitive information)

Encoding information
– Secret Code Ring
– Cryptoquip
– Pig Latin

*Most* common applications offer password
protection.

Confidential (not critical)---USE ENCRYPTION!!!!

NEVER send HIGHLY SENSITIVE information
through email. (email should *never* be
considered secure!)
Encryption Practice
PGP: Pretty Good Privacy
(approx. $20 per unit)
Requires use of Public Keys
Sample PGP encrypted email:
Without the
proper keys...
the message is
unreadable.
Sample Encrypted Document:
Key Component to Encryption:
Password Protection
1.
Do not post or store your password near your
computer.
2.
Require passwords to be at least 8 characters
long.
3.
Use non-alpha characters and capital letters.
Boiler*makeR
4.
Iam@1016
KaTis15
Ge+>Smar+
Do not use easy to guess selections.
password
123456
computer hello
love
Passwords Continued…
5.
Use non-personal selections.
Avoid: name, spouse’s name, kids, ss#
6.
Maintain zero tolerance for password sharing.
7.
Warn users not to type their passwords when
someone is watching.
8.
Urge users to change passwords. (2-3 weeks!)
9.
Always remember to log out!
Constantly reinforce the importance of password
security.
10.
Password Practice
Write a “smart” password for the following
fictional teacher.
Be sure to follow all of the recommendations!
Samuel W. Miller
Greentown High School
Social Studies Teacher
Harvard Graduate
Likes to play golf
Has four children
1 wife named Betty
Enjoys woodworking
BREAK!!!!!
E-mail Basics
E-mail is similar to a postcard.
 E-mail is *not* secure—nor is it private.
 Encryption is the only way to help in
preventing others from reading your
e-mail.

Email Security Fundamentals

Question Unsolicited Documents.

Use attachments only when necessary.

Question ALL executable programs
received via email.

Notify the sender of infected emails!

Pay attention to file extensions...
Common File Extensions
Great Resource:
http://www.matisse.net/files/formats.html
Extension
.html .htm
.doc
.gif .jpg
.exe
Type
Webpage
Word Document
Graphic
Program—self extracting (*caution!)
Finding File
Extensions in
Windows-based
machines:
1. Click on START.
2. Select SETTINGS
3. Select CONTROL
PANEL
4. Select FOLDER
OPTIONS
5. Select VIEW
Make sure that this
box is *not* checked.
SPAM
Internet “Junk” Mail
 Unsolicited email—usually sent to
many people
 According to the Gartner Group, a
research firm, about 90% of email
users receive spam.

The Pros and Cons of Spam
A Brainstorming Activity….
Why Should I be Concerned about
Spam?

Costs Money.
– Recipient of the advertisement pays for the
connection time, disk space, bandwidth, etc.

Lost Productivity.
– Time, Time, Time

Clogged Email.
– May be prevent receipt of important messages.

Discourages Internet Use.
– May discourage others from seeing the benefits of the
WWW.
Types of Spam

Chain Letters:
– A message that urges readers to pass the letter on
in order to receive a reward.

Hoaxes:
– Chain letter that is based upon a fictitious scenario
or circumstance.

Urban Legends:
– Email messages providing “safety” messages or
warnings.
Resources to Find the Truth
About Spam:

http://www.urbanlegends.com

http://www.urbanmyths.com

http://www.earthlink.net/internet/security/spam

http://www.mcs.com/~jcr/junkmail.html

http://www.junkbusters.com
Ways to Reduce Your Daily
Intake of Spam




Use a “dummy” account for online promotions,
games, etc.
Request that your information be removed from
Internet “white pages”.
Be sure to HIDE your information when joining a
listserv or mailing list.
Cut and Paste funny stories, poems, etc.
– Encourage others to do the same!
Acceptable Use Policies
Link to the CERIAS AUP website.
Develop Classroom
Technology Guidelines
Supplement to overall AUPs
 Details expectations of the students
 Opens dialogue on infosec issues
 Protects the teacher---responsibility is
placed upon the choices made by
students

Reducing “RISK” of Internet Use






Guide students on the Internet---keep them
on track and task orientated.
ALWAYS supervise students using the
WWW!
Remember that a filter cannot be 100%
secure
Beware of “FREEBIE” offers!
Never open attachments that you do not
expect OR that are from someone you do
not know!
Update your anti-virus software frequently!
Recommended Search Engines---for teachers or
secondary students
Google
 Yahoo
 Lycos
 AltaVista
 Dogpile (meta search engine)

Kid-Friendly Search Engines






Yahooligans
KidsClick
Ask Jeeves for Kids
Awesome Library
Supersnooper
Searchopolis
All available online @
CERIAS’ K-12 Site!
Practice:
Regular Search Engine v. Kid-Friendly
Search Engine
Keyword: MERMAIDS
 Try it in: Lycos or Google

– http://www.lycos.com
– http://www.google.com

And then, in Yahooligans:
– http://www.yahooligans.com
General Searching Tips for Teachers:

Think about ALL of the different words to
describe your topic. (ex. Technology Resource Center)

Use as many keywords as possible.
Watch for mispelled words! 


If you are unsuccessful with one search
engine, try using a metasearch engine.

Become familiar with one search engine--and read its list of suggestions!
Why Should I Use Scavenger Hunts?
Excellent technique to guide students
on the Internet.
 Increases student time on task.
 Lessons can be used repeatedly with a
small amount of modification.
 Provides students with an opportunity
to increase their technical skills.
 Increased student motivation!

How Can Scavenger
Hunts be Used?
Individual Assignment
 Small Group Activity
 Whole Class Activity
 Enrichment Activities

Important Elements
to Include:
Introduction
 Specific Task (written or verbal)
 Clearly Defined Steps
 Set of Information Source (WWW or
other)
 Evaluation
 Conclusion (remind them what they’ve learned!)

Level 1 Sample:

Using this site:
http://www.contemplator.com/america/index.html

Answer the following question:
Legend has it that Henry VIII wrote the song
Greensleeves for whom?
Level 2 Sample:
Find the answers to the following question
by accessing the websites listed below:
What is the motto of the National Wildlife Federation?
• http://www.volcano.und.edu
• http://www.nhm.ac.uk/interactive.html
• http://www.nwf.org
Level 3 Sample:
Find the answer to the following question.
Be sure to include the answer and the URL of the
website where you found the answer:
Where did Neil Armstrong earn his Bachelor's Degree?
Privacy Primer
What is Privacy?

Privacy refers to “the ability to control the
degree to which people and institutions
impinge upon one’s life” (Hildreth & Hoyt,
1981)

Also, privacy refers to “the right claimed by
an individual to control the disclosure of
personal information about themselves”
(Adams, 2000)
Privacy Concerns...

Privacy issues out ranked world war,
terrorism, global warning, economic
depression, racial tensions, guns, and
overpopulation as the main concern for
Americans as they entered the 21st
century. (Adams, 2000)
Online Methods of Collecting Personal Information:

Direct Data Collection: online users voluntarily
complete surveys or information requests in
exchange for a benefit.

Indirect Data Collection: Web site owners obtain
information by depositing “cookies” onto your hard
drive. These cookies are small files that could
include any of the following: name of your ISP, the
“specs” of your machine, passwords, past online
purchases, last site visited, areas viewed on current
site, etc.
Online Privacy Rights:





Notice: consumers have the right to be notified that data
are being collected, how the data will be used, and to
whom it will be disclosed.
Choice: consumers should be able to limit the use of
information beyond what is needed to complete the
transaction
Access: consumers should have a timely and inexpensive
way to view data gathered about them and contest its
accuracy
Security: organizations that gather data from consumers
must reasonably ensure that the information they keep is
secure against loss of unauthorized use
Enforcement: effective enforcement against privacy
violators is critical to the protection of personal information
Privacy Legislation for Educators

FERPA:
– Family Educational Rights and Privacy
Act (1974) requires that educators
demeonstrate “due diligence” in
protecting student data, information,
records, and other sensitive information.
– Teachers can be personally held liable for
failing to maintain the integrity of such
data.
Legislation continued...

COPPA:
– Children’s Online Privacy Protection Act (1998)
requires that commercial Web sites targeted at
children under the age of 13 must follow a
detailed series of procedures (including
obtaining parental permission and review) prior
to gathering data.
– In a school setting, teacher may grant such
permission for educational purposes.
Practical Privacy Techniques for Teachers:
1.
1.
2.
3.
4.
5.
Practice Proper Information
Security Techniques
E-Mail Awareness
Download Precautions
Close the Cookie Jar
Read Privacy Statements
Set up a Second Online Account
Collection of Children’s Information

1999 Survey: 16 million children ---14% of US
citizens under the age of 18 regularly use the
Internet. (1999)

Study conducted by Cai and Gantz (2000) indicated
that the majority of Web sites targeted at children
collect personal information from their under-age
users.

Children also readily provide personal data in return
for a “great prize” (Carlson, 2000)
Dissemination of Privacy Practices to Students:




Fundamentals of protecting privacy is a
“new” skill that schools should address
(Willard, 2000)
Privacy issues need to be embedded within
the curriculum as readily as technical skills
(FTC, 2001)
Short lessons and natural teaching
moments work well for identifying the topic.
Teachers must serve as a role model for
privacy protection practices.
Need for Additional Research:
Few studies have been conducted to
determine the current status quo of
privacy protection within the K-12
environment.
 Institutions of educational research
should readily explore the issues
surrounding technology integration as
well as its effectiveness in the schools.

Privacy Conclusion:



As technology is introduced into schools, it
is critical to combine the technical skills with
the soft (ethical) skills surrounding the
media.
Attention needs to given to both teachers
and students upon this topic.
Teachers must practice privacy techniques
daily---to protect the information and serve
as a positive role model.
Applying this
workshop to YOUR world...
Working in groups...
Identify at least 5 ideas,
concepts, or activities that you
will be able apply to your school
environment.
Methods of Professional Development
Share creative methods of motivating
teachers.
 How do you fit professional
development into an already busy
school day?
 What are some critical elements
involved with professional
development?

Questions???
Download