Internet Use (Safety Thoughts…) What Can We Do? A LOT! Scott Baty CCCGC Jan 2015 What is Internet Safety? Internet safety or online safety is the security of people and their information when using the Internet. Internet safety means protecting your personal information while online. Details such as your address, full name, telephone number, birth date and/or social security number can potentially be used by on-line criminals. - Wikipedia: http://en.wikipedia.org/wiki/Internet_safety eHow: http://www.ehow.com/about_6577504_definition-internet-safety.html Personal Protection From… • • • • • Internet Predators Coffee-Shop-Unsecure WIFI “Script-Kiddies” (what you might think of as “hackers”) Viruses / Trojans / Malware Those who take advantage of children & teens • Phishing • – – – – Use “Social Engineering” to manipulate victim Sexual Intentions Murderous Intentions Other Malicious Intent (Posing as a trustworthy entity while attempting to acquire sensitive information) Scam Artists – – Email scams are meant to take your money Scams on Craigslist that are using you to commit fraudulent activities Coffee-Shop-Data-Collectors (Using Unsecure Wireless Networks) • • • • • • • Most public wireless connections are NOT secure It’s easy to capture your data Don’t log into websites that reveal your sensitive credentials (email, bank account, etc.) Use onboard firewall software Lock your screen before leaving your seat Don’t store sensitive information on your computer Use an encrypted VPN (Virtual Private Network) Coffee Shop Scenario Typical unsecured wireless connection. This is what you think that you are logging into… Man In The Middle Attack The Man-In-The-Middle grabs and/or modifies data that is sent/received. http://www.interlinknetworks.com/whitepapers/Link_Layer_Security.htm VPN – Virtual Private Network Protect your traffic by encrypting it. http://myvpnreviews.com/ http://en.wikipedia.org/wiki/Virtual_private_network http://www.interlinknetworks.com/whitepapers/Link_Layer_Security.htm Whats to be Gained? • Physical Safety – freedom from physical harm • Psychological Safety – freedom from cruelty, • • harassment, and exposure to potentially disturbing material Reputational and Legal Safety – freedom from unwanted social, academic, professional, and legal consequences that could affect users for a lifetime Identity, Property, and Community Safety – freedom from of identity, property theft Youth Online Safety • • The definition of “youth online safety” has broadened and become more complex in the past 10 years, as has the role of the online user. The inter-connected devices allow us great freedom when consuming, socializing, producing, and connecting. In addition to cyberbullying, inappropriate content, and predation, other risks have emerged, including “sexting” and the risks related to geolocation technology in online applications and on mobile phones. Source: OSTWG Article, "Youth Safety on a Living Internet“ Online Safety and Technology Working Group (OSTWG) Statistics • • • • • • 75% of children and teens report sharing personal information about them and their families to complete strangers in chat rooms1 93% of American teens (ages 12-to-17) use the Internet2 73% of American teens use social network sites2 75% of American teens own cell phones2 4% of American teens have sent sexually suggestive images or videos of themselves via cell phone, and 15% have received such images from someone they know2 43% of teens have been victims of cyberbullying3 Sources are referenced in Resources slide near the end of this presentation Avenues for Online Communication Avenues for online child communication: blogs, chat rooms, irc, IM, Facebook, Facebook chat, Instagram, MySpace, Orkut, email, Skype, Twitter, Identica, Craigslist, forums, text messages, etc…. Kids and The Dangers of The Social Web Public profiles put kids at a much greater risk to: Receive a message from a stranger Meet with a stranger Be harassed by peers Other concerns of social networking sites: Lack of age-verification mechanisms Posting provocative pictures and videos Easy access for predators and cyberbullies Excessive or addictive access Access to unhealthy “groups” SAFEBOOK MAN Protection Methods for Youth (& you!) Educate your child about the dangers that exist on the Internet Studies show that: Fear-based scare-tactics are not effective Use the "norms" approach - suggest that [insert behavior here] is not a “norm” among youth's peers and that people who engage in such activity are abnormal and may need help Protection Methods for Youth (and US!) Educate you child about safe Internet practices Use strong passwords (including numbers, special characters, and combination of upper/lower case) Never give password to anyone Don't communicate online with people you don't know Enable & elevate privacy settings in Facebook Disable Facebook Chat Do not allow Skype calls from anyone who is not on your contact list Teach kids about responsible communication Protection Methods for Youth ALL OF US!! Do not share specific information about yourself, such as family info, where you live, photos of yourself or your home, etc. Use an alias for Web communications, not your real name / also use avatar that is different from your actual photo Don't say anything online to someone that you would not be willing to say directly to their face in person Don't open email attachments unless you know for certain what it is Be aware that actions have consequences - ex: nude photos, bad language, inappropriate conduct, etc. - could have legal impacts, embarrassment, or affect future job opportunities Inform you (the parent or another authority figure) if the child has experienced anything online that makes him/her feel creepy or uncomfortable As Parents and Gaurdians Simple Steps We Can Do • • • • • Use Internet Content Filters – – Software that filters out unwanted websites, such as pornography IP Addresses can be filtered using your router or your Web browser Place computer in living room or other "common" area within your home Regulate length of time child spends on Internet as well as determine a window of time for usage Request list of email and social networking sites being used and username/password for each account Perform random checks on your teenager's cell phone to view text messages sent/received Content Filtering Commercial Software for Content Filtering: Cyber Patrol: http://www.cyberpatrol.com CyberSitter: http://www.cybersitter.com InternetSafety: http://www.internetsafety.com/safe-eyes-parental-control-software.php ContentWatch: http://www.contentwatch.com NetNanny: http://www.netnanny.com (powered by ContentWatch - also works on mobile devices) Panda Internet Security: http://www.pandasecurity.com/security-promotion/usa/panda-internet-security PC TattleTale Parental Control: http://www.pctattletale.com Aobo Porn Filter - Website Blocker: http://aobo.cc/aobo-porn-filter.html Sentry Parental Controls: http://www.sentryparentalcontrols.com Free Software for Content Filtering OpenDNS - FamilyShield: http://www.opendns.com/familyshield Parental Filter: http://www.softpedia.com/get/Security/Lockdown/Parental-Filter.shtml K9 Web Protection: http://www1.k9webprotection.com ProCon Latte: http://procon.mozdev.org (read interesting related article) Content Filtering for Firefox KidZui - a safe browser and online playground for kids 3-12 FoxFilter Add-on for Firefox Interesting article on using manual proxy configurations Filtering Content with IE's Content Advisor Cyberbullying What is it? Cyber Bullying occurs when people send or post mean or threatening text or pictures on the Internet. Examples: A kid could post stories about another kid online. They could show the website to all of their friends. When the victim goes back to school, he/she gets teased about something they don’t know about. If a friend had your password, and you got into a fight, they could send mean emails to everyone in your address book. When your friends or family open the email, they would think that it came from you! They could feel very hurt and upset. Source: http://library.thinkquest.org/06aug/01158/home.html Cyberbullying Possible warning signs of children being bullied or bullying other children Complaining that other children or a group of children do not like them. Preoccupation with friendship concerns. Poor self-esteem. Feeling they are not as good as others. Not wanting to go to school or other activities. Spending a great deal of time on the computer. Being secretive about online activities. Source: Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_parents6.ppt Cyberbullying Dealing with Cyberbullying • • • • • • Preserve evidence – this is crucial for identifying the bully and making a case. Attempt to enlist assistance from the service provider. If able to identify the bully, contact him or her and/or parents. Use available blocking technology (i.e., block the user on IM, email and chat.) In serious cases, seek assistance from the police (i.e., threats of physical harm, unrelenting or unable to stop.) Source: Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_parents6.ppt Cyberbullying Dealing with Cyberbullying Some links worth looking at: http://wiki.ucalgary.ca/page/Cyberbullying http://www.stopcyberbullying.org http://www.wiredsafety.org/ http://www.wiredsafety.org/fbprivacy/index.h tm “Sexting” 20% of 16 year olds and 30% of 17 year olds have recieved a sext (a sexualy implicit text) (Pew Internet & American Life Project. "Teens and sexting: How and Why Minor Teens are Sending Sexually Suggestive Nude images Via Text Messaging." A pew Internet Guide to Teens, Mobile Phones and Social Media. M Communications Studies, Lehnart Amanda, December 2009) By 2015, Mobile adult content revenues are expected to reach $2.8 billion and mobile adult subscriptions will reach $1 billion. (Juniper Research. "Videochat and Subscription services to drive mobile adult revenues to $2.8bn by 2015" October, 2010) 95% of teens use the internet (Pew Internet & American Life Project, 2013) The Average Age for a Person's first Cell Phone is now 13 (Pew Internet & American Life Project, 2010) 3 in 10 teens text more than 100 times a day (Pew Internet & American Life Project, 2012) “Sexting” - Consequences • • • Photos sent to boy/girlfriend could potentially be distributed over school, especially after a breakup One could suffer legal consequences after distributing nude photos of an underage minor – criminal charges – listed as registered sex offender Criminal charges could result in... – permanent expulsion from school – loss of job opportunities (due to lack of education and/or sex-offender job regulations & limitations) – can't reside near school areas Example: http://www.themonitor.com/articles/palmview-38189school-charge.html Viruses / Trojans / Ad-Ware • Don’t open email attachments • • • unless you know for certain what they are Use Virus Software: Windows Defender, MSE, Avira, etc Regular Windows Updates (weekly) Use Web Browser Alternatives: Chrome, Firefox, Opera, Safari… Best browser for speed Browsers don't generally feel sluggish any more, but there are still crucial differences in the way they do things, especially web apps. The venerable Sunspider benchmark is a good indication of how well a browser performs under pressure, and the lower the score the faster the browser. At the risk of sounding like an Upworthy headline here: we tested all the major browsers in Sunspider. Their scores may surprise you. Safari 197.9ms Opera 174.4ms Chrome165.2ms Firefox 157.9ms Internet Explorer (desktop)94.7ms Internet Explorer (modern)93.1ms As you can see, Internet Explorer (both the desktop and modern incarnations) isn't just ahead, but ahead by a significant amount. Most Popular Browser According to the Secunia Vulnerability Review 2014 Browser Vulnerabilities Discovered % Unpatched Users Mozilla Firefox Microsoft IE Google Chrome Apple Safari Opera 270 126 245 75 11 33% 12% 17% 14% 39% However, Secunia’s figures don’t account for vulnerability severity, open and closed source browsers, or-the most crucial factor in determining security-patch response times. According to Pwn2Own statistics, Chrome has the fastest response to threats of all browsers: 15 days. Which Browser to Use? You Decide! Passwords a thought or two…. Perfect Passwords? If there is such a thing! GRC's Ultra High Security Gibson Research Corp. (www.grc.com) Password Generator 27,359 sets of passwords generated per day Strong Passwords: Phrases, mixed case, special characters, and long: - 5db10mw! (Slow Down Buddy I’m On My Way!) - w@yD0wny0nd3r#% (Way Down Yonder #%) Change the letters to the numbers they look like! welcomehomeBen! -------- w3lc0meh0m3B3n! welcomehomeBen! Thank You! This presentation will be located online at: http://www.cccgc.info References from Slide #10 1. The Safe Surfin' Foundation 2. OSTWG Article, "Youth Safety on a Living Internet" 3. Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isa fety_parents6.ppt Resources, Articles, Videos, & More Information About Internet Safety Internet Safety – Keeping it Real: http://library.thinkquest.org/06aug/01158/home.html Internet Safety PowerPoint - A Parent's Guide to the Internet: http://criminaljustice.state.ny.us/missing/i_safety/mediafiles/isafety_parents6.ppt Teaching Teenagers About The Danger of Internet Predators: http://parenting.families.com/blog/teaching-children-about-the-danger-of-internetpredators Video: Tracking Teresa: http://www.netsmartz.org/stories/teresa.htm Dateline NBC Online Safety Kit: http://www.msnbc.msn.com/id/15162866/ The Online Safety and Technology Working Group (OSTWG): http://www.ntia.doc.gov/advisory/onlinesafety OSTWG Article, "Youth Safety on a Living Internet: http://www.ntia.doc.gov/reports/2010/OSTWG_Final_Report_060410.pdf Some guidelines for protection: http://www.ehow.com/how_4542712_protect-children-online-sexual-predators.html Division of Criminal Justice Services - Internet Safety Presentations & Resources: http://criminaljustice.state.ny.us/missing/i_safety/videos_presentations.htm The Safe Surfin' Foundation: http://www.safesurfincentral.org eHow.com - How to Protect Children From Online Sexual Predators: http://www.ehow.com/how_4542712_protect-children-online-sexualpredators.html Video: CBS News - Finding Internet Predators - The Alicia Kozakiewicz Story: http://www.cbsnews.com/video/watch/?id=3379194n Dateline NBC - To Catch A Predator: http://www.msnbc.msn.com/id/10912603 Net Smartz: http://www.netsmartz.org/index.aspx Net Smartz Teens: http://www.NSTeens.org Kideos: http://www.kideos.com Online Safety and Technology Working Group: http://www.ntia.doc.gov/advisory/onlinesafety Additional resources: http://www.ncjrs.gov/internetsafety/children.html
© Copyright 2024