This 3-hour in-person workshop expands upon the lessons from the legacy training modules. Here you'll find materials to help run one of these training sessions.
![](https://nycdigitalsafety.org/wp-content/uploads/2022/03/Resources_3_Workshop-Materials.jpg)
Downloads
Handouts, surveys, and signs you'll pass out to participants.
- Agenda handout
- Internet Infrastructiure Terms handout
- Script for Workshop Leader
- Map the Internet signs
- Personae handout
- Risk Assessment
- Best Practices Cheat Sheet
- Resource List handout
- Workshop Evaluation Survey
Agenda
An agenda summary for participants in the NYC Digital Safety workshops.
Welcome and Introductions (10 Minutes)
- Get to know each other
- Facilitators and participants introduce themselves
- Group prompt: “what’s the first digital activity you do every day?”
Workshop Overview (10 Minutes)
- Know what to expect
- Review agenda
- Review community agreements
- Review space logistics
Online training refresher (15 Minutes)
- Recall online training, reflect on learnings and address questions
- Briefly run through the topics introduced in each module
- Share reflections, takeaways and observations from online training
How the Internet works (45 Minutes)
- Gain an in-depth understanding of terms, definitions, infrastructure and information flow
- Play “Web Mechanics Speed Dating” game to review terms and definitions
- Review internet information flow and discuss privacy vulnerabilities
- Reflect with a spectrogram activity
Break (10 Minutes)
Personae Introduction (15 Minutes)
- Understand how everyone’s unique context shapes their digital privacy
- Introduce personas and scenarios
- Discuss how each person may engage differently in the information flow
Risk Assessment and Best Practice (60 Minutes)
- Analyze threats to a person’s digital security and privacy, the motivations behind those threats, and how to mitigate them
- Introduce digital security risk assessment/threat analysis template
- Group activity: conduct a risk assessment for each persona/scenario
- Share out and discuss assessment results
- Compile a data privacy best practices cheat sheet
Wrap up (15 Minutes)
- Conclude with a meaningful reflection
- Complete workshop survey
- Share takeaways and questions
- Gather feedback
Key Terms
The terms below were presented in Module 2 of the NYC Digital Safety online training.
- Browser
Software on the computer that displays web pages and web applications
- Domain Name Server (DNS)
A service that maps numeric versions of web addresses to human-readable URLs. Can be thought of as the internet’s “phone book”
- Fiber optic cables
A high-speed data transmission medium that carries light beams. Digital data is transmitted through the cable via rapid pulses of light
- Hyper Text Transfer Protocol (HTTP)
The prescribed method that clients and servers use to share information on the internet
- Internet
A physical infrastructure comprising computers, modems, routers, and cables
- Internet protocol address (IP address)
A unique number assigned to each device connected to a computer network or the internet, enabling it to exchange data with other devices on the network
- Internet service provider (ISP)
A communications company that provides subscribers with an internet connection
- Local Area Network (LAN)
A locally connected computer system involving two or more computers
- Modem
A device that converts data into a format that can travel along an Internet Service Provider’s cables
- Packet
A container used to transmit data across a TCP/IP network. Comprised of both data and metadata, a typical example contains around 1,500 bytes
- Router
A device that connects and “directs” internet traffic between computer networks
- Server
a computer that stores and provides access to content and services on a network
- Shared Protocols
An agreed upon, standard method of communication that all devices use on the internet. HTTP is ony of many of these.
- Third party
A company or an actor that is neither the user or the content provider (e.g. an advertiser)
- Virtual Private Network (VPN)
A system that enables users to send and receive data across shared or public networks as if their computing devices were directly connected to a private network
- Wi-Fi
A protocol that enables network connectivity via radio waves so that devices can connect to computer networks
- World Wide Web
A system of linked content like digital pages, images, audio, and video
- Browser