Home
Cyber Security for Staff - Anchorage School District
Contents
1. Network s L5 Msd AppTech S201 L Mshome AppTech Server E215 4 grandma My Network Bingham E3xx Applications L Njrotc Nilliam SPYING Always save your documents in a locked folder when saving a copy on the server S Eiben Mac Network AppTech S201 AppTech Server E215 Bingham E3xx J Mshome My Network grandma Applications T3148 149 Groups Home l adti It SPYING Always save your documents in a locked folder when saving a copy on the server BE Desktop AppTech Serve Q grandma My Network Bingham E3xx Applications Niro Nilliam AA O 2 choose AJ W Sav As Grades 07 08 copy egp x Documents i vV your name amp Grandma s Com Ql Desktop m i s E Eiben Mac Documents iben vac Pcr Network Library Groups eiben Movies Home T elben_carol Music aai aatan i Pictures SPYING If you have a mobile account a copy is automatically saved on your hard drive AND on the server so you do not have to log onto the server to save a copy Just make sure to always save your documents inside your Desktop or Documents folders Save AppleWorks 6 Save As untiti v Where Documents emplate Document SPYING Make sure your password for the server is not obvious NEVER OOO Connectto sever 000000 d Connect to
2. Preferences 8 v Block Pop Up Windows 38K Private Browsing Reset Safari Empty Cache Services Hide Safari Hide Others Show All Quit Safari Another security problem with the Internet is SPYWARE Spyware is any technology that aids in gathering information about a person or organization without their knowledge On the Internet where it is sometimes called a spybot or tracking software spyware is programming that is put in someone s computer to secretly gather information about the user and relay it to advertisers or other interested parties SPYWARE Googled Apple about Spyware but got no response lt is a safe bet that they use spyware to gather marketing information How else could they know which software updates to send you Search Apple Store 1 800 MY APPLE Chat amp amp Search results spy ware No items were found that matched your query SPYWARE Googled spyware for a Mac but personally do not trust the companies to provide software that is spyware virus worm or trojan free do trust my firewall however ym eT UTES Tm SPYWARE Your Mac has a firewall that you can turn on in your System Preferences under Sharing Sharing Window Help Fr rd System Preferences Edit F3 O E a gt ShowAll aring Computer Name Grgfidma s Computer ner computers on your local subnet can access your computer at Grandfnas C
3. the file server AJ Wendler File u S e yO U r e Server LAST NAME mm User Name eiben_carol Students are smart Password enough to figure that Remember password in keychain out and get full access to all your u files Change your password here SPYING Did you know that staff with an administrative password to your computer and Apple Remote Desktop ARD software can see and control your screen and all that you do from their own com puter EA Desktop File Edit Report Manage Interact Task lt Bee Sem EQ We h ave ARD SO th at our Previous Next Observe Control Curtain Copy Install UNIX Reports Spotlig Tech Guy can fix your computer remotely so it can be a very good thing All laptop team teachers and computer lab teachers have ARD on their computers to manage student computers SPYING 680 Sharing a You can turn Apple Remote Desktop on or off in System Computer Name Grandma s Computer Preferences under Sharing Other computers on your local subnet can access your computer at Grandmas Computer local Select a service to change its settings f Services Firewall Internet Service Personal File Sharing Windows Sharing Personal Web Sharing Remote Login FTP Access Apple Remote Desktop Remote Apple Events Printer Sharing Xgrid Remote Desktop Control Off Click Start to allow others
4. to be a company such as Amazon or a bank and asks for information Disconnect your computer from the Internet when it is not in use Don t use file sharing or download software without being confident of its source Use caution i before you fall z CAUTIONIS into a hole and 7777 can t get out Another security problem with the Internet is Identity theft The best way to prevent identify theft is Don t ever give out private information on the Internet Some examples of private information are Your social security number your phone number your full name or your credit card number F Ez A Alle Je E Jultrabranch ala alasi However if KUSA Enstar ABT MYPD Moves foh 3D Fonts CC AlaskaUSA Federal Credit Union you do business on 7 the Internet so Login Instructions Login to UltraBranch Step 1 of 2 be sure to 1 Enter your User ID in the field above 2 Click Next to enter your PAC use an Resolve common login problems wih the Utrabranch Youbleshootng Supported Browsers organization Not signed up for UltraBranch yet Interactive demos UltraBranch UltraBranch Mobile yo u ca n tru st E UltraBranch Business Edition Sign up for UltraBranch Return to Alaska USA homepage Empty the browser Cache to prevent others from looking at your page after you walk away a File Edit View Hist About Safari Report Bugs to Apple q d
5. Cyber Security For Staff at Wendler Middle School That s exactly what can happen to your computer when you aren t careful e Something called malicious code can get into your computer and mess things up without you even knowing it Viruses worms and Trojan Horses are all types of malicious code that can enter your computer and harm or even destroy your files Inbox ASD 43 messages KentuckyMath wmv may contain an application dh The safety of this file cannot be determined Are you sure you want to open KentuckyMath wmv Cancel Open 114 000 viruses Not on a Mac By the end of 2005 there were 114 000 known viruses for PCs In March 2006 alone 850 new threats were detected against Windows Zero for Mac Even Apple says no computer connected to the Internet will ever be 100 immune from attack N http www apple com getamac viruses html sagecohen Viagra com Inc From Subject Date TO sagecohen Late students cohen health October 5 2007 9 05 34 AM AKDT Viagra com Inc Not on a Mac VIRUS A computer virus attaches itself to a program or file so it can spread from one computer to another leaving infections as it travels WORMS Worms spread from computer to computer but unlike a virus it has the capability to travel without any help from a person A worm takes advantage of file or information transport features on your syst
6. arange Wy Sent Newest on tp periodically to A make sure other obes Tasks TM 4lll Hide Folders emails aren t in 7G roeson my con wt inbox there by mistake Ba om Drag them out with Ste ro Microsoft News Servie ll Aicrosoft Entou gt QJ Mail Views your mouse Another security problem can happen with Grades Grades Do you know when it Is kaos Assignment legal for you to post A 8 E3 m grades on the internet or send them via email Under the Student Menu for EGP G grade permission internet permission M media permission Grades Siete G grade permission You are liable if you email grades or give a password to students who do not have a G here Grades You can send home a permission slip for parents to sign so you CAN email grades or give a password for online grades Anchorage School District Electronic Communication of Academic Progress Permission Form Dear Parent or Guardian Individual teachers offer the posting of student grades and progress reports on selected web sites and through email This has proven to be very informative for parents and helps the parent or guardian to stay current on your student s progress There are some risks because data transmitted through email is not encrypted and is therefore not protected Also the web sites being used to post grades are currently outside of the District a
7. d ee Ca LL ae mnm mom ee ee ee ee ee LV UNE oom a Deskto E Eiben Mac a SPYING If you log into the server on the a network or have a mobile ea own Gi Movies account you need to take some E Music E Photo 23 jpg precautions to make your files safe Always make sure your documents are inside your Document or Desktop folders fia mowes Do you see the unprotected 6 Music because it is not in a folder Photo 23 jpg document em Fem e eiben A H giliures f Public E C Sites Jf Documents SPYING Anyone including students can locate your server file by logging on and choosing the Home and WDStaff folders Eiben Mac Network AppTech S201 AppTech Server E215 Bingham E3xx l L7 Mshome My Network L Njrotc grandma Applications SPYING Anyone including students can locate your server file by logging on and choosing the Home and WDStaff folders Network s a AppTech S201 B Desktop t AppTech Server E215 grandma L L My Network Bingham E3xx On A Milliam 2 choose XS iiec home eiben caro Groups Home SPYING Anyone including students can locate your server file by logging on and choosing the Home and WDStaff folders Z Eiben Mac e New 2 m eo File Server T E Msd AppTech S201 BE Desktop I L Mshome AppTech Server E215 gra
8. dler Middle S Ww AA Addres Dani anr JUNK MAIL You can fix address problems like this Q New M Qj Add Group FA Address Book 1 Choose Address Book 2 Highlight the address A CenterTix Alas A Randy Hutchins A Ken Johnson A Makoni Lisa A Rod Maestas A Renae Mathson A Florence Moore A Patrick Moore Robert Moore A Wendler Middle S Notes Tasks Center A Wendler Middle S WW FX Addararr Rank Viena JUNK MAIL You can fix address problems like this Q New M Qd Add Group FA Address Book Ah 1 Choose Address Book 2 Highlight A CenterTix Alas A Randy Hutchins the address Notes Tasks Projet Ken Johnson 3 Press D Rod Maestas delete key 2 Porere Hor or drag it D Wonder ade to the trash A Wendler Middle S Ww AA Addeeee Dani Vieuic JUNK MAIL Prevention is preferable 1 NEVER open eee m ins ES Ges GD u n k m al l Smaller Bigger Delete Junk Bounce v M Inbox aud Susan McMillan Carol Eiben DEES 5 J e Ada Knutson eborah asdk_1 e cl VIAGRA Officia lt eiben_carol Openi ng sends gt Drafts VIAGRA Officia lt eiben_carol VIAGRA Officia lt eiben_carol a message to t h e gt y7 Sent VIAGRA Officia lt eiben_carol G3 Educational Testi EIBEN CAROL sender that you are t
9. em which allows it to travel unaided through the network 1 TROJAN HORSE A Trojan Horse at first glance will appear to be useful software but will actually do damage once installed or run on your computer Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source One way your computer gets infected is through Internet related activities Don t open e mail attachments from people you don t know or from someone you know unless you are expecting it and you are sure it is safe Use anti virus software and install a firewall on your home computer Your Mac has a firewall that you can turn on in your System Preferences under Sharing qug F ns Preferences Edit View Window Help e ec Sharing 4 Showall Computer Name Grandma s Computer Other computers on your local subnet can access your computer at Grandmas Computer local Ec Services Internet Firewall On Stop Click Stop to allow incoming network communication to all services stop Jj ports Allow On Description Ne gt a Use passwords that are hard to guess by using a combination of letters and numbers tN LL Don t share your passwords with anyone Don t respond to spam or phish email Your response can lead to more trouble Phishing is when someone pretends
10. ength They are not case sensitive Remember Even Apple says no computer connected to the Internet will ever be 10096 immune from attack http www apple com getamac viruses html But N P Like driving a car use some caution and you can protect yourself and your computer Resources ASD Cyber Security Power Point Presentation http www asdk12 org MiddleLink Internet CyberSecurity required as Adapted and Revised for Wendler Middle School Staff Revisions Carol Eiben Editors Lisa Sinnot Patrick Moore
11. ess 1 Customize options About the Inbox Security and Privacy Outlook Web Access Customize options gt http webmail asdk12 org e tents amp View Messages amp Page 1 http webmail asdk12 org e ge Eiben Carol 7Cmd options SPYING Do students walk up to your desk and look over your shoulder at your computer screen Do you walk away from your computer and leave it on so that others could look at confidential information Would you like to make your computer more secure without having to log off or turn it off SPYING 1 Use a Screen Saver System Preferences eo Desktop amp Screen Saver Use random screen saver Start screen saver 1 I 1 I I I 3 5 15 30 lhr 2hr Never SPYING 1 Use a Screen Saver System Preferences 2 Make it require a password to turn it off Security in System Preferences aan Security lt gt Qj FileVault FileVault secures your home folder by encrypting its contents It automatically o encrypts and decrypts your files while you re using them R WARNING Your files will be encrypted using your login password If you forget your login password and you don t know the master password your data will be lost A master password is not set for this computer uius P p Set Master Password This is a safety net password It lets you unlock any FileVault account on this computer FileVault protection is off for this accoun
12. he internet for any reason The EGP user manual help menu page 104 says that you can filter out students for uploading to the internet just by deleting their password 104 CHAPTER 15 Internet Reports Using Website Raports Easy Grade Pro s WebNite Reports are for individual teachers and for schools that want a free and secure rts for viewing on the internet Easy Grade Pro creates the reports and the security n be transferred to your school s web server or to web space provided by an ISP ans way to post student r pages The reports can using ftp or some other To gain access to a report te viewer must enter the student s name and password Security comes through the use of encrypted studenQ report names and Javascript built into web browsers For best security we recommend that reports are Rot viewed using computers shared by others in a public environment be cause the browser history stor amp i by web browsers may allow access to reports previously viewed This risk can be substantially reduced if browser history is turned off To set up Website Reports with password security 1 Choose Student from the Chart menu and enter passwords in the Password column Not only are pass words used to gain access to reports on the internet they are used as filters when creating reports students without passwords are skipped Passwords may consist of letters and numbers and must be between six and twenty four characters in l
13. here and they will send MORE JUNK MAIL Prevention is preferable 2 When another T new a meo i b P e m al l S O pe N 3 Mail ae Calendar Arrange By Sent Newest on top select the junk 5 Y Tha year J Jy The Microsoft Mac Tea 9 21 07 mail hold the zs i Apple key down 4lll Hide Folders Y amp Folders on My Comp inbox e Sent Items JUNK MAIL Prevention is preferable eee ug New pf Reply if Ge w 2 When another 24 z E3 Inbox email is open 3 Mail Address Calendar Arrange By Sent Newest on top select the junk s BBA EE J za B ij The Microsoft Mac Tea 9 21 07 mail hold the Tasks Project Apple key down T5 3 Drag it with your mouse to the junk mail folder Welcome to Microsoft Entou G Microsoft News Serole tdiMicrosoft Entou gt QJ Mail Views JUNK MAIL Prevention is preferable Your junk mail Bd ca folder Wi Lu Mail Calendar Arrange By Sent automaticall E IE y jy The Microsoft Mac Tea 9 21 07 recognize this Notes Tasks Project welcome to Microsoft Entou 4lll Hide Folders sender and block future emails from them e Sent Items Gj Deleted Items rn Microsoft News Serve tdiMicrosoft Entou gt QD Mail Views JUNK MAIL Remember to look inside your new gt Frey if oe M junk mail folder Mal Adamas Calendar
14. nd are therefore not monitored by the District We believe that the benefits to families from access to the progress reports and grades exceed any disadvantages The District requires the following guidelines be met for posting student information Grades Permission Slip http www asdk12 org schools wendler pages forms htm as G B http www EH AKUSA Enstar ABTv MYPD Movies Fish j IN Wendler Forms of 17 5d schools wendler pages forms htm SQ Google d i Techw UASw ASD v 2905 Lake Otis Pkwy Anchorage Alaska 99508 Phone 742 7300 Fax 742 7307 Attendance 566 8383 Map Btration ASD Calendar Forms Teams Counselor Fielgf Trip Grades Counselor Student request to see a coung lor Field Trip Permission form for a pre afffanged field trip Grades Permission form that al ws students and parents to view grades on the internet Internet Permisson form for students to go on the internet Media Permission form for students to have their name or photo used in the media PTSA Form to join the PTSA Webmaster 2005 2007 Wendler Middle School Internet Media PTSA Rules Update Weekly Update Daily Rules Wendler s Our House Rules Updates Daily and Weekly Students may give these to their teacher at the beginning of the period and pick them up again atthe end of the period aA sl Grades One parent did not want her child s name on t
15. ndma a L My Network Bingham E3xx 0048 a7 2 choose V dhome aoa pP T L9 barnes_tasha ro Network 2 baumgartner jor M billings maria 2 bingham dorena T hand ailaan 3 choose eiben_ca Groups Home SPYING Laptop teams turn their work into the WDStaff folders so they look at your server folder eVery day 2 anastacio jeff 3 appletest2 T barnes_tasha T baumgartner jor T billings maria T bingham_dorena a hand ailaan Archived Homes gt 3 WD2011 gt gt wD2012 gt Ld E Eiben Mac A Network m Ih 3 WD2013 SPYING Look what Betsy forgot in her folder on the server _ eisses elizabeth F 3 Applications ls Desktop Archived Homes WD2011 P d davis tyrone derrick georganN 13 Eiben Mac Network WD2012 eiben Bl wn2013 eiben caro p F Le Home 3 s q eisses_elizabeth gt T k farrell_william F dg a Dewanp feltey william ds zi Mm 1 fredrickson john E UL hs SOD Sa Applications garcia dorota i ic 3 Documents Sites fly Movies amp Music M Pictures 4 hagood ava hatch barbara gt hauser frank E yx 9 items 4 33 GB available graves joseph SPYING Always save your documents in a locked folder when saving a copy on the server eo0 Eiben Mac
16. omputer local Services Firewall Internet Firewall On Stop b Click Stop to allow incoming network communication to all ser Sie EO ES SPYING Being on a network at school presents another type of spying that can happen Students and staff may have the ability to look in your files or possibly even at your computer screen when you are writing a confidential email Know where your files are 1 on the hard drive of your computer 2 on the server on the network or 3 both at the same time mobile account 5ystem AL SPYING You can look in System Preferences under Accounts to see if you have a mobile account A e80 Accounts Show All Accounts VN Picture rh Laticia Roderick lt Mobil Mame Lati Other Accounts mm WD Local Short Name rod Admin a Teacher p men 5ystem AL SPYING You can also know you have a mobile account if you get synchronizing windows Accounts Synchronizing Database 2 Item 14 of 38 3 complete Microsoft User Data Office 2004 Identities Main SPYING If you are logged into your hard drive or have a mobile account you can see the hard drive left and trace it through the Users folder to your files on the right Always keep your documents in your Documents or Desktop folders i Developer T plications p BE Desktop T mathew Documents EA TM a E Library 4 patrick E Librar
17. t Turn On FileVault Turning on FileVault may take a while vi Require password to wake this computer from sleep or screen saver SPYING 1 Use a Screen Saver System Preferences 2 Make it require a password to turn it off Security in System references 3 3 Use Hot Corners to activate it immediately in the Screen Saver window SPYING 1 Use a Screen Saver System Preferences 2 Make it require a password to turn it off Security in system Preferences S 3 Use Hot Corners to activate it immediately in the Screen Saver window 4 Touch a corner with a mouse to activate it Another security problem can happen with Junk Emails JUNK MAIL Remember this sagecohen Viagra com Inc From sagecohen Subject Late students cohen health Date October 5 2007 9 05 34 AM AKDT To Viagra com Inc JUNK MAIL You can fix address problems like this OOO M 1 Choose 1873 aem Gf New Qd Add Group Z Address Book o ealan 5 Apple Computer L A CenterTix Q Alas amp Randy Hutchins Notes Tasks Project A Ken Johnson Center B Makoni Lisa 4ll Hide Views A Rod Maestas fe Address Book On My Computer A Renae Mathson K Contacts Moore Exchange Florence Moore v Moore Exchange LA Patrick Moore 7 All Contacts amp Robert Moore All Groups A Wendler Middle S All Users Public Folders Wen
18. to access this computer using the Apple Remote Desktop program v Show status in menu bar Access Privileges M id Click the lock to prevent further changes SPYING eo Sharing lt gt show ail a You can turn Apple Remote Desktop on or off in System Computer Name Grandma s Computer mE ME E E ang Preferences under Sharing Services Firewall Internet Select a service to change its settings You can also see when ARD is active by putting the binoculars on your menu bar They are black when active and grey when inactive Remote Desktop Control Off Click Start to allow others to access this computer using the Apple Remote Desktop program Service v Personal File Sharing Windows Sharing Personal Web Sharing y Remote Login V FTP Access v Show status in menu bar Access Privileges n il Click the lock to prevent further changes m 7 4 Gh Tue 1 57PM grandma Q SPYING Other options to log onto your computer are available through System Preferences and Sharing too Click on each option to read what it allows you and others to do They can be password protected using your log in password so if you use these features pick a secure password that is not easily guessed 9 00 Sharing s e showar Computer Name Grandma s Computer Other computers on your local subnet can access your computer at Grandmas Comp
19. uter local Select a service to change its settings Remote Desktop Control Off Personal File Sharing Windows Sharing C1 Personal Web Sharin Click Start to allow others to access this sonal Web Sharing computer using the Apple Remote Desktop M Remote Login program On Service M FTP Access Remote Apple Events Printer Sharing Xgrid v Show status in menu bar Access Privileges af Click the lock to prevent further changes SPYING On the front page of oa the ASD website is PN N ASD inc easy access to Webmail What is your email password Need say more SPYING http webmail asdk12 org chgpassword Change your email password here Change Password SPYING http webmail asdk12 org chgpassword ser name This will also change rasnon your District Connection password New Password Change Password SPYING http webmail asdk12 org chgpassword ser name This will NOT change rsss your Fetch password Change Password SPYING If you use Webmail always Quit your browser Safari or clear your Cache when you are done or someone can come in behind you and easily access your emails under History without even entering a password as 3 R fr 36H Mark Page for SnapBack XEK Page SnapBack XP Search Results SnapBack XS Wendler Computer Classes Microsoft Outlook Web Acc
20. y ES e System Shared m Movies e piben P User GU formation a Music Sa amp Users it Pictures Public Hoc Desktop Sites e grandma jx Applications Documents SPYING Anyone including students can locate your computer hard drive by looking in the network If you have an easy password to guess they can log onto your computer with full access if you leave Personal File Sharing activated in System Preferences a EibenMac 10 70 17 etBootSPO A Wendler File Server AppTech 201 AppTech Server E215 Bingham E3xx 3 keck 3 Lif kills 3 Mif6me IF My Network E E E E BE Desktop Njrotc r ec Williams E310 amp grandma E None i Peat A Applications L4 Physplant d ir Fairweather rm110 a T i i 0 items Zero KB available SPYING Be very careful about your password and what Sharing features you turn on If you have a good password others can only access your Public Files with Personal File Sharing my students use it to turn in their work it can be useful Make sure your Firewall is on eoco Sharing gt ShowAll Q 51 Computer Name Grandma s Computer ur local subnet can access Other computers o randmas Computer local Edit your computer Internet Firewall Select a sery to change its settings Personal File Sharing On Personal File Sharing Stop Windows Sharing e
Download Pdf Manuals
Related Search
Related Contents
(v4) (CLP) American Standard Williamsburg Deck Mount Tub Filler 2800.224 User's Manual USER MANUAL Moxa EtherDevice™ Switch EDS-508, (-40 to 75˚C) manual de operaciones del usuario de la coordinacion general de Jailson Évora ESI - Biblioteca digital da UniPiaget Anleitung Guide d`utilisation et d`entretien Lave Copyright © All rights reserved.
Failed to retrieve file