Cyber Security

Recently, my nephew, age 12, received a letter in the mail. It was addressed to him personally, by name. Inside was a photocopied article about the powers of a new virility medicine, complete with the usual graphic promises for pleasuring the ladies. The article mentioned a specific “doctor” by name, but other than that, there was no contact information or order form or any other action request. It appeared to just be spam but in paper form.

My three kids all know the password to my phone.

It’s because I rely on them to play secretary for me when I’m driving. If the phone rings or there is a bing of a text, 99% of the time it’s a member of my immediate family trying to get in touch with something relatively pressing.

When we bought a cellphone for our son, we worried. We worried about how it would affect his brain to be hooked into social media all the time. We worried about online bullying and if he’d be respectful and responsible. We worried that he’d become a video screen monster who never looked up and only grunted in response to our questions about his day at the dinner table.

This lesson was produced with the support of the Royal Canadian Mounted Police (RCMP).

Objectives:

  • To further online safety education.
  • To promote safe and responsible online behaviour through:
    • Encouraging youth to make safe and ethical decisions online;
    • Helping youth to identify strategies and supports that are available to assist them with issues they may encounter online.

This year, it may not just be Santa Claus who sees your kids when they're sleeping and knows when they're awake: one of the hottest trends this season is so-called "smart toys", which use the Internet to hold artificially intelligent conversations with kids while they play. Last year's Hello Barbie, one of the first to use this technology, was found to have a number of major security flaws -- including automatically connecting the mobile device to which it was tethered to any Wi-Fi network with "Barbie" in its name. Now two more toys, a doll called My Friend Cayla and the i-Que Intelligent Robot, have been found to collect data in ways that are far more worrying. 

On the Loose: A Guide to Online Life for Post-Secondary Students supports young adults who are experiencing both new freedoms and challenges in their post- secondary life.

In this lesson, students read an interactive online comic that teaches them key concepts and skills relating to three cybersecurity topics: malware, passwords and privacy from geotracking devices. Following this, students research their own cybersecurity topics and learn how non-fiction comics are made in order to create their own Secure Comic.

When you sign up for a service on a website or use an application for the first time, do you read the privacy policy and terms of use thoroughly? Or, like most of us, do you click “I Agree” as fast as you can?

Think you know how to read and understand privacy policies and terms of use? Learn how to make sense of legal documents for websites and apps with this interactive game.

TV, music and movies have been a central part of young people’s lives for generations, and the Internet has only intensified that by delivering all of those directly to our homes – legally and illegally.