Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Cyber Patriot

  • Hi my name is Sarah Mata i am 17, and currently enrolled in the STEM academy at Robert E. Lee High School as a Junior.
  • My internship consisted of being a part of the school’s CyberPatriot team, which revolves around learning the basic skills in Introduction to Information Security.

Information Security

Vocabulary terms-

  • Information Technology is used to describe computers and automated data processing.
  • Information Security is the Protection of information and information systems from unauthorized personals.
  • Black Hackers are individuals who intend to do harm to a specific person such as to wipe out their information or use their ID in wrong doing and do serious damage.

Thank You for watching!

Project Process-

At the start of the internship Mr.Salazar had each person sign agreeing to the following terms when using any information that was given to us throughout the Cyber Patriot program.

Ten Commandments of Computer Ethics-

1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people's computer work.

3. Thou shalt not snoop around in other people's computer files.

4. Thou shalt not use a computer to steal.

5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not copy or use proprietary software for which you have not paid.

7. Thou shalt not use other people's computer resources without authorization

or proper compensation.

8. Thou shalt not appropriate other people's intellectual output.

9. Thou shalt think about the social consequences of the program you are

writing or the system you are designing.

10.Thou shalt always use a computer in ways that insure consideration and

respect for your fellow humans.

What is Information Technology?

Computers and Automated data processing.

Project Results-

As a group we placed poorly in the cyber patriot competition, for the lack of resources.

i learned the importance of having a strong security password in order to avoid any unauthorized personnel into my files and documents,which may also grant them access to my private emails where everything may be linked together. i learned how to secure my passwords and documents from black hakers.

Project process Cont.

Mentors-

Everyday of the internship we met in Rm.213 to discuss topics that Mr.Salazar or Mr.Cunningham had gone through on Tuesdays and Thursdays. They often gave us lectsures where we took our own notes in a notebook to review after before a practice run.

On Saturdays there were practice runs where our team could use the skills that we were taught and put them into action on the computers at Hallmark college.

The judges use a program that is installed on the computers to score us on how well we had done. There were certain procedures you had to do in order to get the points.

Mr.Cunningham and Mr.Salazar are both majored in IT security, and teach as professors at Hallmark college.

A Brief Description

We did have to make changes because we hadn't received a proper room where we could use computers in order to download software and begin testing the auto commands that our mentors had taught us. This would have to be the hardest part of the project, for the lack of resources to our availability.

The Benefits of Information Security-

What's the importance of information security?

It can protect all of your private background, and only allows those administrated under a list access. Only the owner can authorize and share the information with others.

Information Security provides everyone with confidentiality, integrity, and availability to the world. For example your Facebook Profile or any other communication source requires some background information on yourself such as your age, grade, school grade, sex, and any employment. Without the help of security your information would be exposed for all to see and then there would be no purpose of confidentiality or privacy.

Evaluation-

  • I do not want to work in the information technology field because it is not something that i am interested in.
  • This does not affect my high school career because we have already inputted our next year schedules.
  • I strongly recommend this course to mainly those interested in the field, but also because it could be very helpful to avoid being hacked.
  • If I could do this again i would do an actual internship at a local hospital to learn what is to be a nurse. I am interested in this field and although i have volunteered at a hospital before, would be helpful to have an escort of how everything functions within a hospital.
Learn more about creating dynamic, engaging presentations with Prezi