Transcript Cybersafety

Cybersafety
Information for Parents
1
Welcome
Introduction
 Why cybersafety?

2
Devices
Phones:
Computers:
Cameras:
Storage
Camera,
video,
Devices:
desktop,
digital,
Video,
laptop,
USB
webcam
drives,
tablet
Calendar,
PC,
CD,
Personal
DVD,
Games,
floppy
Digital
disks,
Internet
iPods,
Assistant
MP3
Access,
TXT,
player,
(PDA)
MMS, GPS
calculators,
system
PlayStation
Portable (PSP)
3
Multitasking
Integrated Into Life
5
Risks and Misuses
Concern
 Concern
 Concern
commit
 Concern

for content they access
for behaviors they exhibit
for illegal activities they may
for safety
6
Concern for Content

Information
Pornography
 Support groups for destructive behaviors


Items
Alcohol
 Drugs
 Weapons


People
Gangs
 Explicit sexual discussions

7
Concern for Behavior

Cheating




Copyright Infringement
Sexting
Overuse


16.7 hrs on Internet vs 13.6 hrs on TV per
week
Gambling


Txt messages, photos, copy/paste
~8 million, over 1/2 of all with pathological
gambling addictions
Bullying

Photos, txt messaging, web postings
8
Ryan Halligan
At A Distance
Photos may be
morphed and put online
9
http://www.smlinks.com/sotw/why/

Children are more worried about
being bullied in cyberspace than any
threat from pedophiles, the psychologist
heading a government inquiry into the effects of the internet on
the young told the Oxford Media Convention, reports Ben Fenton

Tanya Bryon, half way through a six-month study, said of bullying
“It starts in the classroom, and when
they get home, it’s all over
someone’s MySpace Page.”
10
Concern for Illegal Activities
Hacking
 Writing of Viruses and Trojans
 Piracy – music and movies
 Child Pornography

Possession
 Production
 Exchanging


Often using
Peer-to-Peer
Programs
RCA video
11
Concern for Safety

Financial – ID Theft
Child
 Family


Computer


An unprotected PC stands a 50-50
chance of being infected by a worm
within 12 minutes of being connected to
the Internet
Physical
Stalking
 Enticement

12
http://services.georgia.gov/gbi/gbisor/SORSearch.jsp
GBI Web search for sex offender
www.familywatchdog.us
Search for in state and/or out state sex offenders – shows schools,
home and work of different types of offenders
Parents

Help prepare children for these
situations
15
Four Suggestions
Be the role model - set good
examples yourself
 Set clear rules at home
 Use strategies and tools to backup
your efforts
 Learn about the issues, trends and
devices

Personal Information
 Gaming and blogging
 Cell phone, PSP, iPod, thumb drives

16
1. Role Model

Don’t be gullible
Chain emails
 Phishing email that looks like it came
from a real bank or credit card company


Set the example in how you use the
Internet
Ethical
 Moral


Learn how to report problems
17
“Phishing” Scenario - eBay
18
“Phishing” Scenario - eBay
19
“Phishing” Scenario - eBay
Thief captures
additional
information on
this screen
and then
redirects
victim to
legitimate site
20
“Phishing” Scenario - eBay
 Fake eBay site
Real eBay site 
21
Mortgage Offer
-----Original Message----From: Lorenzo Forbes [mailto:[email protected]]
Sent: Thursday, April 07, 2005 2:50 PM
{Link:
Subject: Confirmation ID # TJ48
http://gvo.quotelab.com/?na
Hi,
me=popyam}
I sent you an email last week and just wanted to confirm everything.
{Domain traced back to:
Please review the info below and let me know if you have any
owner:
xing qian
questions.
email:
I'm happy to inform you that we are accepting your mrtge application.
[email protected]
If you have bad credit, it is ok. We are ready to give you a $290,000
address:
room 1302 32 100
loan for $380/month payment. Aprvl process will take only 1 minute.
lane zhongtan rd
Just visit the link below and fill out the short form.
city:
Shanghai
Thank You
state:
Shanghai
Confirmation Link # TK36
postal-code: 200061
country:
CN
Best Regards,
phone:
86 216 7820743
CEO: Verna Bouchard
2nd Mrtge Group
No future contacts:
http://xgjhxn.quotelab.com/st.html
22
Nigerian Scam
No other person knows
about this account, I am
contacting you for us to
transfer this funds to your
I am Mr.Paul Petric.
account as the beneficiary,
the accountant
-----Original
Message----I want to first transfer
personal
confidant
to
From: paul
petric [mailto:[email protected]]
$26,000.000.00
(Twenty Six
Dr.
Ravindra
F. April
Shah04, 2005 1:12
Sent:
Monday,
AM
Million USD) from this
who
together with
To:died
[email protected]
money into a safe account
his wifeImportant
Dr.Mrs. massage.
Subject:
abroad, after which we will
Manjula Parikh-Shah in
transfer
a plane
crash …without
RE: TRANSFER
OF [$$ 126,000,000.00
U.S.] the remaining
(100M)…you
be given
having
any beneficiary
One hundred
and Twenty six Million
United Stateswill
dollars
]
30% of the total amount,
60% will be for me, while
Dear Sir/ Madam.
10% will be for expenses
We want to transfer to overseas U.S.$126,000,000.00
from a First
National Bank in South Africa, I want to ask you to quietly look
for a reliable and honest person who will be capable and fit to
provide either an existing bank account or to set up a new Bank
a/c immediately to receive this money, even an empty a/c can
serve to receive this funds quitely.
23
Identity Theft

On average
80 hours
 over $1,400

to clear up a simple case of identity
theft that is caught early
24
2. Set Clear Rules

Set rules for virtual world just like you
would the natural world
Time limits, how to treat others, that
you must know their friends, rules
regarding strangers, rules regarding
profanity
 Computer should be in common room
and accessing the Internet with other
devices should be done only when
around other people

25
Teach Children
Not to believe everything they see or
hear online
 Never send pictures of themselves to
strangers or reveal personal information
online
 To alert you if they encounter something
or someone on the Internet that makes
them feel uncomfortable
 Never meet a cyberpal in person (f2f)

26
Teach Children

Protect Personal Information




Full name
Phone number
Age or Date of Birth
Location
 Address
 School
 Local



stores, theaters, parks etc
Sports teams
Schedule – dates, games, vacations, etc
Social security number, bank acct, credit card
27
Acceptable Use Policy (AUP)
When, how long, allowed and off
limit content, consequences
 Expectation of privacy

Examples
http://www.netfamilynews.org/contract.html
http://www.netsmartz.org/resources/pledge.htm
28
3. Tools and Strategies

Check for information left on
computer
Typed URL’s, History, Favorites,
Temporary internet files, Recent files,
Graphics, Cookies
 Helpful free guide (Ten Questions)

 www.ikeepsafe.org
29

Filters, Firewalls, Monitoring Software

www.getnetwise.org/tools
Have access to all child’s accounts
and check them at times
 Protect your computer

Regular updates
 Anti virus and anti spyware programs
 Smart practices – protecting passwords,
don’t open unknown attachments…

30
 Hector
the Protector
 Developed
by NetSafe and
Microsoft
 Free download from their site
 http://www.netsafe.org.nz
31
32
33
4. Learn About the Issues


Current trends and devices
Things that are in the news



Sexting
Bullying
Predators
Don’t think these things will not happen to
your family.
34
How Can Predators Use Info

Predators use information they find online



Locate someone
Establish a relationship
Screen names shouldn’t tell anything about
you

Poor examples:




Davey1192
Pointguard12tigers
Lucy_waycross
Good examples:



0tt3rsrc00l
Zerogravity
Pepperspray
35
Trends

Gaming
Levels progress in violence, sex, etc.
 Chat is available
 Players can join clans or guilds

Virtual Worlds
 Social Networking

Great networking tool for all ages
 Virtual shopping catalog for predator

36
53% of kids will belong to
a virtual world in 4 years
37
Runescape



Massive multiplayer online roleplaying game (MMORPG)
Over ten million active free
players
Players can

engage in combat, complete
quests and interact by trading,
chatting, or playing combative or
cooperative mini-games.
38
World of Warcraft (WoW)
is a massive multiplayer online role-playing game (MMORPG)
39
YouTube
A free video sharing website that allows
users to view, upload and share video clips
40
What is a Social Networking Site?

A site that allows users to
create Web pages that provide
information about themselves
 and are available to other users
 and allows searches and
communication with other users


> 300 sites
41
Statistics
•
•
More than half of US youths use online
social networking sites
Primary uses
–
–
•
•
91% stay in touch with friends
72% make plans with friends
Communicate mainly through
comments and site email
~ Half visit their site at least once daily
42
Popular Social Networking Sites
MySpace
Facebook
Orkut
Hi5
Bebo
Xanga
Live Windows Spaces
Education is helping…MySpace users are
putting less personal information online.
43
Friends Can Post Comments
1234
46
Personal Information is Valuable
Must be protected like other valuables
 It is each person’s responsibility to
protect their own information
 We must teach children about
personal information

47
Devices
The popular devices now are cell
phones, iPods, PlayStation Portables
(PSP), and thumb drives
 Each of these devices have the
potential to carry information,
including pornography
 Cell phone and PSP can access
Internet

48
Did You Know?

What do the following devices have in
common?
Wii
 PS3
 Xbox 360
 iPod (video), iPod Touch
 Cell Phones with Internet access


They all can be used by children to
access the internet.
49
The Nintendo DS System


It is like a mini computer.
It has built in wireless capability.
 PictoChat feature – allows communication with
others up to 65 feet. – 4 channels
 Multiplayer gaming – gamers can link up for
multiplayer action without the use of cables.
 Nintendo Wi-Fi Connection Online Gaming –
players can connect with other gamers all over
the world with a wi-fi compatible game.
 a web browser to allow for internet searching.
50
Mr. Hyde

Hide objectionable windows on
your Desktop with one simple
hotkey! N1496.exe
Internet (web) Proxy avoidance sites:
Https://proxify.com, WWW.a1proxy.com, www.Letmeby.com
51
Install or Configure Parental
Controls




Smart Limits for Wireless by AT&T
GameLock from Xploder ($39.99) works with
Playstation 2.
Windows Vista (and later) has built in
Parental Controls.
IMSafer is an online parental monitoring service
for instant messaging and Social Networking
Sites.
52
Online Instructions
http://cbs4.com/info/local_story
_045015436.html
53
54
Remember
There is nothing new under the sun –
just new ways to do old things
 Technology is neither good nor bad,
it’s the way it is used that is good and
bad
 WATCH your child

Help them be safe
 Be amazed!

55
Resources

To keep up with current trends


Net Family News newsletter
www.netfamilynews.org
To request presentations and for
information
www.familyinternet.info
 www.gacsi.org

56
Questions?
Examples of AUPS
http://www.netfamilynews.org/contract.html
http://www.netsmartz.org/resources/pledge.htm
Safety tools
http://www.getnetwise.org/tools
Hector the Protector
http://www.netsafe.org.nz
Newsletter for trends
http://www.netfamilynews.org
Website:
www.familyinternet.info
57