Protect Our Kids from The Internet - NetSentron
Download
Report
Transcript Protect Our Kids from The Internet - NetSentron
Protect Our Kids from The Internet
ACSI Sacramento
October 19th, 2006
T. Kobelt
The Issue …
Increased access to
the Internet means
increased access to
inappropriate sites
and content.
London School of Economics
Nine out of ten children
(90%) between the ages
of 8 and 16 have accessed
pornography on the
Internet. In most cases,
these sites were stumbled
upon while searching for
information that was
homework related. Using
the Internet with a filter is
using the Internet
responsibly.
1
Viewed Porn
90%
The Internet Frontier & the Issues
Myspace & related Sites
Instant Messaging & related sites
Unfiltered Search Engine Results
What is the point of Giving Students
Internet Access?
We must have the internet so we are “not
behind” in technology.
The internet is a tool for information and
research.
Searching for a Paradigm of Internet
Use
Looking for something that parallels
developmental stages
Mental
Social
Looking for something that people can
relate to
Physical Limits (Playground & Garden)
Maslow’s Hierarchy of Needs
Age Appropriate Strategies
K – 2 – White list
Define the boundaries of the playground and
ensure that kids can not go anywhere else.
3 – 12 – Blacklist & Dynamic Content Filter
You can go anywhere in the garden, just don’t
eat of the fruit of the tree in the middle of the
garden.
Hierarchy of Individual needs is
well known …
Self Actualization
Belonging and Self Esteem Needs
Physiological and Safety Needs
Expansion on Maslow
At the top of the original pyramid is self
actualization.
Later writings gives us transcendence
A life transformation process
Romans 12: 1,2
Maslow’s Premise
The essence of the hierarchy is the notion of “pre-potency”
This means that you are not going to be motivated by any
higher-level needs until your lower-level ones have been
satisfied.
Note pre-potency only makes sense over a substantial
time-scale. I ate a good breakfast this morning, but I shall
be hungry again tonight: thus I may become concerned
about Physiological needs again then. But if I know where
the next meal is coming from, concern about meeting
those needs will not be a great motivator.
Student Research Capabilities
Give students the capabilities to explore
their world.
Secure the Borders
Expand the Borders
What does this mean?
What does this mean for me?
Expand their Horizons
Where do I go from here?
For your School
I can’t expand my network structure for
tomorrow if I am plagued with computer
virus issues and network security issues
today.
Restrict internet access (secure your borders)
I can’t build strategic knowledge based
information systems if I can’t trust and
interrogate the underlying data.
Hierarchy of Organizational IT
Needs
Strategic Systems
Decision Support
Reach out to Stakeholders
Extend the Borders
Secure Data
Secure Network Borders
Transformational
We need to move from systems that run
well.
We need to move from a secure internet
connection.
To systems well run (or used well)
To a safe & secure internet experience.
We need to move from more information.
To more meaningful information
Internet Experiences gone wrong
Chemistry search for Platinum
Image search on your first name
6 year old searches for Barbie Doll
Search for horses
A history class watches the page get
redirected to a “new” site.
Approaches to a Safe Internet
Parent / Teacher Guidance & Supervision
PC Based Programs
Network, Server or Appliance Solutions
Parent / Teacher Supervision
Works well only in low PC to Supervisor
ratios.
Kids can quickly minimize a browser screen
PC Based Solutions
Browser Settings
IE Content Filter
Can be circumvented at the PC Level
High Maintenance
Requires constant updates and Maintenance
Can be used in small network environments
with Supervision
Net Nanny
Server or Network Based Solution
With a single gateway it is difficult to
circumvent.
Consistent application of content and
network security policy
One point of update and control
Allows for comprehensive web activity
reporting
Not a panacea for education and
supervision
Content Filter Solutions
White list
Block all access except for specific sites.
Works well in K to 2.
Can be implemented at least two ways.
Lock
Browser to a specified web page.
Put all approved sites on the web page.
Warning ensure those pages don’t have any “bad” links.
Restrict
all domains in the firewall (ie D. Link)
Set-up a white list in the Firewall
White list Concerns
It is very restrictive
Works well in younger grades
It is high maintenance
A white list does not check the content of
the pages coming to the browser
By definition everything in the list is
approved.
Black List
List of known bad sites.
Over 5 million known porn sites
Thousands of new “bad” sites every day
Block the known bad sites quickly and easily
Ie. Playboy.com, myspace.com
Very high maintenance
Allows “bad” sites to get through
Websense, Sonicwall, N2H2, Surfcontrol
Dynamic Content Filtering
Analysis the content of every web page
ICRA Tags
Internet content rating association
Voluntary rating (Not many pages are rated)
Keyword blocking
May ban good sites using the word in a
legitimate way.
Ie: Middlesex University
Leads to over blocking
Available in most firewalls
Dynamic Content Filtering
Context sensitive keyword blocking
Parse each word and combination
Very intensive
May slow down internet searching
Dan’s Guardian
Combination Filters
Does the URL (blacklist) blocking first
Does Dynamic Content Filter only on pages
that pass the blacklist
Fastest test
Catches new websites and “bad” results in
search engines and proxy servers
NetSentron
An example
October is Breast cancer Awareness month
Johnny, a 14 year old boy, is given an
assignment on breast cancer.
He turns to MSN to do his research.
He enters breast cancer and gets the
following results
Johnny continues with his research
He has the basics
Now he gets an idea.
The hypothesis is that there is a correlation
between size and the occurrence of breast
cancer.
Johnny decides to search on “big breasts”
A white list will let anything from MSN or Google
through
A blacklist will show the results, but may not let
you go to the site
Dynamic Content Filter Result
What would he have seen …
What does an Administrator See
Allowed Sites
Banned Sites List
Details (trace) on a site
Content Filtering & Beyond
Myspace …
A quick survey …
What is your name?
Where do you teach?
Myspace & Related Issues
Virtual Community
Addresses a need.
Found on related site:
My
name is x
I am a Junior at Y High School
I work at Toys R US at the local Mall
Here is a picture of me and my friend
Social Conditioning
Instant Messaging (chat)
Meant for Quick, unimportant messages
Time waster
Resource waster
Block websites (URL’s) & port
Web based IM (iloveim.com)
Fulfills a social need
Teaching & Technology
The Medium is the Message
Ie: Powerpoint
Television
The Internet
The medium does not replace content
The challenge is to engage the learner with the
content in a cold medium
Resources
Internet Rating Content Association
www.icra.org
www.safekids.com
www.netsentron.com
Our Product
www.netsentron.com/acsi
Presentation materials
More “stuff” to cover
After we defend our borders how do we
safely extend our borders.
Wiki’s etc.
Varied sources of information
Not verified information
If it is on the internet it has to be true
Once we get past the first stage of the
pyramid, teachers and technicians can move
on up to more interesting “stuff”