Task2


 * Research, Write, Communicate | Persuasive Writing**
 * Internet Security **

__ Key Concept __ Do you know enough about the Internet to protect yourself when you go online? Do you know that you also need to protect the computers and networks that you use to go online? The Internet is a global network of networks that connects millions of computers.

The Internet gives you instant access to an enormous amount of information and allows you to communicate with people almost anywhere in the world. The Internet also creates new opportunities for dishonest people to practice deception and fraud.

You should always remember that the Internet brings some real dangers as well as great benefits. Viruses and worms can damage the computers you use. Spyware and phishing can secretly collect personal information for deceptive or even criminal purposes.

When you are using the Internet, you should always be aware of the dangers. Do you know how to protect the computers and networks you use when you go online? You will when you learn some basic Internet security guidelines.

**Vocabulary** - Click here to view the words to remember**

__**Exploration**__
Learning from the Web

The Internet is one of the most powerful technology resources available. Some people use that power for good purposes, but some use it for deception or fraud. Explore some Web sites about Internet security, and learn how to protect yourself and the computers and networks you use when you go online.

While you explore the following Web sites, think about the guiding questions. You may want to take notes to help you answer the questions. If you think of any other questions about Internet security, keep those in mind too.

Guiding Questions
 * What are some of the potential risks you face when you use the Internet?
 * How can you protect yourself when you go online?
 * How can you protect the computers and networks you use when you go online?

Web Sites
 * Protect Yourself* from Learn the Net.com - 'Stay Safe'*
 * Passwords*
 * Don't Get Caught in the Phish Trap*
 * Computer Viruses*
 * I Spy*
 * Secure Transactions*
 * Security Tips*
 * Security Center* from Yahoo!
 * Cyber Security Tips* from the United States Computer Emergency Readiness Team*
 * How Encryption Works* from How Stuff Works*

__**Information**__
What to Know

This page summarizes some of the information from the Web sites you explored. This information helps you learn what you need to know for this activity about Internet security. You may want to take notes to help you remember the most important points. You can return to the Web sites for more exploration if you want to learn more.

//** Guidelines for Internet Security **// The Internet is a global network of networks. It connects millions of computers on smaller networks around the world. The Internet gives you instant access to an enormous amount of information and allows you to communicate with people almost anywhere in the world.

You should always remember that the Internet brings some real dangers as well as great benefits. Whether you are sending e-mail, instant messaging, or surfing the Web, you should always be aware of these dangers. Keep the computers and networks you use secure by following some basic Internet security guidelines.

//**Make sure important information is encrypted**// Never give out personal information unless you are certain that it will be secure. If you need to provide personal information for some legitimate reason, make sure the information is encrypted, or coded so that it can only be understood by an authorized recipient.

Do not give out the following information online unless you are sure it is secure:
 * Names, addresses, and telephone numbers
 * Official identification, such as social security numbers
 * Credit card numbers or bank account information

//** Avoid viruses, worms, spyware, and phishing **// The Internet is crawling with software programs designed to damage your computer or secretly collect personal information. You can avoid most of these programs by following some commonsense guidelines:
 * Use e-mail appropriately. Do not open e-mail attachments unless you trust the sender.

Remember that people who spread viruses through e-mail think of clever ways to trick you into opening attachments. Never respond to any e-mail that asks for personal information. E-mail is not secure and no trustworthy person, organization, or company would ask you to e-mail personal information.
 * Know your web browser. When you surf the Web, look for https: //in Web addresses to make sure sites are secure before providing any important information. Familiarize yourself with your web browser’s security settings. Disregard pop-up messages that claim to help identify or repair security problems on your computer.//
 * // Keep your software updated. Do not install any software unless you are certain it comes from a trustworthy source. Keep the software you have installed updated with the latest fixes for security problems. Perhaps most importantly, you should install trustworthy anti-virus and anti-spyware software programs and keep them updated. //
 * // Back up important information. Even if you are always careful, your computer may be attacked by an unknown virus or worm. Even if kept perfectly secure, hardware devices, such as hard drives, often fail eventually. Protect important information by regularly making copies of your files on more than one computer or portable storage devices, like compact discs (CDs) or Universal Serial Bus (USB) drives. //

Passwords protect information by making sure that only authorized people can access the information. Passwords help prevent others from accessing your information, such as school records. You may also have a password to log on to a computer or to access some Web sites.
 * Use strong passwords and keep them secret**

Keep the following tips in mind when creating passwords:
 * //Strong passwords are the most secure//. A strong password is at least six to eight characters long and includes at least one lowercase (small) letter, one uppercase (capital) letter, one number, and usually one symbol. One strategy for creating a strong password is to change certain letters in a word into numbers and symbols. For example, the word password could be changed to paS$w0rd. Of course, you should never use any form of “password” or any common word as a real password.
 * //A password is only effective if you keep it a secret//. Create a password you care member so that you do not have to write it down. Never share your password with anyone except a parent, teacher, or other trusted person.
 * //Sign out every time you sign in//. Whenever you use a password to log on to a computer, network, or Web site, always remember to log off when you are done. If you do not log off, the next person who uses the computer may be able to access all your information.
 * //Change passwords regularly//. Most experts recommend that you change passwords at least every three months. Always change your password if anyone who should not know your password finds out what it is.

**__ Task __**
Complete the following task to show what you have learned about Internet security. While you work through the task, think about whether you are achieving the goal. You may want to review an example of persuasive paragraphs before you begin.
 * __ What to Do __**

**__Goal__**: Show that you can use the persuasive style of writing effectively.
 * __Task__**: Persuade other students to keep your school’s computers and networks secure.

See the example: Persuasive Paragraphs - Task 2 Example
 * 1) Start a new word processing document. Always remember to type your name and the date at the top of the document.
 * 2) Think of a title that describes your topic. Type a title for the document.
 * 3) Write at least three paragraphs in the persuasive style to convince other students of the importance of keeping your school’s computers and networks secure.
 * The first paragraph should clearly state the author’s position on the issue.
 * Each paragraph should be organized around a main point.
 * All information in a paragraph should be directly related to its main point.
 * Paragraphs should be arranged in a logical order that is easy to follow and understand.
 * The last paragraph should summarize the evidence and explain how the author’s position is a logical conclusion.
 * The last paragraph should not introduce any new information.
 * 1) Remember to save your document frequently while you work.
 * 2) Check the spelling and grammar in your paragraphs.
 * 3) Double-check your work by reading the document carefully one more time.
 * 4) Review the checklist and revise your persuasion to make sure it is complete.
 * 5) Share your persuasion.