Hack into Digital Security A Professional Development for Educators By | Annastasshia Ames


On a piece of paper or digital note:

List all the websites you can think of where you have established an account.


It probably looks more like this...

Our schools are now more digital than ever before and distance learning is becoming common place due to the pandemic.

It is more important that we protect our digital lives and teach our students to do the same.

Let me show you how to START

Take out the list you made at the beginning of the training!

Type just the number of accounts that you came up with in the class chat

Did you remember to include all streaming services, video games, apps, shopping sites, work sites, financial accounts, teaching websites, news websites, and any social media?

A Dashlane analysis of data from more than 20,000 users in 2015 found that the average user has...


Most of which are tied to the same singular email

Fact source | https://digitalguardian.com/

To know why this is extremely bad and puts you at HIGH risk, we need to understand the mind of the hacker.

Hacking into the mind of a Hacker

This is a hacker's view of accounts on their target website. Some locks are much easier to break then others.

Instead of bolt cutters, hackers have a variety of techniques to break into these locks

How do I get hacked?

These are some of the most common ways thieves acquire your personal credentials but there are many more techniques you should be wary of.







Photo Sources | https://www.sentinelone.com

Before we talk about how to defend against these attacks let's go deeper...

What do they do with my information?

If their attempt to access your accounts directly fail they will sell the account holder information in the dark web. The best form of protection is knowledge so lets demystify this a bit.

What is the dark web?

Simply put it is just the unindexed portion of the internet and generally nothing to be frightened of. The main allure of this space is anonymity.


How do we protect our private information?

Let's talk about what you could be doing vs. what you should be doing.

This is your digital life without security precautions

Digitally use the raise hand function if you have ever reused a password...

How do we fix this?

This is your digital life with a secure password

This is your digital data under a password management tool

write in the class chat something you notice about this picture



Searching with a VPN

Filter your searches through a virtual private network


Initializing two or multi-factor authentication

...something you know, something you have, and something you are...


Types of Attacks

  1. Brute Force | using a algorithm to break each unit of your password
  2. Extortion | threatening you into giving up your information
  3. Keylogging | watching you type in your password or pin
  4. Local Discovery | finding where you have physically writen your passwords
  5. Phishing | Using fake websites and links to get you to type in your credentials
  6. Password Spraying | Trying the most commonly used password or knowledge about the person to gain access through guessing.

Protection strategies

  1. Strong Password | containing over 6 variety of characters, non-repetitive, and absent of personal information
  2. Password Management | a software that provides singular, very strong passwords to each of your accounts
  3. VPN | a virtual private network that passes your search queries through a randomly located server far away from you to provide you a certain form of anonymity.
  4. Two-Factor Authentication | verifying your credentials through something you know and something you have
  5. Multi-Factor Authentication | verifying your credentials through something you know, something you have, and something you are.

Other Key Terms

  1. Credential stuffing | testing stolen credentials on multiple accounts of websites in order to gain unlawful access.
  2. Surface Web | only 4% of the internet, this is the indexed portion accessed by search engines such as Google, Bing, or Yahoo
  3. Deep Web | 96% of the internet, this unindexed portion of the internet can only be accessed if you have the specific address and credentials
  4. Dark Web | making up only .03% of the deep web, these sites or hidden services can only be accessed through specific software like Tor that provides almost total anonymity.

Breakout Rooms!

1. READ the victim profile

2. IDENTIFY each of the 4 passwords as SAFE or RISKY

3. MATCH THE SCENARIOS with the right type of HACKER ATTACK and DISCUSS what PROTECTION STRATEGIES the victim in your senario should UTILIZE TO PROTECT THEMSELF.

You have 8 MINUTES to complete this task with your partner before I return everyone to the main room.

Discussion & Questions

Please remember to do the post survey before leaving
Created By
Annastasshia Ames


Created with images by Ash Edmonds - "At the top of Reunion Tower in Dallas Texas, you’ll find these patterns wrapped around the center of the building." • Leon Seibert - "untitled image" • Jon Tyson - "untitled image" • Belinda Fewings - "Times gone by a Back to School scene from the 20th Century. Blackboard and chalk. The days before technology, when life was more simple, although school life much stricter. No calculators, we had to learn our times tables. This photo makes me feel fascinated. " • LIGHTFIELD STUDIOS - "african american mother and daughter preparing dough in virtual reality headsets in kitchen" • ake1150 - "Asian woman teacher teaching geography via video conference e-learning and cheerful elementary school student looking at globe, Homeschooling and distance learning ,online ,education and internet.." • Windows - "untitled image" • Jonathan Borba - "untitled image" • Mimi Thian - "untitled image" • Surface - "Microsoft Surface Laptop 3 in Platinum Shot by: Christiann Koepke " • Kelly Sikkema - "Young girl practicing kids coding on iPad" • Kelly Sikkema - "Boy practicing kids coding app on iPad" • stem.T4L - "untitled image" • stem.T4L - "untitled image" • McKaela Lee - "kids on iphones" • Ben Mullins - "untitled image" • Bermix Studio - "A child playing on the computer. Happy little girl playing video game pc." • Colton Sturgeon - "untitled image" • Brett Jordan - "iphone, ios, home screen, close up, pixels, retina, smartphone, icon, ios 14, icon, screen, phone, app, apps, " • Matt Artz - "Key" • Tommy Lee Walker - "Old rustic lockers connected to a barrier in Berlin as love evidence" • Zbysiu Rodak - "untitled image" • Kevin Ku - "untitled image" • Clint Patterson - "Pictured - a man at a computer disguised as an anonymous hacker wearing a Guy Fawkes mask." • Joan Gamell - "Javascript program in a vscode code editor with Dracula theme" • Dayne Topkin - "untitled image" • Oxa Roxa - "untitled image" • Debby Hudson - "combination lock" • Dimitry Anikin - "Padlocks on a pedestrian bridge in Odessa, Ukraine." • Dan Nelson - "VPN turned on a iPhone" • Danielle Rice - "A trip to the city to see how the world is shut down" • Siora Photography - "School Girl with Book in front of natural rustic red brick background holding book up to her face." • KOBU Agency - "Searching" • Courtney Hedger - "Thank You wooden cubes"