Skip to main content

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1080))

  • 323 Accesses

Abstract

Cybersecurity is a fast-evolving topic. There are many approaches and technologies designed to protect students. The jargon quickly becomes overpowering in exploring what it is and what to do about it. This chapter provides basic information that is accessible to students. We will explore cybersecurity from the perspective of the National Institute of Standards and Technology (NIST) framework. This model uses the topic areas of identify, protect, detect, respond and recover to create an environment of everyday cyber safety. The chapter then goes on to describe how cybercriminals influence behavior. This knowledge will help students identify cybercriminal behavior and become more cyber safe. The chapter provides tips on actions students can take to secure their environment. After completing this chapter, students will have the requisite cybersecurity vocabulary to recognize personal cyber safety requirements and turn that knowledge into action.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. S. Cook, U.S. Schools Leaked 24.5 Million Records in 1,327 Data Breaches Since 2005 (Comparitech, 2020). https://www.comparitech.com/blog/vpn-privacy/us-schools-data-breaches/

  2. Cybersecurity and Infrastructure Security Agency (CISA), Multi-Factor Authentication (U.S. Department of Homeland Security, 2021). https://www.cisa.gov/sites/default/files/publications/CISA%20MultiFactor%20Auth%20HDO_040721_508.pdf

  3. National Initiative for Cybersecurity Careers and Studies (NICCS), Cybersecurity Glossary (United States Cybersecurity and Infrastructure Security Agency (CISA), n.d.). https://niccs.cisa.gov/about-niccs/cybersecurity-glossary. Accessed 14 June 2021

  4. L. Vailshery, Internet of Things (IoT) and Non-IoT Active Device Connections Worldwide from 2010 to 2025 (Statista, 2021). https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/

  5. Wakefield Research, Cyber Hygiene Risk Index: Analysis of Results Assessment of Americans’ Cybersecurity Practices (2019). https://www-cdn.webroot.com/6115/5682/3818/Wakefield_Research_Analysis_of_Results_for_Webroot_Risk_Poll_Survey_002.pdf

  6. A. Schiffer, How a fish tank helped hack a casino. The Washington Post (2017). https://www.washingtonpost.com/news/innovations/wp/2017/07/21/how-a-fish-tank-helped-hack-a-casino/

  7. Cybersecurity and Infrastructure Security Agency (CISA), Security Tip (ST04–014): Avoiding Social Engineering and Phishing Attacks (U.S. Department of Homeland Security, 2020). https://us-cert.cisa.gov/ncas/tips/ST04-014

  8. Cybersecurity and Infrastructure Security Agency (CISA), Alert (TA16–105A): Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced (U.S. Department of Homeland Security, 2016). https://us-cert.cisa.gov/ncas/alerts/TA16-105A

  9. N.C. Collier, Barcode Scanner App on Google Play Infects 10 Million Users with One Update (Malwarebytes Lab, 2021). https://blog.malwarebytes.com/android/2021/02/barcode-scanner-app-on-google-play-infects-10-million-users-with-one-update/

  10. R. Santocho, Why does my antivirus detect viruses from a perfectly normal game? Quora (n.d.). https://www.quora.com/How-can-I-check-if-a-game-or-game-setup-has-a-virus-or-not-before-installing. Accessed 22 June 2021

  11. S. Sawchuk, Students are really, really bad at spotting fake news, misleading websites. Education Week (2019). https://www.edweek.org/education/students-are-really-really-bad-at-spotting-fake-news-misleading-websites/2019/11

  12. Reboot, Fighting Fake News: Lessons from the Information Wars (Reboot Foundation, 2019). https://reboot-foundation.org/fighting-fake-news/

  13. Cybersecurity and Infrastructure Security Agency (CISA), Securing Network Infrastructure Devices (U.S. Department of Homeland Security, 2020). https://us-cert.cisa.gov/ncas/tips/ST18-001

  14. Federal Bureau of Investigations (FBI), FBI, This Week: Teens Targeted on Online Gaming Platforms (U.S. Department of Justice, 2019). https://www.fbi.gov/audio-repository/ftw-podcast-sextortion-online-gaming-091919.mp3/view

  15. Federal Bureau of Investigations (FBI), Alert I-121219-PSA: Child Predators Use Online Gaming to Contact Children (U.S. Department of Justice, 2019). https://www.ic3.gov/Media/Y2019/PSA191212

  16. Federal Bureau of Investigations (FBI), Scams and Safety (U.S. Department of Justice, n.d.). https://www.fbi.gov/scams-and-safety/on-the-internet

  17. Homeland Security Keywords, Cyber Incident (U.S. Department of Homeland Security, n.d.). https://www.dhs.gov/taxonomy/term/3472/all/feed

  18. International Telecommunication Union's (ITU's) Telecommunication Standardization Sector (ITU-T), ITU-T Y.4000/Y.2060: Overview of the Internet of things (ITU, 2012). https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=y.2060

  19. National Cyber Security Alliance (NCSA), Stay Safe Online (n.d.). https://staysafeonline.org/stay-safe-online/. Accessed 23 June 2021

  20. National Institute of Standards and Technology (NIST), Cybersecurity Framework (U.S. Department of Commerce, n.d.). https://www.nist.gov/cyberframework. Accessed 14 June 2021

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lori L. Sussman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sussman, L.L. (2023). Everyday Cyber Safety for Students. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham. https://doi.org/10.1007/978-3-031-21199-7_1

Download citation

Publish with us

Policies and ethics