21 Things - Basics

Q6 Safe & Secure

1. Basics

 

Introduction

This quest is about being wise about the username and passwords you select. There are a lot of tips on selecting "smart" ones. Start with Part 1, learning about the AUP, then Part 2 to see how good your judgement is, and finally Part 3 for tips about passwords and usernames.


Key Vocabulary:

Username: is a name that uniquely identifies someone on a computer system

AUP: Acceptable Use Policy is a document that outlines a set of rules to be followed by users on a network or website

Part 1: AUP

AUP stands for Acceptable Use Policy and is frequently part of a district's student handbook. It may be part of an Internet Use Agreement your district will expect all students or parents/guardians to sign.

It is a contract that explains the rules for using digital technologies - such as cell phones, computers, and the Internet - in the school or educational environment. The AUP can set expectations and consequences for equipment and Internet use behaviors such as cyber-bullying. This is one way educators try to help keep students safe in the digital world at school.

What does your AUP tell you? Read through the AUP for your school district and then be prepared  to summarize at least three key points that should be important for all students to remember.

Part 1: AUP

Steps

a. Locate your district's AUP and discover what it is and the consequences for not following it. 

b. Summarize your district's AUP by identifying at least three key points that are important for all students to remember when accessing the district's computer network and equipment. 

c. Go on to Part 2

Part 2: Judgement call

Part 2: Judgment call

This is a judgment challenge. Check with your teacher and discuss the following with your class and/or group of friends:

a. Your best friend asks for your password to log into your social network site for just a minute so they can check out something they heard about. What would you say?

b. Would you create (or have you already) a username that is or sounds inappropriate or one that tries to get attention from others?

c. Have you seen someone do something that seems stupid to you and you immediately send a text message to others about it?

Part 3: Passwords and Usernames

Steps:

1. Begin this section by watching the animated video above, and then one from NetSmartz.org called Broken Friendship. It is about a teen that gave her best friend's password to some friends and what happened afterwards.

2. Keep your passwords and usernames private and safe! It is very important that you keep your passwords safe and protected as you learned in the video, "Broken Friendships". We know that you will be creating many accounts when you are participating in the 21things4students projects.

3. Check out this Password Rap from NetSmartz.

4. CAUTION: It is a good practice not to use your birthdate, social security number, address, phone number, pet names, or names of friends or family in your password. A good password has 8 or more characters with a combination of UPPER and lower case letters, numbers, and punctuation symbols.

5. Best Passwords: Visit the 5 Steps to a Good Password on the About.com Guide to the Internet for Beginners site. Paul Gil shares tips to deter hacking. Compare those steps with these10 Tips for Teens for a strong password.


For now, think about this:

6. Creating Passwords: Are the passwords you're using now as strong and secure as they could be? Create examples of four simple passwords you feel are good choices and then change them by using upper and lower case letters, numbers and symbols. Have your teacher check your four choices, OR you can check them at this website. You can keep your final choice a secret.

7. Finding a username: With over 2.7 billion people using the Internet, you will find that the user name you want to use to create an account may already be taken. You will need to be creative and create a username that you will remember and be unique to you. You can check to see if your user name is still available on certain sites, such as Facebook, Twitter, YouTube, Photobucket, Hulu, Bebo, and others, by using the website namechk. This site searches a number of popular social networking and Web 2.0 sites.

8. Check with your teacher on how he/she wants you to share and use your chosen username. Does this username have any personal significance? If so, tell why you chose it to make sure it won't give away your real identify.

Completing this Quest

By completing this assignment you are certifying that you:
a. have read the pages of the School District Technology Plan, Student handbook, or Internet Use Policy that outlines the Acceptable Use Code for accessing school equipment, the Internet, and networks; and that you agree to abide by the rules

b. understand the dangers of sharing your password and have created a safe and secure password and username

Suggested Rubric for parts 1-3 (.doc file or Google docs)


Additional Resources 

Check with your Media Center, Librarian, Technology Coordinator, Principal, and/or school web site for the AUP.


Check off this Quest on the 21t4s Roadmap 

Proceed to Quest 7 Email

ISTE and Common Core Standards

ISTE Standards•S

3. Knowledge Constructor
a. Plan and employ effective research strategies to locate information and other resources for their intellectual or creative pursuits
c. Evaluate the accuracy perspective, credibility and relevance of information, media, data or other resources

7. Global Collaborators
c. Contribute constructively to project teams, assuming various roles and responsibilities to work effectively toward a common goal