We've published a new video, the 102nd in our video library. It is part of our Net Safety category.
Ransomware - Explained
What it Teaches:
Like a kidnapped person, the information on your computer can now be held hostage by criminals, who demand a ransom to release it. This is called a ransomware attack and, unfortunately, it’s a growing problem. This video explains ransomware. It teaches:
Encryption is a fundamental part of using the Internet securely, but it is mostly invisible to the user. This video explains the basic idea of encryption and specifically the two types of keys that are used online: symmetric and public. It teaches:
Why encryption matters on the Web
An example of encryption used in history
The basics of private key encryption
The basics of public key encryption
How public key encryption works when using a bank website
How to Use This Video
This video is designed to serve as an introduction -- it creates a solid foundation for deeper learning. Use it to kick-off a class or session on the Internet, technology, e-commerce, communications, etc.
Based on suggestions and votes from Common Craft members, we just published a new video called Virtual Private Networks (VPNs) - Explained by Common Craft.
What it Teaches: This video explains the business use of Virtual Private Networks. It tells the story of Candice who discovers her new employer’s VPN, which means she can securely connect to the company network over the Internet.
•Why normal Internet connections are not secure for business information
•Why VPNs make sense for businesses
•How VPNs connect employees and remote offices to headquarters
•How encryption works to make information secure on the Internet
This video is part of a series on Internet basics and is meant for use in technology education. Corporate trainers, teachers and librarians will find it useful for quickly introducing VPNs.
The video below was made with the Trustworthy Computing Team at Microsoft. As we learned, there is a debate brewing in the world of software security. It's a debate about how to report problems that are discovered in software - what the industry calls "vulnerabilities". I'll let the video speak for itself on covering the issues.
For this post though, I want to talk about the use and power of visual metaphors, which was a big challenge for this project. Here's a question for you: how do you visualize software? We've used box like you see in a computer store, DVDs, binary code, etc. These still aren't the best, but it's an ongoing challenge. Now, if software is hard to visualize, what about software vulnerabilities? That's a whole-other can of worms.
This project, like many that we do, prompted us to come up with a symbol that is used throughout the video. This is risky because if the symbol doesn't work for the client, it means taking two steps backward and completely rethinking the visuals. For the idea of software vulnerability, we chose to use a chain metaphor. Software is a system that works together and a vulnerability is essentially a crack in one of the chain links - it compromises the power of the whole system. By making this point clear early in the video, we were able to establish a visual symbol of vulnerability that we could use for a lot of scenes.
Thankfully, Ken and the Trustworthy Computing Team liked the chain idea and the video. See what you think:
If you have a laptop, you've probably worried about it getting lost or stolen. These devices have become the home of so much of our lives that thinking about one in the hands of a stranger is painful. Thankfully, products like LoJack for Laptops help you prevent potential problems and get your computer back. The video explains how:
A quote about how they've used the video:
“We had a very successful CES. The video was on all our ipads and was a hit with clients, partners and our CEO, so much so we’ll be featuring it at our global sales meeting next week!” Kate Kyle Brow, Director – Global Consumer Marketing.
Thanks to Joey and Kate at Absolute Software for a great project together!
I don't know about you, but in the past I've taken passwords for granted. These days though, I'm very careful with my passwords because I know the risks and what lengths criminals will go to discover someone's password. This video is about understanding the risks, creating a password that can't be guessed and protecting it from criminals and wandering eyes.
This video will soon be part of our Net Safety Pack, which is meant for helping students of all types understand the risks and make decisions that will protect them and their information online.