Resources

Resources

ADMIT – A framework for developing a safe computing environment. Assess. Educate. Protect. A handout available as a PDF document:

POS CFN – What is your child typing?  Acronyms are abbreviations that are created from the first letter of each word of a phrase.  Online chat and Instant Messaging use acronyms extensively to reduce typing.  However, they are frequently used as a “code” language for communication when a parent is nearby.  POS CFN is the abbreviation for “Parent Over Shoulder, Ciao For Now”.  A list of common acronyms is available here as a PDF document: List of Common Acronyms

What is the difference between a “first party cookie” and a “downgraded cookie”?  What is a cookie?  The Internet Glossary at GetNetWise.org offers a comprehensive review of many common technology terms.  Offsite link is here: http://www.getnetwise.org/glossary

Is your child bullied on the playground, in the parking lot?  Is your child bullied online?
How do you manage cyber-bullying?  A variety of mechanisms exist to block, detect and report cyber-bullying.  The following documents, written by the Center for Safe and Responsible Internet Use, offered at www.cyberbully.org, offer tremendous insight into online threats and threat management. A Parents’ Guide to Cyberbullying and Cyberthreats, CyberbullyNOT: Stop Online Social Cruelty

Protecting Children in Cyberspace is an article written by Greg Price (Director of the Alabama Computer Forensics Institute) that was published in a 2011 edition of Healthy Horizons Magazine. It provides an overview of why individuals should be concerned about how youth use the Internet.

Alabama Legislation

Alabama Student Harassment Prevention Act (PDF)

Alabama Student Harassment Prevention Act State Department of Education Model Policy (PDF)


Cyberbullying & Safety

Bullying Statistics (bullyingstatistics.org)

 

Password Management

So if each password is supposed to be unique how on earth does one remember all of them?

You don’t!

A great tool for managing the numerous accounts that we all have is a secure password database. Free and commercial options are available and many offer the ability to use the same file to keep your passwords on your desktop system, mobile device or access them via the cloud. Just make sure to use a complex, long password or passphrase to secure the database as well!

We highly recommend KeePass, which is free and available on many different platforms (including Apple OS X/macOS) though there are several good alternatives including LastPass, DashLane and Sticky Password.

WIRED offers an informative article (You Need a Password Manager. Here Are Some Good Free Ones) that explains why a password manager is important and the pros and cons of some of these tools.


US Cyber Challenge – Competitions and Camps

From the USCC Website:

The U.S. Cyber Challenge develops and conducts competitions and on-site camps that enable eligible participants-including high school, college and post-graduate students-to develop their skills, gain access to advanced training and achieve recognition with scholarships, internships and jobs. USCC’s goal is to find talented Americans to fill the ranks of cyber security professionals where their skills can be of the greatest value to the nation.