Transcript Cybersafety
Cybersafety
Information for Parents
1
Welcome
Introduction
Why cybersafety?
2
Devices
Phones:
Computers:
Cameras:
Storage
Camera,
video,
Devices:
desktop,
digital,
Video,
laptop,
USB
webcam
drives,
tablet
Calendar,
PC,
CD,
Personal
DVD,
Games,
floppy
Digital
disks,
Internet
iPods,
Assistant
MP3
Access,
TXT,
player,
(PDA)
MMS, GPS
calculators,
system
PlayStation
Portable (PSP)
3
Multitasking
Integrated Into Life
5
Risks and Misuses
Concern
Concern
Concern
commit
Concern
for content they access
for behaviors they exhibit
for illegal activities they may
for safety
6
Concern for Content
Information
Pornography
Support groups for destructive behaviors
Items
Alcohol
Drugs
Weapons
People
Gangs
Explicit sexual discussions
7
Concern for Behavior
Cheating
Copyright Infringement
Sexting
Overuse
16.7 hrs on Internet vs 13.6 hrs on TV per
week
Gambling
Txt messages, photos, copy/paste
~8 million, over 1/2 of all with pathological
gambling addictions
Bullying
Photos, txt messaging, web postings
8
Ryan Halligan
At A Distance
Photos may be
morphed and put online
9
http://www.smlinks.com/sotw/why/
Children are more worried about
being bullied in cyberspace than any
threat from pedophiles, the psychologist
heading a government inquiry into the effects of the internet on
the young told the Oxford Media Convention, reports Ben Fenton
Tanya Bryon, half way through a six-month study, said of bullying
“It starts in the classroom, and when
they get home, it’s all over
someone’s MySpace Page.”
10
Concern for Illegal Activities
Hacking
Writing of Viruses and Trojans
Piracy – music and movies
Child Pornography
Possession
Production
Exchanging
Often using
Peer-to-Peer
Programs
RCA video
11
Concern for Safety
Financial – ID Theft
Child
Family
Computer
An unprotected PC stands a 50-50
chance of being infected by a worm
within 12 minutes of being connected to
the Internet
Physical
Stalking
Enticement
12
http://services.georgia.gov/gbi/gbisor/SORSearch.jsp
GBI Web search for sex offender
www.familywatchdog.us
Search for in state and/or out state sex offenders – shows schools,
home and work of different types of offenders
Parents
Help prepare children for these
situations
15
Four Suggestions
Be the role model - set good
examples yourself
Set clear rules at home
Use strategies and tools to backup
your efforts
Learn about the issues, trends and
devices
Personal Information
Gaming and blogging
Cell phone, PSP, iPod, thumb drives
16
1. Role Model
Don’t be gullible
Chain emails
Phishing email that looks like it came
from a real bank or credit card company
Set the example in how you use the
Internet
Ethical
Moral
Learn how to report problems
17
“Phishing” Scenario - eBay
18
“Phishing” Scenario - eBay
19
“Phishing” Scenario - eBay
Thief captures
additional
information on
this screen
and then
redirects
victim to
legitimate site
20
“Phishing” Scenario - eBay
Fake eBay site
Real eBay site
21
Mortgage Offer
-----Original Message----From: Lorenzo Forbes [mailto:[email protected]]
Sent: Thursday, April 07, 2005 2:50 PM
{Link:
Subject: Confirmation ID # TJ48
http://gvo.quotelab.com/?na
Hi,
me=popyam}
I sent you an email last week and just wanted to confirm everything.
{Domain traced back to:
Please review the info below and let me know if you have any
owner:
xing qian
questions.
email:
I'm happy to inform you that we are accepting your mrtge application.
[email protected]
If you have bad credit, it is ok. We are ready to give you a $290,000
address:
room 1302 32 100
loan for $380/month payment. Aprvl process will take only 1 minute.
lane zhongtan rd
Just visit the link below and fill out the short form.
city:
Shanghai
Thank You
state:
Shanghai
Confirmation Link # TK36
postal-code: 200061
country:
CN
Best Regards,
phone:
86 216 7820743
CEO: Verna Bouchard
2nd Mrtge Group
No future contacts:
http://xgjhxn.quotelab.com/st.html
22
Nigerian Scam
No other person knows
about this account, I am
contacting you for us to
transfer this funds to your
I am Mr.Paul Petric.
account as the beneficiary,
the accountant
-----Original
Message----I want to first transfer
personal
confidant
to
From: paul
petric [mailto:[email protected]]
$26,000.000.00
(Twenty Six
Dr.
Ravindra
F. April
Shah04, 2005 1:12
Sent:
Monday,
AM
Million USD) from this
who
together with
To:died
[email protected]
money into a safe account
his wifeImportant
Dr.Mrs. massage.
Subject:
abroad, after which we will
Manjula Parikh-Shah in
transfer
a plane
crash …without
RE: TRANSFER
OF [$$ 126,000,000.00
U.S.] the remaining
(100M)…you
be given
having
any beneficiary
One hundred
and Twenty six Million
United Stateswill
dollars
]
30% of the total amount,
60% will be for me, while
Dear Sir/ Madam.
10% will be for expenses
We want to transfer to overseas U.S.$126,000,000.00
from a First
National Bank in South Africa, I want to ask you to quietly look
for a reliable and honest person who will be capable and fit to
provide either an existing bank account or to set up a new Bank
a/c immediately to receive this money, even an empty a/c can
serve to receive this funds quitely.
23
Identity Theft
On average
80 hours
over $1,400
to clear up a simple case of identity
theft that is caught early
24
2. Set Clear Rules
Set rules for virtual world just like you
would the natural world
Time limits, how to treat others, that
you must know their friends, rules
regarding strangers, rules regarding
profanity
Computer should be in common room
and accessing the Internet with other
devices should be done only when
around other people
25
Teach Children
Not to believe everything they see or
hear online
Never send pictures of themselves to
strangers or reveal personal information
online
To alert you if they encounter something
or someone on the Internet that makes
them feel uncomfortable
Never meet a cyberpal in person (f2f)
26
Teach Children
Protect Personal Information
Full name
Phone number
Age or Date of Birth
Location
Address
School
Local
stores, theaters, parks etc
Sports teams
Schedule – dates, games, vacations, etc
Social security number, bank acct, credit card
27
Acceptable Use Policy (AUP)
When, how long, allowed and off
limit content, consequences
Expectation of privacy
Examples
http://www.netfamilynews.org/contract.html
http://www.netsmartz.org/resources/pledge.htm
28
3. Tools and Strategies
Check for information left on
computer
Typed URL’s, History, Favorites,
Temporary internet files, Recent files,
Graphics, Cookies
Helpful free guide (Ten Questions)
www.ikeepsafe.org
29
Filters, Firewalls, Monitoring Software
www.getnetwise.org/tools
Have access to all child’s accounts
and check them at times
Protect your computer
Regular updates
Anti virus and anti spyware programs
Smart practices – protecting passwords,
don’t open unknown attachments…
30
Hector
the Protector
Developed
by NetSafe and
Microsoft
Free download from their site
http://www.netsafe.org.nz
31
32
33
4. Learn About the Issues
Current trends and devices
Things that are in the news
Sexting
Bullying
Predators
Don’t think these things will not happen to
your family.
34
How Can Predators Use Info
Predators use information they find online
Locate someone
Establish a relationship
Screen names shouldn’t tell anything about
you
Poor examples:
Davey1192
Pointguard12tigers
Lucy_waycross
Good examples:
0tt3rsrc00l
Zerogravity
Pepperspray
35
Trends
Gaming
Levels progress in violence, sex, etc.
Chat is available
Players can join clans or guilds
Virtual Worlds
Social Networking
Great networking tool for all ages
Virtual shopping catalog for predator
36
53% of kids will belong to
a virtual world in 4 years
37
Runescape
Massive multiplayer online roleplaying game (MMORPG)
Over ten million active free
players
Players can
engage in combat, complete
quests and interact by trading,
chatting, or playing combative or
cooperative mini-games.
38
World of Warcraft (WoW)
is a massive multiplayer online role-playing game (MMORPG)
39
YouTube
A free video sharing website that allows
users to view, upload and share video clips
40
What is a Social Networking Site?
A site that allows users to
create Web pages that provide
information about themselves
and are available to other users
and allows searches and
communication with other users
> 300 sites
41
Statistics
•
•
More than half of US youths use online
social networking sites
Primary uses
–
–
•
•
91% stay in touch with friends
72% make plans with friends
Communicate mainly through
comments and site email
~ Half visit their site at least once daily
42
Popular Social Networking Sites
MySpace
Facebook
Orkut
Hi5
Bebo
Xanga
Live Windows Spaces
Education is helping…MySpace users are
putting less personal information online.
43
Friends Can Post Comments
1234
46
Personal Information is Valuable
Must be protected like other valuables
It is each person’s responsibility to
protect their own information
We must teach children about
personal information
47
Devices
The popular devices now are cell
phones, iPods, PlayStation Portables
(PSP), and thumb drives
Each of these devices have the
potential to carry information,
including pornography
Cell phone and PSP can access
Internet
48
Did You Know?
What do the following devices have in
common?
Wii
PS3
Xbox 360
iPod (video), iPod Touch
Cell Phones with Internet access
They all can be used by children to
access the internet.
49
The Nintendo DS System
It is like a mini computer.
It has built in wireless capability.
PictoChat feature – allows communication with
others up to 65 feet. – 4 channels
Multiplayer gaming – gamers can link up for
multiplayer action without the use of cables.
Nintendo Wi-Fi Connection Online Gaming –
players can connect with other gamers all over
the world with a wi-fi compatible game.
a web browser to allow for internet searching.
50
Mr. Hyde
Hide objectionable windows on
your Desktop with one simple
hotkey! N1496.exe
Internet (web) Proxy avoidance sites:
Https://proxify.com, WWW.a1proxy.com, www.Letmeby.com
51
Install or Configure Parental
Controls
Smart Limits for Wireless by AT&T
GameLock from Xploder ($39.99) works with
Playstation 2.
Windows Vista (and later) has built in
Parental Controls.
IMSafer is an online parental monitoring service
for instant messaging and Social Networking
Sites.
52
Online Instructions
http://cbs4.com/info/local_story
_045015436.html
53
54
Remember
There is nothing new under the sun –
just new ways to do old things
Technology is neither good nor bad,
it’s the way it is used that is good and
bad
WATCH your child
Help them be safe
Be amazed!
55
Resources
To keep up with current trends
Net Family News newsletter
www.netfamilynews.org
To request presentations and for
information
www.familyinternet.info
www.gacsi.org
56
Questions?
Examples of AUPS
http://www.netfamilynews.org/contract.html
http://www.netsmartz.org/resources/pledge.htm
Safety tools
http://www.getnetwise.org/tools
Hector the Protector
http://www.netsafe.org.nz
Newsletter for trends
http://www.netfamilynews.org
Website:
www.familyinternet.info
57