Stage One Lessons

Topics: Safe online browsing, Cyber Bullying, Netiquette, Cyber Stalking

Stage Two Lessons

Topics: Passwords, Security, Private Information, File Sharing

Stage Three Lessons

Topics: Terminologies, Hacking, Spyware, Cyber Attacks

Don’t click on strange ads/links: Beware! Clicking on strange or unusual may lead to problems such as viruses or your computer being harmed. It is always best to click on link you trust.
Don't talk to strangers. Don't meet up with strangers: More than 3 billion people use the internet, with many of them having malicious intent. Be safe and avoid strangers online who suspiciously try to get to know more about you.
Parental permission before downloading, buying anything: Make sure you check with your parents before you download or buy anything online because you don’t want to unintentionally cost them money.
You’ll get in trouble if you download illegally: Did you know? Downloading content/materials online illegally can lead to you going to jail!
Limit your computer time: A study found that 30% of Americans look at a device for up to 9 hours a day. 61% of these users found that they had eye problems that include dryness, irritation and blurred vision.
Be kind, there are real people behind the other screen: Often times it’s easy to forget that there are other people on the internet behind the screens. Always be respectful towards other online and treat them how you would like to be treated.
If you see cyberbullying report it: See a bully, stop a bully! If you see someone harassing someone else on the internet make sure you report that user in order to create a safer environment for everyone else.
Don't say anything you wouldn't say in front of a person: If you wouldn’t say something to someone in person to their face, don’t say it over the internet either!
Keep your OS and antivirus updated: The threats of computer viruses and other forms of malware are always present. Make sure to keep your computers protected at all times!
Show respect for other people’s work: Never steal someone else’s work and claim it as your own! Always ask for permission if you can use someone else’s work and give them credit for it.
Have online boundaries: Make sure you don’t reveal too much personal information about yourself online, such as your location. This makes it easier for stalkers and creepy people to find you.
Citing sources correctly: Citing your sources is important because it shows where you get your information from. Using a reputable source allows others to know that your information is likely true and trustworthy.
No hate speech: Never say offensive things about a person’s race, gender, ethnicity, etc.
Photo safety: Don’t share photos of others online without their permission, and never take or post inappropriate photos of others. Once it’s seen on the internet, it’s there forever!
Fake news: If you are getting information from the internet, make sure you research the source to see if it’s reputable or not.
Searching technique: Make sure you spell everything correctly in the search engine, this will lead to more accurate results.
Safe use: Don't use your devices while in class/riding your bike/crossing the street - be respectful and safe to yourself and others.
Sharing videos/posts: Be mindful of others, don’t post gross things online.
Online scams: Be aware of online scammers and thieves. Avoid emails that claim you are a Nigerian Prince who is due to inherit millions of dollars.
Secure sites: Websites with SSL, HTTPS certificates are secure. Check this first before sharing private information.
Password security: Don't make an easy password - 12 character-long password, mix letters and numbers.
Logout: Always log out and sign out of your accounts. Especially if you are using someone else�s or a public computer.
Keylogging: A keylogger is a software that can see and record the things you type on your computer. Be careful with downloading programs from unknown sources. Keyloggers can take your information and use it without your permission.
Public wifi: Don't send information over public wifi, because this is not secure. Avoid making payments online.
Be discreet: Make sure nobody can see you typing your private information - standing over your shoulder.
Beware of unknown links: Don't click on sketchy links or follow instructions from strangers
Passcode: Locking your device with a password/protecting your device
Cover your webcam: Put a piece of tape or other item that will conceal your webcam and don't trust strangers who ask for your picture!!!
Online accounts: Ask your parents before creating an account. Don�t share the details of your account.
Usernames: Take care not to use any private information about yourself or your family. Do not share or use your real name, location, age.
td>
Sharing content online: Limit what you share and have boundaries. Respect other people�s rights and boundaries as well. Ask permission before sharing other people�s information.
Don't share your location: Turn off location sharing and never give out your address to anyone without receiving permission from your parents.
What is keylogging: Keyloggers use special computer programs to record keystrokes made by a computer user. They do this to get access to passwords and get other confidential information.
What is hacking: Hacking is when someone uses a computer to get unauthorized access to data in a system.
What is malware: Malware is specific software that is designed to damage/disable computers. Not nice!
How to remove malware: If you think your computer is infected by malware, alert an adult or a parent who can safely download a malware scanning and removing tool.
What is a cyber attack: an attempt by hackers to damage or destroy a computer network or system.
How to be safe from cyber attacks: Ensure that your antivirus software is up to date.
Downloading from reputable websites: don’t download content from websites that you don’t know or trust.
What is phishing: The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What to do when you’ve been hacked: reset your passwords and inform your contacts that you have been hacked.
Backup your files: Backing up your files will help you in the event that your computer has a virus and needs to be restored. If this were to happen, you would have a copy of all of your files and data.
What is AdWare: Adware can mean the software that automatically generates advertisements in a program that is otherwise free, such as an online video game. This means there could be some kind of creepy spyware that tracks your browsing habits secretly to generate those ads.
What is SpyWare: Spyware is a type of malware that is programmed to hide on a target computer or server and send back information to the master server, including login and password information, bank account information, and credit card numbers.
What is a Firewall: A firewall is a system using hardware or software in order to stop unauthorized access to a system.
What is Black Hat: Black hat hackers are those who engage in hacking for illegal purposes, often for financial gain, though also for notoriety. Their hacks (and cracks) result in inconvenience and loss for both the owners of the system they hack and the users.
What is White Hat: An ethical hacker who uses his skills in the service of social good. The term may also be applied to a hacker who helps a company or organization, or users in general, by exposing vulnerabilities before black hat hackers do.
What is a back door: A back door, or trap door, is a hidden entry to a computing device or software that bypasses security measures, such as logins and password protections. Some have alleged that manufacturers have worked with government intelligence to build backdoors into their products. Malware is often designed to exploit back doors.