Transcript Cybersafety
Cybersafety Information for Parents 1 Welcome Introduction Why cybersafety? 2 Devices Phones: Computers: Cameras: Storage Camera, video, Devices: desktop, digital, Video, laptop, USB webcam drives, tablet Calendar, PC, CD, Personal DVD, Games, floppy Digital disks, Internet iPods, Assistant MP3 Access, TXT, player, (PDA) MMS, GPS calculators, system PlayStation Portable (PSP) 3 Multitasking Integrated Into Life 5 Risks and Misuses Concern Concern Concern commit Concern for content they access for behaviors they exhibit for illegal activities they may for safety 6 Concern for Content Information Pornography Support groups for destructive behaviors Items Alcohol Drugs Weapons People Gangs Explicit sexual discussions 7 Concern for Behavior Cheating Copyright Infringement Sexting Overuse 16.7 hrs on Internet vs 13.6 hrs on TV per week Gambling Txt messages, photos, copy/paste ~8 million, over 1/2 of all with pathological gambling addictions Bullying Photos, txt messaging, web postings 8 Ryan Halligan At A Distance Photos may be morphed and put online 9 http://www.smlinks.com/sotw/why/ Children are more worried about being bullied in cyberspace than any threat from pedophiles, the psychologist heading a government inquiry into the effects of the internet on the young told the Oxford Media Convention, reports Ben Fenton Tanya Bryon, half way through a six-month study, said of bullying “It starts in the classroom, and when they get home, it’s all over someone’s MySpace Page.” 10 Concern for Illegal Activities Hacking Writing of Viruses and Trojans Piracy – music and movies Child Pornography Possession Production Exchanging Often using Peer-to-Peer Programs RCA video 11 Concern for Safety Financial – ID Theft Child Family Computer An unprotected PC stands a 50-50 chance of being infected by a worm within 12 minutes of being connected to the Internet Physical Stalking Enticement 12 http://services.georgia.gov/gbi/gbisor/SORSearch.jsp GBI Web search for sex offender www.familywatchdog.us Search for in state and/or out state sex offenders – shows schools, home and work of different types of offenders Parents Help prepare children for these situations 15 Four Suggestions Be the role model - set good examples yourself Set clear rules at home Use strategies and tools to backup your efforts Learn about the issues, trends and devices Personal Information Gaming and blogging Cell phone, PSP, iPod, thumb drives 16 1. Role Model Don’t be gullible Chain emails Phishing email that looks like it came from a real bank or credit card company Set the example in how you use the Internet Ethical Moral Learn how to report problems 17 “Phishing” Scenario - eBay 18 “Phishing” Scenario - eBay 19 “Phishing” Scenario - eBay Thief captures additional information on this screen and then redirects victim to legitimate site 20 “Phishing” Scenario - eBay Fake eBay site Real eBay site 21 Mortgage Offer -----Original Message----From: Lorenzo Forbes [mailto:[email protected]] Sent: Thursday, April 07, 2005 2:50 PM {Link: Subject: Confirmation ID # TJ48 http://gvo.quotelab.com/?na Hi, me=popyam} I sent you an email last week and just wanted to confirm everything. {Domain traced back to: Please review the info below and let me know if you have any owner: xing qian questions. email: I'm happy to inform you that we are accepting your mrtge application. [email protected] If you have bad credit, it is ok. We are ready to give you a $290,000 address: room 1302 32 100 loan for $380/month payment. Aprvl process will take only 1 minute. lane zhongtan rd Just visit the link below and fill out the short form. city: Shanghai Thank You state: Shanghai Confirmation Link # TK36 postal-code: 200061 country: CN Best Regards, phone: 86 216 7820743 CEO: Verna Bouchard 2nd Mrtge Group No future contacts: http://xgjhxn.quotelab.com/st.html 22 Nigerian Scam No other person knows about this account, I am contacting you for us to transfer this funds to your I am Mr.Paul Petric. account as the beneficiary, the accountant -----Original Message----I want to first transfer personal confidant to From: paul petric [mailto:[email protected]] $26,000.000.00 (Twenty Six Dr. Ravindra F. April Shah04, 2005 1:12 Sent: Monday, AM Million USD) from this who together with To:died [email protected] money into a safe account his wifeImportant Dr.Mrs. massage. Subject: abroad, after which we will Manjula Parikh-Shah in transfer a plane crash …without RE: TRANSFER OF [$$ 126,000,000.00 U.S.] the remaining (100M)…you be given having any beneficiary One hundred and Twenty six Million United Stateswill dollars ] 30% of the total amount, 60% will be for me, while Dear Sir/ Madam. 10% will be for expenses We want to transfer to overseas U.S.$126,000,000.00 from a First National Bank in South Africa, I want to ask you to quietly look for a reliable and honest person who will be capable and fit to provide either an existing bank account or to set up a new Bank a/c immediately to receive this money, even an empty a/c can serve to receive this funds quitely. 23 Identity Theft On average 80 hours over $1,400 to clear up a simple case of identity theft that is caught early 24 2. Set Clear Rules Set rules for virtual world just like you would the natural world Time limits, how to treat others, that you must know their friends, rules regarding strangers, rules regarding profanity Computer should be in common room and accessing the Internet with other devices should be done only when around other people 25 Teach Children Not to believe everything they see or hear online Never send pictures of themselves to strangers or reveal personal information online To alert you if they encounter something or someone on the Internet that makes them feel uncomfortable Never meet a cyberpal in person (f2f) 26 Teach Children Protect Personal Information Full name Phone number Age or Date of Birth Location Address School Local stores, theaters, parks etc Sports teams Schedule – dates, games, vacations, etc Social security number, bank acct, credit card 27 Acceptable Use Policy (AUP) When, how long, allowed and off limit content, consequences Expectation of privacy Examples http://www.netfamilynews.org/contract.html http://www.netsmartz.org/resources/pledge.htm 28 3. Tools and Strategies Check for information left on computer Typed URL’s, History, Favorites, Temporary internet files, Recent files, Graphics, Cookies Helpful free guide (Ten Questions) www.ikeepsafe.org 29 Filters, Firewalls, Monitoring Software www.getnetwise.org/tools Have access to all child’s accounts and check them at times Protect your computer Regular updates Anti virus and anti spyware programs Smart practices – protecting passwords, don’t open unknown attachments… 30 Hector the Protector Developed by NetSafe and Microsoft Free download from their site http://www.netsafe.org.nz 31 32 33 4. Learn About the Issues Current trends and devices Things that are in the news Sexting Bullying Predators Don’t think these things will not happen to your family. 34 How Can Predators Use Info Predators use information they find online Locate someone Establish a relationship Screen names shouldn’t tell anything about you Poor examples: Davey1192 Pointguard12tigers Lucy_waycross Good examples: 0tt3rsrc00l Zerogravity Pepperspray 35 Trends Gaming Levels progress in violence, sex, etc. Chat is available Players can join clans or guilds Virtual Worlds Social Networking Great networking tool for all ages Virtual shopping catalog for predator 36 53% of kids will belong to a virtual world in 4 years 37 Runescape Massive multiplayer online roleplaying game (MMORPG) Over ten million active free players Players can engage in combat, complete quests and interact by trading, chatting, or playing combative or cooperative mini-games. 38 World of Warcraft (WoW) is a massive multiplayer online role-playing game (MMORPG) 39 YouTube A free video sharing website that allows users to view, upload and share video clips 40 What is a Social Networking Site? A site that allows users to create Web pages that provide information about themselves and are available to other users and allows searches and communication with other users > 300 sites 41 Statistics • • More than half of US youths use online social networking sites Primary uses – – • • 91% stay in touch with friends 72% make plans with friends Communicate mainly through comments and site email ~ Half visit their site at least once daily 42 Popular Social Networking Sites MySpace Facebook Orkut Hi5 Bebo Xanga Live Windows Spaces Education is helping…MySpace users are putting less personal information online. 43 Friends Can Post Comments 1234 46 Personal Information is Valuable Must be protected like other valuables It is each person’s responsibility to protect their own information We must teach children about personal information 47 Devices The popular devices now are cell phones, iPods, PlayStation Portables (PSP), and thumb drives Each of these devices have the potential to carry information, including pornography Cell phone and PSP can access Internet 48 Did You Know? What do the following devices have in common? Wii PS3 Xbox 360 iPod (video), iPod Touch Cell Phones with Internet access They all can be used by children to access the internet. 49 The Nintendo DS System It is like a mini computer. It has built in wireless capability. PictoChat feature – allows communication with others up to 65 feet. – 4 channels Multiplayer gaming – gamers can link up for multiplayer action without the use of cables. Nintendo Wi-Fi Connection Online Gaming – players can connect with other gamers all over the world with a wi-fi compatible game. a web browser to allow for internet searching. 50 Mr. Hyde Hide objectionable windows on your Desktop with one simple hotkey! N1496.exe Internet (web) Proxy avoidance sites: Https://proxify.com, WWW.a1proxy.com, www.Letmeby.com 51 Install or Configure Parental Controls Smart Limits for Wireless by AT&T GameLock from Xploder ($39.99) works with Playstation 2. Windows Vista (and later) has built in Parental Controls. IMSafer is an online parental monitoring service for instant messaging and Social Networking Sites. 52 Online Instructions http://cbs4.com/info/local_story _045015436.html 53 54 Remember There is nothing new under the sun – just new ways to do old things Technology is neither good nor bad, it’s the way it is used that is good and bad WATCH your child Help them be safe Be amazed! 55 Resources To keep up with current trends Net Family News newsletter www.netfamilynews.org To request presentations and for information www.familyinternet.info www.gacsi.org 56 Questions? Examples of AUPS http://www.netfamilynews.org/contract.html http://www.netsmartz.org/resources/pledge.htm Safety tools http://www.getnetwise.org/tools Hector the Protector http://www.netsafe.org.nz Newsletter for trends http://www.netfamilynews.org Website: www.familyinternet.info 57