TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
September 2014 cyber safety presentation
1. Department of School Safety and Student Discipline
Forsyth County Schools
Todd Shirley, Director
Tim Monroe, Assistant Director
Steve Honn, School Safety Manager
Ola Shadburn, General Administrative
School Safety and Student Discipline
Dr. Jeff Bearden
Superintendent of Schools
Joey Pirkle
Associate Superintendent
Educational Leadership
Session #5
3. Facebook-87% students use--*Facebook Messenger-72%
Twitter
Instagram-77% usage--online photo-sharing, video-sharing and social networking
service that enables its users to take pictures and videos, apply digital filters to them,
and share them on a variety of social networking services, such as Facebook, Twitter,
Tumblr and Flickr
Vine-Owned by Twitter, enables its users to create and post short video clips
Snapchat-65% useAllows users to take photos or short videos, then share them with friends
for up to 10 seconds before the image self-destructs. If a recipient screenshots the photo, the
app alerts the original sender, though hacks to interrupt this function do exist.
Askfm-social networking website where users can ask other users questions, with the
option of anonymity used in foreign countries mostly
KIK-allows users to send texts via the Internet without having to use a cellular
telephone
Yik Yak-social media site that gives you an anonymous live feed of what people are
saying and doing. Users create all the content.
Youtube-No. 1 site for watching videos
(Schoolsafetyandsecurityalert.com August 2014)
3
4. Bullies can use your information
Predators can use the information
Comments – sued for defamation
Info – arrested or school discipline
No reasonable expectation of privacy
Future employers and schools can use
information as “instant background checks”
Clark Howard Video
4
6. Eliminate all identifying information
◦ Anything that allows you to be located
◦ Anything that pairs the profile to your name
Delete inappropriate information
Read your information to determine what
impression it gives
◦ Your site may appeal to someone you didn’t intend
for it to impress
6
7. Choose appropriate photos
Setting privacy settings appropriately
For privacy:
◦ Develop your profile to be associated with a
nickname rather than your official name
7
10. Protect your friends’ info – no name, location,
birthday wish, phone numbers, etc.
Don’t write anything you wouldn’t want your
parents or principal to read (because they can
and MIGHT!)
Set your profile to private so you control who
views your profile.
Be careful when you post pics
10
11. What sport you play, the movies you like,
your music…that would be okay
◦ Remember that these facts can be used to fool you
Be smarter than them
Always tell a trusted adult if you have
problems online
11
12. High-tech version of flirting, teens texting
explicit messages or photos to each other
◦ Experimental
◦ Aggravated
12
http://www.unh.edu/ccrc/pdf/CV231_Sexting Typology Bulletin_4-6-
11_revised.pdf
13. 13
Obscene
Average person would
find it wrong
It depicts sexual
conduct
It has no literary,
artistic, political or
scientific value
Child Pornography
Images of sexual
conduct
◦ Under 18 years
413 US 15, OCGA § 16-12-80
OCGA § 16-12-100
14. If someone sends you something
◦ Inappropriate – delete
◦ Obscene and/or makes you uncomfortable – alert your
parent or authority
If you sent something
◦ Ask recipient to delete it and not to forward it
◦ Never send inappropriate text or images
In 2010, 20 percent of teenagers (22 % of girls and 18 %
of boys) sent naked/seminude images of themselves or
posted them online.
Nearly 1 in 6 teens between the ages of 12 and 17 have
received naked or nearly nude pictures via text message
from someone they know. (FBI Law Enforcement
Bulletin)
14
15. Cyber bullying: One form of bullying
Youth use technology to:
◦ Send Text Messages
◦ Make Web Postings
◦ Stalk Others
◦ Post Unauthorized Photos
◦ Online Deception and Violence
◦ Cyber-ostracism
15 http://www.smlinks.com/sotw/why/
16. One mistreating others – usually someone
that the target knows
Target – can be anyone
Bystander
◦ Harmful-if complacent
◦ Helpful-if report to adult
16
17. Making threats of violence to people or
property
Engaging in coercion
Making obscene or harassing text messages
Harassment or stalking
Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe
and Responsible Use of the Internet, January 2007
17
18. Hate or bias crime
Creating or sending sexually explicit images
of teens or children
Sexual exploitation
Taking a photo of someone in a place where
privacy is expected (Locker room/Restroom)
Nancy Willard, Cyberbullying and Cyberthreats, Effectively Managing Internet Use Risks in Schools, Center for Safe
and Responsible Use of the Internet, January 2007
18
19. 10% to 20% of youth have been targets
and/or aggressors
Cyberbullying peaks in the middle school
years (grades 6-8)
Girls are more likely to be the target
Looks and body shape are the most
targeted characteristics
While there is an increase in cyberbullying,
it is likely because there is an increase in
use of technology
19
http://cyberbullying.us/blog
www.unh.edu/ccrc
21. 21
Since January 23, 2004, criminals have been using the FDIC's name and reputation to
perpetrate various "phishing" schemes. It is important to note that the FDIC will never ask for
personal or confidential information in this manner.
22. 22
WIFI THIEVES-Set up open wifi in public areas posing as a
legitimate business. Stealing usernames and passwords to log
into accounts. (WSBTV 2014)
If you suspect that you have been a victim of identity theft,
perhaps because you submitted personal information in
response to a suspicious, unsolicited e-mail or you see
unauthorized charges on your credit card, immediately contact
your financial institution and, if necessary, close existing
accounts and open new ones. Also contact the police and
request a copy of any police report or case number for later
reference.
WEBCam-Hacking into cameras (have to set passwords to
prevent hacking)
23. • March 05, 2014
Pre-installed malware turns up on new
Android devices
Fake version of Netflix that steals personal
data and sends it to Russia has been found
on some smartphones and tablets from
Samsung, Motorola, and LG
23
24. Child Identity Theft
Credit Reports
◦ www.annualcreditreport.com
◦ Federal Law allows you to get a free copy of your
credit report every 12 months from each credit
reporting company.
Credit Reporting Agencies
◦ Equifax 800-525-6285
◦ Experian 888-397-3742
◦ TransUnion 800-680-7289
24
25. 1. Make sure your child does not spend all of his/her time on the computer. People,
not computers, should be their best friends and companions.
2. Keep the computer in an area where it can be monitored, like the family room,
kitchen or living room, not in your child’s bedroom.
3. Learn enough about computers so you can enjoy them together with your kids.
4. Teach them never to meet an online friend offline unless you are with them.
5. Watch your children when they’re online and see where they go.
6. Make sure that your children feel comfortable coming to you with questions and
don’t over react if things go wrong.
7. Keep kids out of chatrooms unless they are monitored.
8. Encourage discussions between you and your child about what they enjoy online.
25
Next page
26. 9. Teach them what information they can share with others online and what
they can’t (like telephone numbers, address, their full name and school)
10. Get to know their “online friends” just as you get to know all of their other
friends.
11. Warn them that people may not be what they seem to be and that people
they chat with are not their friends, they are just people they chat with.
12. Discuss these rules, get your children to agree to adhere to them, and
post them near the computer as a reminder.
www.cyber-safety.com
26
27. Four steps you can start taking now to make ID security a priority — and a practice:
1. Change weak passwords. Do not use your birth date or part of your address or phone number. Strongest
passwords combine upper- and lowercase letters, numbers and special characters.
2. Make sure your home Wi-Fi network is password-protected. Be careful how you use your devices at public hot
spots. Most aren't secure — which means any information you send is only protected if you're on an encrypted
website. To be sure a website is encrypted, look for "https" in the address before you log in or send any personal info.
3. Don't click on links in unsolicited emails. Don't give out information over the phone or online unless you've
verified the source.
4. Keep your eye on debit and credit cards when paying for purchases. If anything seems out of the ordinary, be
cautious using your card.
www.ftc.gov/idtheft
27
28. ConnectSafely Smart Socializing Starts Here
◦ http://www.connectsafely.org/safety-tips-advice/
National Center for Missing & Exploited Children
◦ http://www.netsmartz.org/InternetSafety
FBI-Internet Crime Complaints
◦ www.FBI.GOV
Internet Monitoring Software (Free)
◦ http://www.qustodio.com/internet_monitoring_software/
◦ http://www.nchsoftware.com/childmonitoring/index.html
◦ http://www.monitor.us/en/website-monitoring
◦ https://onlinefamily.norton.com/familysafety/basicpremium.fs
Internet Monitoring Software-All have mixed reviews
◦ 1. Net Nanny $28.99
◦ 2. WebWatcher $97.00
◦ 3. McAfee Safe Eyes $49.95
◦ 4. Spectorsoft-eblaster $99.95
28