This is the presentation of the invited speech by me on " How to make screens and the internet safe for Children ".
The webinar was organized by the Sri Lanka Medical Association on 7th Sep 2021
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
Hands-On Training: Hacks for Cyber-Safety on the Web for Women and Children
Workshop by Catalyst Woman Consultancy
At Cybersecure Pakistan Conference 2015
#CSP15
NUST-SEECS, Islamabad, Pakistan
Saturday, April 11th, 2015
Link: http://cybersecurepakistan.com/sessions/workshop-women-centric-cyber-security/
ICT Seminar: Parenting In the Digital Age: Inspiring Parents to Protect
Digital Parenting workshops is an hour of informational seminars where parents learn the latest in online safety (30-45 minute presentation) followed by interactive discussion on issues relevant to each parent. Team from Ramsys Infotech Solutions will moderate each workshop with the goal that, parents will walk out of the seminar feeling more confident, less anxious and ready to communicate with their children about some of the icky things online.
its free!!!
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
Hands-On Training: Hacks for Cyber-Safety on the Web for Women and Children
Workshop by Catalyst Woman Consultancy
At Cybersecure Pakistan Conference 2015
#CSP15
NUST-SEECS, Islamabad, Pakistan
Saturday, April 11th, 2015
Link: http://cybersecurepakistan.com/sessions/workshop-women-centric-cyber-security/
ICT Seminar: Parenting In the Digital Age: Inspiring Parents to Protect
Digital Parenting workshops is an hour of informational seminars where parents learn the latest in online safety (30-45 minute presentation) followed by interactive discussion on issues relevant to each parent. Team from Ramsys Infotech Solutions will moderate each workshop with the goal that, parents will walk out of the seminar feeling more confident, less anxious and ready to communicate with their children about some of the icky things online.
its free!!!
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
This presentation was created for students and parents of children from 5th to 8th grade regarding staying safe online on the Internet in general and on social networking sites in particular.
Internet Safety tips for Parents of Christian Childrennickswebtsv
The internet has evolved into a enormous beast that has revolutionized the computer and communications world like nothing before. But with this revolution comes safety concerns for children whose parents wish to keep a watchful eye on their child's browsing habits.
This presentation covers family safety tools that empower parents to easily manage their child's exposure to explicit websites. Such as gambling, social media and online dating websites which can be used for the wrong reasons by pedophiles and the like.
The solutions available to parents range from device based security to software or host ran applications like NetNanny.
Smart Card - October 2014
Since 2012, minors’ involvement with social networking services (SNS) has risen to 96%. It is reported that 69% of minors have received online communications from strangers. Harmful interactions that children encounter online include cyber-bullying,
coercion, pornography, drugs/alcohol, and violence. During the first two months of 2013, the OSBI Internet Crimes Against Children (ICAC) Unit completed 47 investigations, served 53 search warrants, and made 16 arrests. Criminal activity
included Child Pornography, Enticement, and Obscenity Directed to Minors.
Below is a link to suggestions on how to protect your children while they are on the internet.
The presentation prepares the caregivers to select the digital tools which could help the person being cared in improving his/her quality of life, well-being and living safety. They will be able to develop his/her personal digital strategy, including digital tools for his/her work, keep contact and communicate with the older adult, and also the practical digital tools and applications she/he can offer and teach the older adult to help them keeping mental and physical health.
Key information for parents to help their children enjoy using the internet while keeping safe. This is a newsletter I compiled for a local primary school.
Series of articles written by me for Vidusara Science Magazine, Sri Lanka [2009 - 2010]; sharing for all those who like to learn the basics of C Programming in Sinhala.
Series of articles written by me for Vidusara Science Magazine, Sri Lanka [2008 – 2010]; sharing for all those who like to learn the basics of Computer Networks in Sinhala.
Series of articles written by me for Vidusara Science Magazine, Sri Lanka [2012]; sharing for all those who like to learn the basics of Data Structures and Algorithms in Sinhala.
Series of articles written by me for Vidusara Science Magazine, Sri Lanka [2011 – 2012]; sharing for all those who like to learn the basics of OOP in Sinhala.
These were prepared to teach the module "Emerging Technologies" for the 3rd year Undergraduates of the Asia Pacific Institue of Information Technology, Colombo-2, Sri Lanka (Remotely)
These slides were prepared to teach the module "Emerging Technologies" for the 3rd year Undergraduates of the Asia Pacific Institue of Information Technology, Colombo-2, Sri Lanka (Remotely)
These were prepared to teach the module "Emerging Technologies" for the 3rd year Undergraduates of the Asia Pacific Institue of Information Technology, Colombo-2, Sri Lanka (Remotely)
These slides were used for the module "Introduction to EJB" which was taught as a part of the course "Software Engineering" for the 3rd year computer enigneering undergraduates of the University of Peradeniya in 2010.
These slides were used to teach the module "Introduction to Enterprise Applications and Tools" for the 3rd year undergraduates of the Department of Computer Engineering, University of Peradeniya in 2010.
These slides were used to teach the module "Introduction to Agile Software Development & Python" as a sub-section of the major course "Software Engineering" for the 3rd year undergraduates of the Department of Computer Engineering, University of Peradeniya in 2010.
These slides were used to teach the above subject for the 3rd year undergrads of the Departement of Computer Engineering, University of Peradeniya in 2009, under IFS-PERADENIYA industry -university collaboration.
Things to ponder before you start building [cooperate] softwareTharindu Weerasinghe
This particular PPT was prepared for the session I carried out on 28th Jan 2022,for the 3rd year computer engineering udergrads of the Faculty of Engineering, University of Peradeniya, 20400, Peradeniya, SRI LANKA.
A Survey Study on Higher Education Trends among Sri Lankan IT ProfessionalsTharindu Weerasinghe
This is a presentation I did at IEEE TALE Conference 2019, held in Yogyakarta, Indonesia. This is about Higher Education Trends amoung Sri Lanka IT Professionals
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
How to make screens and the internet safe for Children
1. How to make
screens & internet
safe for children
Tharindu Weerasinghe
www.tharinduweerasinghe.com
2. Outline
• Prior to Tech
• Access Control on devices (Parent Control/Separate User Accounts)
• Access Control on browsers (Web filtering/Content Restrictions)
• Access Control via OpenDNS
• YouTube Kids
• Netflix Kids
• Screen Times
• Summary
• Useful Links
3. Prior to Tech
• Suggest you talk to your kids and explain the consequences of
harmful content which can be accessed via the mobile devices or
computers.
• Explain them about online safety and the value of being “safe” online!
• Try to convince them it is good to set their limits in screen time rather
than parents setting hard rules. [ this is very tough honestly ☺ ]
• Set goals to earn screen time.
4. Access Control on Your Devices
Creating a child account in your device will make your life easier because
whenever your child asks for your device then you can guide them to log-in to
their own account which has limited [child safe] access.
• MS Windows 10 Devices
• Create a Microsoft user account for your kid in your Windows PC.
• Prerequisite:
• 1. Your kid should have an email (from Gmail or other email provider, make sure it is a child account)
• 2. You must have a Microsoft account and signed
Go to https://account.microsoft.com/family/
• Then, it is really self explanatory to create a new account for your kid using an email created for
your kid (Note: it is associated to your parent Microsoft account)
8. Creating a new Microsoft account for your kids (contd.)
• Type “Other Users” in your search bar
• You’ll get the window shown in the left snap
• Add a family member
Once you’ve completed all these steps,
You’ll have separate user account in your own
PC with all content restrictions for your kid!
Once you have setup the account the you can add that account
as a new user in your Windows 10 PC.
9. Creating a new Apple account for your kids
https://support.apple.com/en-au/HT201084
10. Access control in Android Devices
• Practical Example from my own phone (Software Version: Android) 11):
11. Access control in Apple Devices
Refer: Use parental controls on your child's iPhone, iPad and
iPod touch – Apple Support (AU)
15. Access control using DNS Services
https://en.wikipedia.org/wiki/OpenDNS
https://en.wikipedia.org/wiki/CleanBrowsing
16. Access control using DNS Services(contd.)
• You can use DNS (Domain Name System) service to block porn sites
• Clean Browsing or OpenDNS unique IP addresses can be configured in your
devices as well as home WiFi routers to block adult only sites(porn sites)
• You must read this self explanatory article(s):
https://protectyoungeyes.com/how-to-block-porn-on-any-device-for-free/
https://bestparentalcontrolapps.com/how-to-block-porn-sites/
21. Summary
• It is essential that you create separate kids user accounts for your kids to access digital devices..
• e.g. Windows 10 Kids account. (A must; if they have individual Windows Device)
• e.g. Kinds accounts in Apple Devices (A must; if they have individual Apple Device)
• e.g. Kids Gmail account for accessing Google contents (A must; if they have individual Android Device)
• Set Screen times. (if you have the above control then screen times can be easily configured).
• Provide, facilitate at-least 20 inches from the screen and at the same please educate them about the benefits of maintaining eye
healt.
• When kids are using digital screens make sure they are always logged into their (kid’s) account. Then you don’t need to worry
about the content.
• If they use your devices on a daily basis, disable potential harmful apps and handover a child safe device to them with controls.
• For kids above 14 years of age I personally suggest that you be in contact with them as friends and explain them the consequences
of accessing adult content or harmful content. Try your best to avoid the curiosity of searching for adult content (this might be
tricky).
• With kids belonging to “Generation Z” [born between 1997 to 2012], it is almost impossible to avoid digital screens since their
early childhood. As parents be educated on digital safety and digital presence your children!
22. Useful links
• How to set up a kid-friendly Windows 10 device with a child account | Windows Central
• Create an Apple ID for your child - Apple Support
• Chrome & your child's Google Account - Google For Families Help
• Create a Google Account for your child - Google For Families Help
• Google Family Link – Home
• YouTube Kids
• Microsoft Family Safety
• https://www.windowscentral.com/how-set-kid-friendly-windows-10-pc-child-account
• Learn more about Kids Mode in Microsoft Edge
• How to block websites on Google Chrome using a simple extension (businessinsider.com.au)
• How to set parental controls on a Google Chrome browser (businessinsider.com.au)
• How to Set Parental Controls On All Your Devices - Panda Security
• http://kb.mozillazine.org/Parental_controls#Router_filtering
• https://www.tp-link.com/us/support/faq/188/
• https://geekflare.com/dns-content-filtering-software/
• https://protectyoungeyes.com/how-to-block-porn-on-any-device-for-free/
• https://bestparentalcontrolapps.com/how-to-block-porn-sites/
• 4 Ways to Set Up Parental Controls On Your Home Network (howtogeek.com)
• Google requires all Androids to have a 'digital wellbeing' app - 9to5Google
23. Thank you!
If you do have any questions please reach out via
Tharindu.Weerasinghe@gmail.com