AOIT Principles of Information Technology Lesson 4 Staying Safe Online Student Resources Resource Description Student Resource 4.1 Worksheet: Cybercrime Scavenger Hunt Student Resource 4.2 Reading: Maintaining Your Privacy and Acting Ethically Online Student Resource 4.3 Worksheet: Protecting Your Privacy Student Resource 4.4 Writing Assignment: Reflective Essay Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online Student Resource 4.1 Worksheet: Cybercrime Scavenger Hunt Use the following websites and additional online resources (if necessary) to find the answers to as many of the following questions as possible. Be sure to make resource notes citing where you found each answer. You have a limited amount of time, so work as quickly as you can. Questions do not have to be answered in order; you may skip around. “How a Computer Virus Works.” Cable News Network (CNN), http://archives.cnn.com/2000/TECH/computing/10/23/virus.works.idg/ Symantec Security Response, Symantec Corporation, http://www.symantec.com/security_response/index.jsp Computer Crime and Intellectual Property Section, U.S. Department of Justice, http://www.usdoj.gov/criminal/cybercrime/index.html OnGuard Online, U.S. Government, http://onguardonline.gov/index.html 1. How can a cybercriminal harm a person whose personal information he or she has stolen? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 2. How do web bugs (spyware) invade a person’s privacy? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online 3. What do cyberstalkers do? How do you protect yourself from them? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 4. How can you avoid becoming a victim of identity theft? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 5. What is phishing? What are some clues you can look for to avoid it? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 6. Briefly summarize two examples of cybercrime stories. _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 7. What’s a bot? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online 8. Name three things you should do if you believe you’ve been victimized by crimeware or online fraud. _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 9. How does pharming work? _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ 10. Name two ways to protect your password. _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online Student Resource 4.2 Reading: Maintaining Your Privacy and Acting Ethically Online On the Internet, our digital fingerprints are everywhere. Though most Internet use is harmless, there are still lots of things to think (and be concerned) about. Parents worry about the information collected when their children are online. Also, the rise of identity theft has made people wonder how safe e-commerce is and how they can protect their personal information. Furthermore, there are things we must think about when dealing with the information we find online, so that we act in an ethical way at all times. Protecting Your Privacy The Federal Trade Commission (FTC) is the government agency that regulates the Internet. It is the FTC’s job to teach everyone about the importance of online privacy and to fight online crime and unfairness. The FTC also works to protect children's privacy when they are online. Children’s Online Privacy Protection In 1998, Congress passed the Children’s Online Privacy Protection Act (COPPA). This law put parents in charge of what information is collected online from their young children. Anyone who runs a website or online service for children under 13 must follow COPPA. Users must have a parent’s permission before they give their personal information or create accounts. Parents can review and delete any information about their children stored on any website. The FTC takes COPPA very seriously, and has even sued companies that ignore it. For example, Xanga was fined $1 million because they let children under 13 to sign up for their service without getting their parent's permission first. Personal Identity and Financial Privacy Some people use the Internet to try to take money from others or to pester people with spam. Beware of any “get rich quick” schemes that promise to help earn you lots of money in your spare time. You should also ignore emails and websites that make big promises. Offers that sound too good to be true usually don’t provide anything but a headache. Businesses can get your personal information in lots of ways. One is when you buy something. This, of course, is perfectly legal. Another legal method is when one company shares information with another company. This information can include your name, telephone number, address, age, or ethnicity, but not things like your social security, bank account, or credit card numbers. A lot of people are worried about identity theft. You can reduce your risk of ID theft by understanding how criminals work and following some common-sense suggestions. We often think of ID theft as having a wallet or purse stolen and the thief using a credit card, driver's license, or other identification to commit crimes. With the rise of the Internet, though, we also have to worry about electronic theft of social security, bank account, or credit card numbers. If a thief gets this information using spyware or by phishing, he or she could use it to open and use credit card accounts in your name, take out fraudulent loans, or commit other crimes. Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online What is phishing? Phishing, also called “spoofing,” is something everyone must look out for. The idea is that bait is thrown out with the hopes that, while most people will ignore it, some will bite. Con artists send millions of emails that seem to come from websites people trust, like their bank or credit card company. In the emails, phishers ask for personal information. If they get any, the thieves then use it to commit crimes in their victim’s name. Phishing typically happens in the form of emails or pop-up screens that ask you to validate or update your account records. A thief can use any sensitive information that is entered to transfer money, make payments, and commit other crimes. Never forget that real companies will not ask you for personal information in an email. Never reply to these emails or click any links in the messages. A phishing filter can help protect you from web fraud and the risks of identity theft by warning you about or blocking you from reported phishing websites. Losing money is only one of the risks of identity theft. Thieves can use your data to get a driver's license or other ID with their photo but your name and information. They can then use that ID to get jobs and file fake income tax returns, apply for passports and visas, file insurance claims, or even give your name and mailing address to police and other authorities if they are arrested. Web Bugs and Spyware Web bugs are used to find out who is looking at a certain web page or email. Bugs can also tell when a page was viewed, identify a computer, tell if information from one website was copied onto another, or show if an email was forwarded. Usually bugs are invisible, so users don’t know which pages might have them. Spyware is software that is installed on your computer without your knowledge. It monitors your Internet use and can also make your computer do things, like send your web browser to a page you don't mean to visit, install other software, collect personal data, or give your information to someone else. One way that businesses protect their confidential data is with employee monitoring. The American Management Association performed a survey on employee monitoring and found that 75% of businesses surveyed monitored their employees. It is legal for companies to monitor employees’ Internet use, read and keep emails, listen to phone calls, and even monitor keystrokes, if the employee is using the company’s resources (i.e., computer and Internet connection). However, it is smart for a company to have a written policy about this and to tell both customers and employees of any potential monitoring. Copyright Copyright laws are another way to protect information. These laws protect the use of original ideas and information. When conducting research, you must follow copyright laws. One way to use quotes, graphics, or pictures is to ask permission. To do this, contact the owner of the copyrighted materials. This is usually done through the publisher and involves a specific request form. Another way is to cite your sources. Use a citation any time you quote two or more words, paraphrase or summarize facts and ideas, use original images, or use noninterchangeable computer programs like calculation programs, data analysis programs, geographic information systems (GIS), or three-dimensional information software. Using someone else’s words, ideas, or images without asking permission or citing the source is called plagiarism or copyright infringement. This is against the law and, of course, school and company policies. School or company plagiarism policies generally include punishments such as being expelled or fired. The original author whose copyrights were violated also has the option to sue the plagiarist. Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online Piracy At its most basic level, piracy is stealing. Specifically, piracy is the infringement of copyright on items like computer software, music, or movies. It’s piracy if you use, sell, or copy such items without permission from the owner. How Do People Commit Piracy? Any time you download a piece of software, music, or a movie from a legitimate website, you must pay for it. If you ever come across a site offering these materials for free, chances are that the site is involved in piracy. Occasionally, software, known as “freeware,” is truly free, but this is the exception, not the rule. Think of the Internet as a store: you wouldn’t leave a store without paying for your items, so never leave a website without doing the same. Some people get involved in piracy by joining peer-to-peer (P2P) networks. These sites allow users to share all sorts of files. Though some file sharing is perfectly legal (if you have created the file you are sharing), many people using P2P sites are sharing items whose copyrights they do not own. In recent years, the government has made moves to shut down these sites and punish people who use them. In one famous case in 2001, a large P2P music-sharing site, Napster, was forced to close and could only reopen as a paid-subscription service for downloading music. Events like this are becoming more common all the time. What Can Happen When Someone Commits Piracy? Pirates can face a variety of punishments. At the least, a person may have her account permanently closed by her Internet service provider. In some cases, the government has gotten involved, charging fines and sending guilty parties to jail. The Piracy Deterrence and Education Act of 2004 (PDEA) was designed to stop Internet piracy. When the bill was passed, it was estimated that “the most popular peer-to-peer file trading software programs have been downloaded by computer users over 600,000,000 times. At any one time there are over 3,000,000 users simultaneously using just one of these services. Each month, on average, over 2,300,000,000 digital-media files are transferred among users of peer-to-peer systems” (PDEA, 2004). As you can see, this is a huge problem, one that businesses and the government cannot ignore. Under the PDEA and the Copyright Act, a person who pirates a movie, music, or software can be fined up to $250,000 for each item they copy or share and be jailed for up to five years. Artist and industry groups are also on the lookout for pirates. As of July 2006, the Recording Industry Association of America (RIAA) had sued over 20,000 people for sharing music files. What Else Can Happen? When someone commits piracy, he often causes trouble for those around him. For example, if you were to download an illegal copy of a song or movie while at school or work, your school or employer could also get in trouble. Schools and businesses must follow the same laws that individuals do—this means no copying or sharing is allowed. As a result, schools that find students involved in piracy may close the student’s account, suspend the student, or even choose to expel him. Businesses may do the same, closing the employee’s account, placing him on probation, or firing him. How Can I Avoid Piracy? The best way to avoid piracy is to stay away from P2P websites. Also, be sure that you pay for anything you download from the Internet. If you can’t afford to buy something, check with your local library to see if Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online you can borrow a copy, or see if a friend will loan you the CD or movie you are interested in. Another option is to use a friend’s computer, if she has software you are interested in. What Should I Do If I Suspect Piracy? The old saying “If it seems too good to be true, it probably is” is true. If you come across a website offering free copies of the latest music, movies, or software, don’t download them! You can report piracy at several websites: Music: Contact the RIAA at http://www.riaa.org/reportpiracy.php Movies: Contact the Motion Picture Association of America at http://www.mpaa.org/ReportPiracy/ReportPiracy.aspx Software: Contact the Software and Information Industry Association (SIIA) at http://www.siia.net/piracy/report_software.asp These groups take piracy very seriously, and want your help. Some, like the SIIA, even offer rewards of up to $1 million to those who report pirates. Protecting Yourself Online The Internet is an amazing tool. It gives you the opportunity to explore, shop, and communicate with the world from the comfort of your home or school. Unfortunately, all kinds of predators, scam artists, and thieves have made their way to the Internet as well. Take steps to help prevent yourself from becoming a victim of someone’s malicious computer scheme. Authentication Authentication is the process of identifying a user logging on to a network or confirming the identity of a transmitted message. In private and public computer networks (including the Internet), authentication is typically done through the use of passwords. Knowledge of the password is assumed to guarantee that the user is who he claims to be. The first time you register on a network, you are either assigned a password or asked to choose one yourself. Each time you go to that network, you must remember and use the previously declared password. Passwords are the simplest authentication model to use, and that is why password models are so common. Unfortunately, they are also a weak authentication model because passwords are guessed or stolen relatively easily. Thus it is important to choose a password that is hard to crack. Here is a checklist for a strong password: It contains at least eight characters. It contains at least one number. It has at least one letter. It makes use of at least one symbol (such as !, %, #, $, or &). It does not use simple names or words (even foreign words), simple patterns, or famous equations. It is easy for you to remember. Coming up with a password that’s both strong and easy to remember can take some creativity. Try using part of a phrase, song, or poem that is easy for you to remember. If you are having problems Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online remembering your password, write down your “system” in a way that only you can understand it. Remember: never write down the password itself! Once you have chosen a password, avoid using the “Remember Password” feature. This feature, typically used to access secure applications (like email, calendar, and financial systems) and web browsers (such as Mozilla Firefox and Internet Explorer), does not adequately protect passwords. It may be possible for a computer virus or unauthorized user to obtain this stored information. Some computer systems achieve security with authentication tokens. An authentication token is a tool used in the authentication process to identify a user in a computer system or network. The tool is a device or image known as a token. Specialized token-reader hardware and/or software is sometimes necessary to use a specific token. Authentication tokens include fingerprints, retina scans, iris scans, facial scans, USB tokens, and smart cards. A smart card is a small plastic card (the size of a credit card) that contains a cryptographic key. The user unlocks it using a special key pair. When you log on to a system, you put your smart card into a special reader attached to the system. The system reads the key from the smart card and asks for your passphrase to unlock the key. After you enter your passphrase, the system performs a cryptographic key exchange with the central server for verification of the key. Smart cards have the unique ability to store large amounts of data, carry out their own on-card functions (e.g., encryption and mutual authentication), and interact in an intelligent manner with a smart card reader. Preventing Cyberstalkers Cyberstalking is a kind of crime committed online by perpetrators who seek to harass victims, sometimes in the form of sexual violence or interpersonal violence. You can take the following steps to prevent cyberstalking: Always select a gender-neutral user name for your email address or for chat. Share your primary email address only with people you know and trust. Don’t give out personal information (such as your real name, address, or phone number) in your profiles. If someone bothers you in a chat room and won’t go away, put them on “block” or “ignore.” Do not give your password to anyone, especially if someone sends you an IM. Your service provider will never ask you for your password. Be very careful about putting pictures of yourself online. Some stalkers are obsessed with an image. Talk to a parent or authority you trust about uncomfortable situations. Surfing Anonymously It’s easier than ever for the government, websites, and corporations to track exactly what you do online, know where you’ve visited, and create profiles about your likes, dislikes, and private habits. The easiest way to make sure websites can’t gather personal information about you and your computer is to surf anonymously by using an anonymous proxy server that sits between you and the websites you visit. Search engines are also available that will not keep track of your cookies (like Scroogle.org). Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online Student Resource 4.3 Worksheet : Protecting Your Privacy Review the online profile on the following pages. What information is okay for this user to reveal? What should she not have revealed? Circle areas where you think the user made good choices to protect her privacy. Draw boxes around things you think the user should not have revealed about herself. Add any notes or comments you think of as you review these pages: What would you do differently? Is there a way she could have told some things about herself in a better way that would have protected her privacy more? Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online Your notes and comments: _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online Your notes and comments: _____________________________________________________________________________ _____________________________________________________________________________ _____________________________________________________________________________ Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online Student Resource 4.4 Writing Assignment: Reflective Essay As an Academy of Information Technology student, what will your personal guidelines be for behaving online? Think about all that you have read and we have discussed during this lesson. What points have stayed with you the most? Is there anything you now know not to do when you are online that you did not know before beginning this lesson? Write about what you think are the three most important things Internet users should keep in mind when surfing the web. Use the following guidelines to structure your essay: Write an opening paragraph that states the topic of the essay and clearly outlines the main points to be discussed. Think about and answer the questions in the first paragraph of these assignment instructions, writing answers for each that are at least one paragraph long. Use specific examples and explanations that refer back to the material you have learned during this lesson. Write a concluding paragraph that summarizes what you have learned about online crime and privacy concerns. As you write, refer to the rubric your teacher gave you, and remember to consider the qualities of a good essay. Copyright © 2008 National Academy Foundation. All rights reserved. Unit 1 Getting Started and Computer History Lesson 4 Staying Safe Online Exemplar: Things to Keep in Mind When Writing an Essay Study this exemplar of a reflective essay and use it as a guide when writing your essay. Writing a good essay takes time and lots of thought. Before I begin, I plan what I am going to write. I make sure to think of specific examples for each point I plan to make. While I write, I am careful not to use slang words. I also know that I will have to rewrite the first draft before turning the essay in. Lastly, throughout the writing process, I try to keep important tips in mind to ensure my essay turns out well. In general, my guideline for writing essays is to carefully plan what I will write before I begin writing. This means I create an outline of the points and examples I plan to use. For example, when I wrote an essay on the causes of the Civil War, I wrote each cause down and thought about at least two examples that would go with each cause. Preparing a detailed outline like this helped me stay on topic when I started to write and has helped me get better grades on my essays. As I have gotten better at writing essays, one particular point sticks out in my mind: how important it is to be specific. Teachers want us to use examples in our writing so that they know we really understand what we talked about in class. The best way to do this is to give direct examples from the textbook and from class discussions. The more essays I write, the more I learn what to do and what not to do. For example, in one essay for English, I used too many slang words, like sweet, cool, lame, and hot. My teacher told me slang words could make it hard for some readers to understand what I am saying. Another example of what I have learned is that I get a better grade if I write a second draft. The first time I write the essay I focus on making my points and giving examples. Then, I rewrite the essay on a clean piece of paper. This gives me a chance to make sentences read better and change or add words that help readers understand what I am trying to say. Rewriting the essay draft also lets me focus on extra neat handwriting. I think the three most important tips to keep in mind when writing an essay are: make sure you understand the topic, make an outline of what you want to write, and include specific examples. It is easy to write a good essay on the wrong topic if you do not really understand what the question is. I read the question a couple of times and make sure to talk to the teacher if I am not sure I understand. As I wrote earlier, writing an outline helps me stay focused on answering the question, and using specific examples helps prove to the teacher that I understood what we learned in class. In conclusion, I think it is important to give yourself enough time to write a really good essay. Before you write a good essay, it is important to understand the topic and write down a detailed outline with specific examples. When you begin writing, it is important to use clear language and good detail. Finally, it is smart to plan to rewrite your first draft to correct mistakes and make it easier to read. Copyright © 2008 National Academy Foundation. All rights reserved.