|
Privacy and Security
Page history
last edited
by Patricia Bunch 6 years, 2 months ago
Use this Wiki to complete Privacy and Security!
• I can discuss potential threats to privacy. • I can discuss possible ways to protect my privacy. • I can recognize both weak and strong passwords.
|
|
1. Two Truths and a Lie!
A. I love skiing!
B. I went to Mexico for my honeymoon and climbed Chichen Itza!
C. In high school, I got a D in Trigonometry!
Which one is my lie?
Make up your own... TWO truths and ONE lie.
|
2. Social Smarts Group Discussion Topics
Read the graphic novel, Social Smarts: Privacy, The Internet and You, as a group.
Answer the questions you were assigned.
· Group A: Discuss what steps you can take to make sure that you have control of your online information.
- Why is it important to lock privacy settings and set strong passwords?
- Who can access your personal information if you do not lock your privacy settings tight?
- Why is it important to use different passwords for different online sites?
- Is it always possible to delete a picture or post, permanently, after you have put it online?
|
|
Group B: Discuss how you can make sure that the information you post does not give the wrong impression of who you are in real life.
- What sort of information is best left offline?
- How can little details add up to something big?
- How someone can figure out where you live from the information you are posting online.
- Can posting where you are going to be at certain times turn into a safety issue?
|
|
Group C: Discuss how you can learn about privacy risks of new technologies, such as online gaming devices, before you use them.
- Does every new kind of technology pose a privacy risk?
- What are some good ways to figure out if or how a new technology can pose risks to your online privacy?
|
|
Group D: Discuss the importance of taking steps to protect your privacy on mobile devices.
- If you lost your mobile device, today, and it had no password, what information would you be most worried about?
- Are there any reasons why you would not put a password on your mobile device?
- How much information could someone learn about you if you left your mobile phone on the bus and it was not protected
|
|
|
3. Tracking Teresa!
Vocabulary:
a. Personal Information - Personal information is information about an individual. It can include your name, social security number, birthday, e-mail address, and phone number. b. Identity - All of the factors that make up who you are. c. Online Profile - An informal online summary of who you are. d. Security – Freedom from danger. Online, security refers to protecting one’s private/personal information.
|
3. Tracking Teresa Video:
Watch the video below to answer the questions about
|
4. Password Tips!
Do's |
Don'ts |
• DO share your password only with you parents.
• DO create passwords with at least eight characters.
• DO use combinations of letters, numbers, and symbols, which are harder to crack than just words.
• DO change your password regularly – at least every six months.
|
• DON’T give a password to anyone else – not even your friends.
• DON’T use passwords that are easy for people you know to guess, like your nickname or your pet’s name.
• DON’T use any private identity information in your password.
• DON’T use a word in the dictionary as a password.
|
|
Use common sense!
Know the kinds of personal identity information:
• Full (first and last) name
• Email addres
• Passwords
• Credit card numbers
• Mother’s maiden name
• Postal address
• Phone numbers
• Calling card numbers
• Social Security number |
5. Understanding Your Online Footprints
Use the Powerpoint to complete Cornell Notes
Make sure you fill in the headings!
Objective:
Students will be able to analyze potential online dangers in order to recognize safe and appropriate decisions when using social media.
Essential Question:
How can I protect my personal information online?
|
|
Group A:
· Discuss what steps you can take to make sure that you have control of your online information.
o Why is it important to lock privacy settings and set strong passwords?
o Who can access your personal information if you do not lock your privacy settings tight?
o Why is it important to use different passwords for different online sites?
o Is it always possible to delete a picture or post, permanently, after you have put it online?
|
Group B:
· Discuss how you can make sure that the information you post does not give the wrong impression of who you are in real life.
o What sort of information is best left offline?
o How can little details add up to something big?
o How someone can figure out where you live from the information you are posting online.
o Can posting where you are going to be at certain times turn into a safety issue?
|
Group C:
· Discuss how you can learn about privacy risks of new technologies, such as online gaming devices, before you use them.
o Does every new kind of technology pose a privacy risk?
o What are some good ways to figure out if or how a new technology can pose risks to your online privacy?
|
Group D:
· Discuss the importance of taking steps to protect your privacy on mobile devices.
o If you lost your mobile device, today, and it had no password, what information would you be most worried about?
o Are there any reasons why you would not put a password on your mobile device?
o How much information could someone learn about you if you left your mobile phone on the bus and it was not protected?
|
Privacy and Security
|
Tip: To turn text into a link, highlight the text, then click on a page or file from the list above.
|
|
|
Comments (0)
You don't have permission to comment on this page.