Essential Question
What technological threats exist in a connected environment and how might I protect myself and my students?
Assignment Six Standards
4.a. Advocate, model, and teach safe, legal, and ethical use of digital information and technology, including respect for copyright, intellectual property, and the appropriate documentation of sources.
How will I meet the standards?
4.a. Advocate, model, and teach safe, legal, and ethical use of digital information and technology, including respect for copyright, intellectual property, and the appropriate documentation of sources
You will meet this standard by demonstrating an awareness of virus, malware, spyware, and digital terrorism threats, and sharing resources and suggestions for maintaining appropriate security in a connected age.
You will meet this standard by demonstrating an awareness of virus, malware, spyware, and digital terrorism threats, and sharing resources and suggestions for maintaining appropriate security in a connected age.
Tasks Due
What | Where | When |
Explore the resources provided, and create an initial posting outlining your understanding of virus, malware and digital terrorism threats as well as appropriate ways to stay secure against these threats. | Blog | Tuesday by midnight. |
Discuss current and recent virus, malware and cyberterrorism threats with your colleagues. Share any personal experience you have had with these threats. | Blog | Tuesday by midnight |
Post your reflection and synthesis of the week's activities. Include resources that you will continue to use, and information that you found most beneficial. Post your Diigo Link to be checked. | Journal | Friday by midnight |
Resources
Assignment
For this assignment we will explore resources that can provide background information and ongoing alerts concerning viruses, malware and security risks. In a connected world, there are always those who would like to obtain our personal information for their own gain, to disrupt sites to make a statement, or to simply get attention through proving they can out-maneuver a large site. If we use technology in an ongoing way, or if we use technology with our students at all we will be exposed to these threats. There is little we can do about this apart from keeping our anti-virus and malware software up to date, and staying informed about the viruses which are out there. We also need to be smart about going into websites which look suspicious and we must teach our students to do the same!
This week, your initial posting will simply outline your understanding of the threats that exist and resources that you might use to protect yourself and your students against these threats. There are many different links included in the Pearltree list this week.There are a number of links because I expect that you can find much of what you need in order to research during the week by clicking through some of these documents (which are trusted sites). As you research malware and virus, high-risk sites could be displayed. Be careful to insure that you do not click into sites that look suspicious. I tried to include information of varying technical levels. I included forums on which users may post for advice on ridding their computers of viruses and malware, as well as newsletters and blogs which are good resources for ongoing information about current threats. As always - please don't feel that you must read or explore ALL of these links. Click on those links that look most engaging to you. Through the group discussion, we will get a well-rounded view of the links that are presented.
Over the week, we will expand the discussion to include current and recent malware and virus threats. Following the #malware channel on Twitter can assist with this. One thing to be aware about is in email. When you receive an attachment is to make sure you know who the sender is. If you do not, then clicking on the link or attachment can cause a threat to your device.
At the end of the week, in your journal, please reflect on the information you found most helpful, the resources that you will continue to use, and the implications you believe the information encountered during the week will have in your own classroom and your personal computer use. REMEMBER to post your DIIGO LINK.
This week, your initial posting will simply outline your understanding of the threats that exist and resources that you might use to protect yourself and your students against these threats. There are many different links included in the Pearltree list this week.There are a number of links because I expect that you can find much of what you need in order to research during the week by clicking through some of these documents (which are trusted sites). As you research malware and virus, high-risk sites could be displayed. Be careful to insure that you do not click into sites that look suspicious. I tried to include information of varying technical levels. I included forums on which users may post for advice on ridding their computers of viruses and malware, as well as newsletters and blogs which are good resources for ongoing information about current threats. As always - please don't feel that you must read or explore ALL of these links. Click on those links that look most engaging to you. Through the group discussion, we will get a well-rounded view of the links that are presented.
Over the week, we will expand the discussion to include current and recent malware and virus threats. Following the #malware channel on Twitter can assist with this. One thing to be aware about is in email. When you receive an attachment is to make sure you know who the sender is. If you do not, then clicking on the link or attachment can cause a threat to your device.
At the end of the week, in your journal, please reflect on the information you found most helpful, the resources that you will continue to use, and the implications you believe the information encountered during the week will have in your own classroom and your personal computer use. REMEMBER to post your DIIGO LINK.
When we use blogs during the week, your participation is graded with the Participation Checklist:
Participation Checklist
2.0 Points - Candidate makes posts to the class three times on Friday
1.5 Points - Candidate posts to Reading Group by Tuesday at midnight, so that the group may respond and interact in a timely manner
1.5 Points - Candidate’s posts accurately reflect reading and/or video materials
2.5 Points - Candidate builds on the responses of classmates in the Reading Group discussion (adding new resources and promoting conversation)
2.5 Points - The first posting of the week is between 350 and 550 words in length.
Participation Checklist
2.0 Points - Candidate makes posts to the class three times on Friday
1.5 Points - Candidate posts to Reading Group by Tuesday at midnight, so that the group may respond and interact in a timely manner
1.5 Points - Candidate’s posts accurately reflect reading and/or video materials
2.5 Points - Candidate builds on the responses of classmates in the Reading Group discussion (adding new resources and promoting conversation)
2.5 Points - The first posting of the week is between 350 and 550 words in length.