YOUR CLASSROOM DOESN'T LOOK LIKE THIS ANYMORE
It probably looks more like this...
Our schools are now more digital than ever before and distance learning is becoming common place due to the pandemic.
It is more important that we protect our digital lives and teach our students to do the same.
Let me show you how to START
Take out the list you made at the beginning of the training!
Type just the number of accounts that you came up with in the class chat
Did you remember to include all streaming services, video games, apps, shopping sites, work sites, financial accounts, teaching websites, news websites, and any social media?
A Dashlane analysis of data from more than 20,000 users in 2015 found that the average user has...
90 ONLINE ACCOUNTS
Most of which are tied to the same singular email
To know why this is extremely bad and puts you at HIGH risk, we need to understand the mind of the hacker.
Hacking into the mind of a Hacker
This is a hacker's view of accounts on their target website. Some locks are much easier to break then others.
Instead of bolt cutters, hackers have a variety of techniques to break into these locks
How do we protect our private information?
Let's talk about what you could be doing vs. what you should be doing.
This is your digital life without security precautions
Digitally use the raise hand function if you have ever reused a password...
How do we fix this?
This is your digital life with a secure password
This is your digital data under a password management tool
write in the class chat something you notice about this picture
ADDITIONAL PROTECTION:
#1
Searching with a VPN
Filter your searches through a virtual private network
#2
Initializing two or multi-factor authentication
...something you know, something you have, and something you are...
LET'S REVIEW
Types of Attacks
- Brute Force | using a algorithm to break each unit of your password
- Extortion | threatening you into giving up your information
- Keylogging | watching you type in your password or pin
- Local Discovery | finding where you have physically writen your passwords
- Phishing | Using fake websites and links to get you to type in your credentials
- Password Spraying | Trying the most commonly used password or knowledge about the person to gain access through guessing.
Protection strategies
- Strong Password | containing over 6 variety of characters, non-repetitive, and absent of personal information
- Password Management | a software that provides singular, very strong passwords to each of your accounts
- VPN | a virtual private network that passes your search queries through a randomly located server far away from you to provide you a certain form of anonymity.
- Two-Factor Authentication | verifying your credentials through something you know and something you have
- Multi-Factor Authentication | verifying your credentials through something you know, something you have, and something you are.
Other Key Terms
- Credential stuffing | testing stolen credentials on multiple accounts of websites in order to gain unlawful access.
- Surface Web | only 4% of the internet, this is the indexed portion accessed by search engines such as Google, Bing, or Yahoo
- Deep Web | 96% of the internet, this unindexed portion of the internet can only be accessed if you have the specific address and credentials
- Dark Web | making up only .03% of the deep web, these sites or hidden services can only be accessed through specific software like Tor that provides almost total anonymity.
Breakout Rooms!
1. READ the victim profile
2. IDENTIFY each of the 4 passwords as SAFE or RISKY
3. MATCH THE SCENARIOS with the right type of HACKER ATTACK and DISCUSS what PROTECTION STRATEGIES the victim in your senario should UTILIZE TO PROTECT THEMSELF.
You have 8 MINUTES to complete this task with your partner before I return everyone to the main room.
Credits:
Created with images by Ash Edmonds - "At the top of Reunion Tower in Dallas Texas, you’ll find these patterns wrapped around the center of the building." • Leon Seibert - "untitled image" • Jon Tyson - "untitled image" • Belinda Fewings - "Times gone by a Back to School scene from the 20th Century. Blackboard and chalk. The days before technology, when life was more simple, although school life much stricter. No calculators, we had to learn our times tables. This photo makes me feel fascinated. " • LIGHTFIELD STUDIOS - "african american mother and daughter preparing dough in virtual reality headsets in kitchen" • ake1150 - "Asian woman teacher teaching geography via video conference e-learning and cheerful elementary school student looking at globe, Homeschooling and distance learning ,online ,education and internet.." • Windows - "untitled image" • Jonathan Borba - "untitled image" • Mimi Thian - "untitled image" • Surface - "Microsoft Surface Laptop 3 in Platinum Shot by: Christiann Koepke " • Kelly Sikkema - "Young girl practicing kids coding on iPad" • Kelly Sikkema - "Boy practicing kids coding app on iPad" • stem.T4L - "untitled image" • stem.T4L - "untitled image" • McKaela Lee - "kids on iphones" • Ben Mullins - "untitled image" • Bermix Studio - "A child playing on the computer. Happy little girl playing video game pc." • Colton Sturgeon - "untitled image" • Brett Jordan - "iphone, ios, home screen, close up, pixels, retina, smartphone, icon, ios 14, icon, screen, phone, app, apps, " • Matt Artz - "Key" • Tommy Lee Walker - "Old rustic lockers connected to a barrier in Berlin as love evidence" • Zbysiu Rodak - "untitled image" • Kevin Ku - "untitled image" • Clint Patterson - "Pictured - a man at a computer disguised as an anonymous hacker wearing a Guy Fawkes mask." • Joan Gamell - "Javascript program in a vscode code editor with Dracula theme" • Dayne Topkin - "untitled image" • Oxa Roxa - "untitled image" • Debby Hudson - "combination lock" • Dimitry Anikin - "Padlocks on a pedestrian bridge in Odessa, Ukraine." • Dan Nelson - "VPN turned on a iPhone" • Danielle Rice - "A trip to the city to see how the world is shut down" • Siora Photography - "School Girl with Book in front of natural rustic red brick background holding book up to her face." • KOBU Agency - "Searching" • Courtney Hedger - "Thank You wooden cubes"