Abstract
Cybersecurity is a fast-evolving topic. There are many approaches and technologies designed to protect students. The jargon quickly becomes overpowering in exploring what it is and what to do about it. This chapter provides basic information that is accessible to students. We will explore cybersecurity from the perspective of the National Institute of Standards and Technology (NIST) framework. This model uses the topic areas of identify, protect, detect, respond and recover to create an environment of everyday cyber safety. The chapter then goes on to describe how cybercriminals influence behavior. This knowledge will help students identify cybercriminal behavior and become more cyber safe. The chapter provides tips on actions students can take to secure their environment. After completing this chapter, students will have the requisite cybersecurity vocabulary to recognize personal cyber safety requirements and turn that knowledge into action.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
S. Cook, U.S. Schools Leaked 24.5 Million Records in 1,327 Data Breaches Since 2005 (Comparitech, 2020). https://www.comparitech.com/blog/vpn-privacy/us-schools-data-breaches/
Cybersecurity and Infrastructure Security Agency (CISA), Multi-Factor Authentication (U.S. Department of Homeland Security, 2021). https://www.cisa.gov/sites/default/files/publications/CISA%20MultiFactor%20Auth%20HDO_040721_508.pdf
National Initiative for Cybersecurity Careers and Studies (NICCS), Cybersecurity Glossary (United States Cybersecurity and Infrastructure Security Agency (CISA), n.d.). https://niccs.cisa.gov/about-niccs/cybersecurity-glossary. Accessed 14 June 2021
L. Vailshery, Internet of Things (IoT) and Non-IoT Active Device Connections Worldwide from 2010 to 2025 (Statista, 2021). https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/
Wakefield Research, Cyber Hygiene Risk Index: Analysis of Results Assessment of Americans’ Cybersecurity Practices (2019). https://www-cdn.webroot.com/6115/5682/3818/Wakefield_Research_Analysis_of_Results_for_Webroot_Risk_Poll_Survey_002.pdf
A. Schiffer, How a fish tank helped hack a casino. The Washington Post (2017). https://www.washingtonpost.com/news/innovations/wp/2017/07/21/how-a-fish-tank-helped-hack-a-casino/
Cybersecurity and Infrastructure Security Agency (CISA), Security Tip (ST04–014): Avoiding Social Engineering and Phishing Attacks (U.S. Department of Homeland Security, 2020). https://us-cert.cisa.gov/ncas/tips/ST04-014
Cybersecurity and Infrastructure Security Agency (CISA), Alert (TA16–105A): Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced (U.S. Department of Homeland Security, 2016). https://us-cert.cisa.gov/ncas/alerts/TA16-105A
N.C. Collier, Barcode Scanner App on Google Play Infects 10 Million Users with One Update (Malwarebytes Lab, 2021). https://blog.malwarebytes.com/android/2021/02/barcode-scanner-app-on-google-play-infects-10-million-users-with-one-update/
R. Santocho, Why does my antivirus detect viruses from a perfectly normal game? Quora (n.d.). https://www.quora.com/How-can-I-check-if-a-game-or-game-setup-has-a-virus-or-not-before-installing. Accessed 22 June 2021
S. Sawchuk, Students are really, really bad at spotting fake news, misleading websites. Education Week (2019). https://www.edweek.org/education/students-are-really-really-bad-at-spotting-fake-news-misleading-websites/2019/11
Reboot, Fighting Fake News: Lessons from the Information Wars (Reboot Foundation, 2019). https://reboot-foundation.org/fighting-fake-news/
Cybersecurity and Infrastructure Security Agency (CISA), Securing Network Infrastructure Devices (U.S. Department of Homeland Security, 2020). https://us-cert.cisa.gov/ncas/tips/ST18-001
Federal Bureau of Investigations (FBI), FBI, This Week: Teens Targeted on Online Gaming Platforms (U.S. Department of Justice, 2019). https://www.fbi.gov/audio-repository/ftw-podcast-sextortion-online-gaming-091919.mp3/view
Federal Bureau of Investigations (FBI), Alert I-121219-PSA: Child Predators Use Online Gaming to Contact Children (U.S. Department of Justice, 2019). https://www.ic3.gov/Media/Y2019/PSA191212
Federal Bureau of Investigations (FBI), Scams and Safety (U.S. Department of Justice, n.d.). https://www.fbi.gov/scams-and-safety/on-the-internet
Homeland Security Keywords, Cyber Incident (U.S. Department of Homeland Security, n.d.). https://www.dhs.gov/taxonomy/term/3472/all/feed
International Telecommunication Union's (ITU's) Telecommunication Standardization Sector (ITU-T), ITU-T Y.4000/Y.2060: Overview of the Internet of things (ITU, 2012). https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=y.2060
National Cyber Security Alliance (NCSA), Stay Safe Online (n.d.). https://staysafeonline.org/stay-safe-online/. Accessed 23 June 2021
National Institute of Standards and Technology (NIST), Cybersecurity Framework (U.S. Department of Commerce, n.d.). https://www.nist.gov/cyberframework. Accessed 14 June 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Sussman, L.L. (2023). Everyday Cyber Safety for Students. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham. https://doi.org/10.1007/978-3-031-21199-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-21199-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21198-0
Online ISBN: 978-3-031-21199-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)