Internet safety or online safety is the security of
people and their information when using the
Internet. Internet safety means protecting your
personal information while online. Details such as
your address, full name, telephone number, birth
date and/or social security number can potentially
be used by on-line criminals.
• Internet Predators
• Coffee-Shop-Data-Collectors
• “Script-Kiddies”
(what you might think of as “hackers”)
• Viruses /Trojans / Ad-Ware
• Those who take advantage of children &
teens
– Use “Social Engineering” to manipulate victim
– Sexual Intentions
– Murderous Intentions
– Other Malicious Intent
• Phishing Attempts
(Masquerading as a trustworthy entity while attempting to
acquire sensitive information)
• Scam Artists
– Email scams are meant to take your money
– Scams on Craigslist that are using you to commit
fraudulent activities
• Most public wireless connections are NOT secure
• It’s easy to capture your data
• Don’t log into websites that reveal your sensitive
credentials (email, bank account, etc.)
• Use onboard firewall software
• Lock your screen before leaving your seat
• Don’t store sensitive information on your computer
• Use an encryptedVPN (Virtual Private Network)
Typical unsecured wireless connection.
This is what you think that you are logging into…
Protect your traffic by encrypting it.
• It is clear, then, that the definition of “youth
online safety” has broadened and become more
complex in the past 10 years, as have the role of
the online user and the inter-connected devices
today’s user takes advantage of when
consuming, socializing, producing, and
connecting. In addition to cyberbullying,
inappropriate content, and predation, other risks
have emerged, including the risks related to
geolocation technology in online applications
and on mobile phones.
• Physical Safety – freedom from physical harm
• Psychological Safety – freedom from cruelty,
harassment, and exposure to potentially
disturbing material
• Reputational and Legal Safety – freedom from
unwanted social, academic, professional, and
legal consequences that could affect users for a
lifetime
• Identity, Property, and Community Safety –
freedom from theft of identity & property
• 75% of children and teens report sharing
personal information about them and their
families to complete strangers in chat rooms1
• 93% of teens (ages 12-to-17) use the Internet2
• 73% of teens use social network sites2
• 75% of teens own cell phones2
• 4% of teens have sent sexually suggestive
images or videos of themselves via cell phone,
and 15% have received such images from
someone they know2
• 43% of teens have been victims of cyberbullying3
 Avenues for online child
communication: blogs,
chat rooms, irc, IM,
Facebook, Facebook chat,
MySpace, Orkut, email,
Skype,Twitter, Identica,
Craigslist, forums, text
messages, etc….
 Educate your child about the dangers that
exist on the Internet
 Studies show that:
 Fear-based scare-tactics are not effective
 Use the "norms" approach - suggest that [insert
behavior here] is not a “norm” among youth's
peers and that people who engage in such activity
are abnormal and may need help
 Educate you child about safe Internet practices
 Use strong passwords (including numbers, special
characters, and combination of upper/lower case)
 Never give password to anyone
 Don't communicate online with people you don't know
 Enable & elevate privacy settings in Facebook
 Disable FacebookChat
 Do not allow Skype calls from anyone who is not on your
contact list
 Teach kids about responsible communication
 Do not share specific information about yourself, such as family info,
where you live, photos of yourself or your home, etc.
 Use an alias forWeb communications, not your real name / also use
avatar that is different from your actual photo
 Don't say anything online to someone that you would not be willing to
say directly to their face in person
 Don't open email attachments unless you know for certain what it is
 Be aware that actions have consequences - ex: nude photos, bad
language, inappropriate conduct, etc. - could have legal impacts,
embarrassment, or affect future job opportunities
 Inform you (the parent or another authority figure) if the child has
experienced anything online that makes him/her feel creepy or
uncomfortable
• Use Internet Content Filters
– Software that filters out unwanted websites, such as
pornography
– IP Addresses can be filtered using your router or yourWeb
browser
• Place computer in living room or other "common"
area within your home
• Regulate length of time child spends on Internet as
well as determine a window of time for usage
• Request list of email and social networking sites being
used and username/password for each account
• Perform random checks on your teenager's cell phone
to view text messages sent/received
 Strong Passwords:
 Phrases, mixed case, special characters, and long:
- 5db10mw! (Slow Down Buddy I’m On MyWay!)
- w@yD0wny0nd3r#% (Way DownYonder #%)
 Password Card:
 http://www.passwordcard.org/en
 Free Software for Content Filtering
 OpenDNS - FamilyShield: http://www.opendns.com/familyshield
 Parental Filter: http://www.softpedia.com/get/Security/Lockdown/Parental-Filter.shtml
 K9Web Protection: http://www1.k9webprotection.com
 ProCon Latte: http://procon.mozdev.org (read interesting related article)
 Content Filtering for Firefox
 KidZui - a safe browser and online playground for kids 3-12
 FoxFilterAdd-on for Firefox
 Interesting article on using manual proxy configurations
 FilteringContent with IE'sContentAdvisor
 Cyber Bullying occurs when people send or post
mean or threatening text or pictures on the
Internet. Examples:
 A kid could post stories about another kid online.
They could show the website to all of their friends.
When the victim goes back to school, he/she gets
teased about something they don’t know about.
 If a friend had your password, and you got into a
fight, they could send mean emails to everyone in
your address book. When your friends or family
open the email, they would think that it came from
you!They could feel very hurt and upset.
 Complaining that other children or a group of
children do not like them.
 Preoccupation with friendship concerns.
 Poor self-esteem. Feeling they are not as good
as others.
 Not wanting to go to school or other activities.
 Spending a great deal of time on the computer.
 Being secretive about online activities.
• Preserve evidence – this is crucial for identifying the
bully and making a case.
• Attempt to enlist assistance from the service
provider.
• If able to identify the bully, contact him or her
and/or parents.
• Use available blocking technology (i.e., block the
user on IM, email and chat.)
• In serious cases, seek assistance from the police
(i.e., threats of physical harm, unrelenting or unable
to stop.)
• Internet Explorer uses Active-X
controls for easy software
installation – not safe
• UseWeb Browser Alternatives:
Firefox, Opera, Safari
• UseVirus Software: Symantec,
McAffee, ClamWin, etc
• RegularWindows Updates (weekly)
• Don’t open email attachments
unless you know for certain what
they are
2.InternetSafety.ppt

2.InternetSafety.ppt

  • 2.
    Internet safety oronline safety is the security of people and their information when using the Internet. Internet safety means protecting your personal information while online. Details such as your address, full name, telephone number, birth date and/or social security number can potentially be used by on-line criminals.
  • 3.
    • Internet Predators •Coffee-Shop-Data-Collectors • “Script-Kiddies” (what you might think of as “hackers”) • Viruses /Trojans / Ad-Ware • Those who take advantage of children & teens – Use “Social Engineering” to manipulate victim – Sexual Intentions – Murderous Intentions – Other Malicious Intent • Phishing Attempts (Masquerading as a trustworthy entity while attempting to acquire sensitive information) • Scam Artists – Email scams are meant to take your money – Scams on Craigslist that are using you to commit fraudulent activities
  • 4.
    • Most publicwireless connections are NOT secure • It’s easy to capture your data • Don’t log into websites that reveal your sensitive credentials (email, bank account, etc.) • Use onboard firewall software • Lock your screen before leaving your seat • Don’t store sensitive information on your computer • Use an encryptedVPN (Virtual Private Network)
  • 5.
    Typical unsecured wirelessconnection. This is what you think that you are logging into…
  • 7.
    Protect your trafficby encrypting it.
  • 8.
    • It isclear, then, that the definition of “youth online safety” has broadened and become more complex in the past 10 years, as have the role of the online user and the inter-connected devices today’s user takes advantage of when consuming, socializing, producing, and connecting. In addition to cyberbullying, inappropriate content, and predation, other risks have emerged, including the risks related to geolocation technology in online applications and on mobile phones.
  • 9.
    • Physical Safety– freedom from physical harm • Psychological Safety – freedom from cruelty, harassment, and exposure to potentially disturbing material • Reputational and Legal Safety – freedom from unwanted social, academic, professional, and legal consequences that could affect users for a lifetime • Identity, Property, and Community Safety – freedom from theft of identity & property
  • 10.
    • 75% ofchildren and teens report sharing personal information about them and their families to complete strangers in chat rooms1 • 93% of teens (ages 12-to-17) use the Internet2 • 73% of teens use social network sites2 • 75% of teens own cell phones2 • 4% of teens have sent sexually suggestive images or videos of themselves via cell phone, and 15% have received such images from someone they know2 • 43% of teens have been victims of cyberbullying3
  • 11.
     Avenues foronline child communication: blogs, chat rooms, irc, IM, Facebook, Facebook chat, MySpace, Orkut, email, Skype,Twitter, Identica, Craigslist, forums, text messages, etc….
  • 12.
     Educate yourchild about the dangers that exist on the Internet  Studies show that:  Fear-based scare-tactics are not effective  Use the "norms" approach - suggest that [insert behavior here] is not a “norm” among youth's peers and that people who engage in such activity are abnormal and may need help
  • 13.
     Educate youchild about safe Internet practices  Use strong passwords (including numbers, special characters, and combination of upper/lower case)  Never give password to anyone  Don't communicate online with people you don't know  Enable & elevate privacy settings in Facebook  Disable FacebookChat  Do not allow Skype calls from anyone who is not on your contact list  Teach kids about responsible communication
  • 14.
     Do notshare specific information about yourself, such as family info, where you live, photos of yourself or your home, etc.  Use an alias forWeb communications, not your real name / also use avatar that is different from your actual photo  Don't say anything online to someone that you would not be willing to say directly to their face in person  Don't open email attachments unless you know for certain what it is  Be aware that actions have consequences - ex: nude photos, bad language, inappropriate conduct, etc. - could have legal impacts, embarrassment, or affect future job opportunities  Inform you (the parent or another authority figure) if the child has experienced anything online that makes him/her feel creepy or uncomfortable
  • 15.
    • Use InternetContent Filters – Software that filters out unwanted websites, such as pornography – IP Addresses can be filtered using your router or yourWeb browser • Place computer in living room or other "common" area within your home • Regulate length of time child spends on Internet as well as determine a window of time for usage • Request list of email and social networking sites being used and username/password for each account • Perform random checks on your teenager's cell phone to view text messages sent/received
  • 16.
     Strong Passwords: Phrases, mixed case, special characters, and long: - 5db10mw! (Slow Down Buddy I’m On MyWay!) - w@yD0wny0nd3r#% (Way DownYonder #%)
  • 17.
     Password Card: http://www.passwordcard.org/en
  • 19.
     Free Softwarefor Content Filtering  OpenDNS - FamilyShield: http://www.opendns.com/familyshield  Parental Filter: http://www.softpedia.com/get/Security/Lockdown/Parental-Filter.shtml  K9Web Protection: http://www1.k9webprotection.com  ProCon Latte: http://procon.mozdev.org (read interesting related article)  Content Filtering for Firefox  KidZui - a safe browser and online playground for kids 3-12  FoxFilterAdd-on for Firefox  Interesting article on using manual proxy configurations  FilteringContent with IE'sContentAdvisor
  • 20.
     Cyber Bullyingoccurs when people send or post mean or threatening text or pictures on the Internet. Examples:  A kid could post stories about another kid online. They could show the website to all of their friends. When the victim goes back to school, he/she gets teased about something they don’t know about.  If a friend had your password, and you got into a fight, they could send mean emails to everyone in your address book. When your friends or family open the email, they would think that it came from you!They could feel very hurt and upset.
  • 21.
     Complaining thatother children or a group of children do not like them.  Preoccupation with friendship concerns.  Poor self-esteem. Feeling they are not as good as others.  Not wanting to go to school or other activities.  Spending a great deal of time on the computer.  Being secretive about online activities.
  • 22.
    • Preserve evidence– this is crucial for identifying the bully and making a case. • Attempt to enlist assistance from the service provider. • If able to identify the bully, contact him or her and/or parents. • Use available blocking technology (i.e., block the user on IM, email and chat.) • In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.)
  • 23.
    • Internet Exploreruses Active-X controls for easy software installation – not safe • UseWeb Browser Alternatives: Firefox, Opera, Safari • UseVirus Software: Symantec, McAffee, ClamWin, etc • RegularWindows Updates (weekly) • Don’t open email attachments unless you know for certain what they are