enter your child’s cyber world

42
Enter Enter Your Child’s Your Child’s Cyber World Cyber World

Upload: duante

Post on 10-Jan-2016

41 views

Category:

Documents


0 download

DESCRIPTION

Enter Your Child’s Cyber World. Internet Safety. Our thanks to: James Baird, CISSP with GBI Osborne Middle School Technology Team. Enter Your Child’s Cyber World. LOL. LV. F2T. WAN2. PAW. WYGOWM. H8. LOV. Enter Your Child’s Cyber World. F2T. LV. LOL. WYGOWM. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Enter  Your Child’s Cyber World

Enter Enter Your Child’s Your Child’s Cyber WorldCyber World

Page 2: Enter  Your Child’s Cyber World

InternetInternetSafetySafety

Our thanks to:Our thanks to:

James Baird, CISSP with GBIJames Baird, CISSP with GBI

Osborne Middle School Technology TeamOsborne Middle School Technology Team

Page 3: Enter  Your Child’s Cyber World

Enter Your Child’s Cyber WorldEnter Your Child’s Cyber World

Page 4: Enter  Your Child’s Cyber World

Enter Your Child’s Cyber WorldEnter Your Child’s Cyber World

LOL = Laughing Out LoudLOL = Laughing Out LoudF2T = Free To TalkF2T = Free To TalkLV = LeaveLV = LeaveH8 = HateH8 = HateWAN2 = Want to?WAN2 = Want to?POS = Parent Over ShoulderPOS = Parent Over ShoulderPAW = Parents Are WatchingPAW = Parents Are WatchingWTGP = Want To Go PrivateWTGP = Want To Go PrivateWYGOWM = Will You Go Out With Me?WYGOWM = Will You Go Out With Me?

http://www.acronymfinder.comhttp://www.acronymfinder.com See Packet

Page 5: Enter  Your Child’s Cyber World

Characteristics of Some Youth Characteristics of Some Youth May Facilitate VictimizationMay Facilitate Victimization

Lack of emotional maturityLack of emotional maturity

Strong desire for attention, validation, and Strong desire for attention, validation, and affectionaffection

Naturally curious about sex, “forbidden” Naturally curious about sex, “forbidden” topicstopics

May be rebellious and enjoy defying authorityMay be rebellious and enjoy defying authority

Easily impressed, manipulated and Easily impressed, manipulated and intimidatedintimidated

Youth lacking adult supervisionYouth lacking adult supervision

Page 6: Enter  Your Child’s Cyber World

Students’ Basic Online BehaviorStudents’ Basic Online Behavior80% of students spend at least one hour per week on the 80% of students spend at least one hour per week on the Internet Internet

11% of students spend over 8 hours per week on the 11% of students spend over 8 hours per week on the Internet Internet

12% of students say they spend more time on the Internet 12% of students say they spend more time on the Internet than with friends than with friends

30% of students say e-mail, chat rooms, or Instant 30% of students say e-mail, chat rooms, or Instant Messaging is the main way they stay in contact with their Messaging is the main way they stay in contact with their friends friends

38% of students feel more free to do what they want on the 38% of students feel more free to do what they want on the Internet Internet

31% of students say it is easier to talk with people on the 31% of students say it is easier to talk with people on the Internet than in real life Internet than in real life

29% of students use chat rooms, with a peak usage of 45% 29% of students use chat rooms, with a peak usage of 45% occurring in grade 7occurring in grade 7

Based on i-SAFE America surveys of 19,000 studentsBased on i-SAFE America surveys of 19,000 students

Page 7: Enter  Your Child’s Cyber World

The Parent-Child Gap The Parent-Child Gap PARENTS vs. YOUTH

92% stated they had established rules for the child’s Internet use.

vs. 35% said that they did not have rules for Internet usage.54% acknowledged that there was a need for more rules.

54% feel they are limited to monitor and shelter children from inappropriate material on the Internet.

vs. 53% stated that they would prefer to be alone when surfing the Internet.

90% feel they have a good idea of what their child does while on the Internet.

vs. 14% stated their parents had no idea where they go and 34% said they do not share what they do or where they go on the Internet with parents.

11% said their child’s computer was in the child’s room. 75% said it is in the family area.

vs. 21.5% of the students said that the computer they use most often is in their room.This goes up with age, 26% for 8th grade and 31% for 12th grade.

46% feel they have more freedom on the Internet than in the real world.

vs. 37% felt they have more freedom and, 18% felt safer on the Internet than in the real world.When asked “why?” 52% cited anonymity & 29% mentioned lack of laws/rules.

*Taken from an i-SAFE America survey of students nationwide.*Taken from an i-SAFE America survey of students nationwide.

Page 8: Enter  Your Child’s Cyber World

PromisesPromises

Page 9: Enter  Your Child’s Cyber World

Internet Predator ProfileInternet Predator Profile

Typically married adult with childrenTypically married adult with childrenNormal neighborNormal neighborUsually has a successful career in an Usually has a successful career in an upper-management positionupper-management positionCollege graduate, possibly post-graduate College graduate, possibly post-graduate degreedegreeUpper, middle-class lifestyleUpper, middle-class lifestyleUsually 35 or olderUsually 35 or olderUsually whiteUsually whiteWill offend againWill offend again

Page 10: Enter  Your Child’s Cyber World

Students’ Risky Online Behavior Students’ Risky Online Behavior 55% of students admit giving their personal information 55% of students admit giving their personal information (name, sex, age, etc.) over the Internet (name, sex, age, etc.) over the Internet

52% of students prefer to be alone while on the Internet 52% of students prefer to be alone while on the Internet

40% of students have visited inappropriate places on the 40% of students have visited inappropriate places on the Internet Internet

10% of students feel it is okay to post their picture on the 10% of students feel it is okay to post their picture on the Internet Internet

10% of students have met someone face-to-face that they 10% of students have met someone face-to-face that they previously met on the Internet previously met on the Internet

25% of students believe there is nothing wrong with 25% of students believe there is nothing wrong with chatting to strangers online chatting to strangers online

21% of students say after getting to know someone better 21% of students say after getting to know someone better on the Internet, they would believe them when they tell on the Internet, they would believe them when they tell their age their age

Page 11: Enter  Your Child’s Cyber World

http://www.netsmartz.orghttp://www.netsmartz.org

Page 12: Enter  Your Child’s Cyber World

"Tracking Teresa""Tracking Teresa"

Even though Teresa has tried not to reveal Even though Teresa has tried not to reveal personal information online, she’s left personal information online, she’s left enough clues that she could find herself in enough clues that she could find herself in danger. danger.

http://www.netsmartz.org/resources/reallife.htm#realAmyhttp://www.netsmartz.org/resources/reallife.htm#realAmy

Page 13: Enter  Your Child’s Cyber World

Chat RoomsChat Rooms – Virtual Parks – Virtual ParksNo longer the guy with the trench coat waiting to No longer the guy with the trench coat waiting to kidnap the childkidnap the childCan sit anywhere and talk to several children at Can sit anywhere and talk to several children at one time at different locationsone time at different locationsUsed to gain child’s trust and set up sexual Used to gain child’s trust and set up sexual meetingsmeetingsUsed to send pornographic imagesUsed to send pornographic imagesThey will send the child porn, getting more They will send the child porn, getting more explicit each timeexplicit each timeThey will try to convince the child that everybody They will try to convince the child that everybody is doing this and that it is normalis doing this and that it is normal

Page 14: Enter  Your Child’s Cyber World

Chat RoomsChat Rooms

Predators often snoop around child Predators often snoop around child chat rooms for potential victims. chat rooms for potential victims.

They use various methods to get They use various methods to get close to children but even if a child is close to children but even if a child is not receptive to the predators not receptive to the predators advances, he can still harass and advances, he can still harass and endanger the child by searching for endanger the child by searching for information about the child.information about the child.

Page 15: Enter  Your Child’s Cyber World

Countermeasures for PredatorsCountermeasures for PredatorsUse parental controls (if available)Use parental controls (if available)

Monitor child’s actions on the internetMonitor child’s actions on the internet

Discuss appropriate internet activitiesDiscuss appropriate internet activities

Purchase NetNanny ($40) or similarPurchase NetNanny ($40) or similar

Caution children about predatorsCaution children about predators

Limit the time child spends on a computer.Limit the time child spends on a computer.

Use software that creates a log of sites visited and every Use software that creates a log of sites visited and every keystroke that is made on the computer. keystroke that is made on the computer.

Randomly check emails on child’s accountRandomly check emails on child’s account

Move the computer into a family areaMove the computer into a family area

The internet is not a babysitter. The internet is not a babysitter.

Page 16: Enter  Your Child’s Cyber World

More CountermeasuresMore Countermeasures

Discuss Internet crime and safety issues with Discuss Internet crime and safety issues with your familyyour familyDiscuss with other family members expectations Discuss with other family members expectations with use of the computer.with use of the computer.Sign an agreement between parents and Sign an agreement between parents and children that outlines expectations and the children that outlines expectations and the amount of time allowed on the computer per day amount of time allowed on the computer per day or week.or week.Include in agreement who can be contacted or Include in agreement who can be contacted or talked with on the computer.talked with on the computer.If family member receives an email that offends If family member receives an email that offends you or them, contact your Internet Provider and you or them, contact your Internet Provider and complain about the message being received.complain about the message being received.

Page 17: Enter  Your Child’s Cyber World

Cyber-bullying is Coming to a Cyber-bullying is Coming to a School Near You if it hasn’t School Near You if it hasn’t

already.already.Concerns include:Concerns include:

Cyber-bullying can be much more Cyber-bullying can be much more damaging psychologically and much more damaging psychologically and much more intense. intense. It creates a barrier between the bully and It creates a barrier between the bully and the victim. This can allow someone who the victim. This can allow someone who normally wouldn't be a bully to become normally wouldn't be a bully to become one because there is no face to face one because there is no face to face contact. contact.

Page 18: Enter  Your Child’s Cyber World
Page 19: Enter  Your Child’s Cyber World

Cyber-bullyingCyber-bullying

It is difficult to catch the cyber-bully. When It is difficult to catch the cyber-bully. When identified, the suspect’s defense is often that identified, the suspect’s defense is often that it was it was someone else impersonating themsomeone else impersonating them using their password. using their password. Camera phonesCamera phones are making cyber-bullying are making cyber-bullying more creative. Taking someone’s picture and more creative. Taking someone’s picture and then manipulating it, then posting it on a web then manipulating it, then posting it on a web site or in e-mail. Imagine getting an e-mail of a site or in e-mail. Imagine getting an e-mail of a nude individual with your face attached to it, nude individual with your face attached to it, and you’re only a teenager. and you’re only a teenager. Many think this behavior is a Many think this behavior is a joke and not as joke and not as serious as bullying face to face. serious as bullying face to face.

Page 20: Enter  Your Child’s Cyber World

Cyber-bullyingCyber-bullyingVictims are often Victims are often targeted because they targeted because they are considered differentare considered different — usually — usually those considered overweight, small, those considered overweight, small, with a learning disability or overly with a learning disability or overly sensitive. sensitive.

Many face dirty digital tricks that range Many face dirty digital tricks that range from derogatory comments about them from derogatory comments about them online to embarrassing e-mail online to embarrassing e-mail attributed to them intended to insult attributed to them intended to insult friends and crushes. friends and crushes.

Page 21: Enter  Your Child’s Cyber World

Cyber Bullying StatisticsCyber Bullying Statistics42% of kids have been bullied while 42% of kids have been bullied while online. 1 in 4 have had it happen more online. 1 in 4 have had it happen more than once. than once. 35% of kids have been threatened 35% of kids have been threatened online. Nearly 1 in 5 have had it online. Nearly 1 in 5 have had it happen more than once. happen more than once. 21% of kids have received mean or 21% of kids have received mean or threatening e-mail or other messages. threatening e-mail or other messages.

Based on 2004 i-SAFE survey of 1,500 students grades 4-8Based on 2004 i-SAFE survey of 1,500 students grades 4-8

Page 22: Enter  Your Child’s Cyber World

Cyber Bullying StatisticsCyber Bullying Statistics53% of kids admit having said something 53% of kids admit having said something mean or hurtful to another person online. mean or hurtful to another person online. More than 1 in 3 have done it more than More than 1 in 3 have done it more than once. once. 58% of kids admit someone has said 58% of kids admit someone has said mean or hurtful things to them online. mean or hurtful things to them online. More than 4 out of 10 say it has happened More than 4 out of 10 say it has happened more than once. more than once. 58% have not told their parents or an 58% have not told their parents or an adult about somethingadult about something mean or hurtful mean or hurtful that happened to them online.that happened to them online.

Page 23: Enter  Your Child’s Cyber World
Page 24: Enter  Your Child’s Cyber World

www.xanga.comwww.xanga.com

Popular Blog Site

Page 25: Enter  Your Child’s Cyber World

Blog SitesBlog Sites

Page 26: Enter  Your Child’s Cyber World

www.xanga.comwww.xanga.com

Page 27: Enter  Your Child’s Cyber World

www.xanga.comwww.xanga.com

Page 28: Enter  Your Child’s Cyber World

www.facebook.comwww.facebook.com

Page 29: Enter  Your Child’s Cyber World

Parents Must Be AwareParents Must Be Aware

Many kids do not want to report this Many kids do not want to report this problem to their parents for fear of how problem to their parents for fear of how their parents may react. their parents may react. They fear their parents will take away They fear their parents will take away their cell phone, computer, or Internet their cell phone, computer, or Internet access. access. Obviously this solution will stop the Obviously this solution will stop the messages, but then the child feels messages, but then the child feels harassed by the bully harassed by the bully andand punished by punished by the parents when the equipment is the parents when the equipment is removed.removed.

Page 30: Enter  Your Child’s Cyber World

Signs That a Child Might Be At Signs That a Child Might Be At Risk On-line Risk On-line

Spends large amounts of time on-line, especially at night Spends large amounts of time on-line, especially at night

Find pornography on child's computer Find pornography on child's computer

Child receives phone calls from unknown men or is Child receives phone calls from unknown men or is making calls, sometimes long distance, to unfamiliar making calls, sometimes long distance, to unfamiliar numbersnumbers

Child receives mail, gifts, or packages from unfamiliar Child receives mail, gifts, or packages from unfamiliar sourcessources

Child turns the computer monitor off or quickly changes Child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room the screen on the monitor when you come into the room

Child becomes withdrawn from the family Child becomes withdrawn from the family

Child is using an on-line account belonging to someone Child is using an on-line account belonging to someone elseelse

Page 31: Enter  Your Child’s Cyber World

Cyber Bullying TipsCyber Bullying Tips

Tell a trusted adult about the Tell a trusted adult about the bullying, and keep telling until the bullying, and keep telling until the adult takes action. adult takes action. Don’t open or read messages by Don’t open or read messages by cyber bullies. cyber bullies. Tell your school if it is school Tell your school if it is school related. Schools have a bullying related. Schools have a bullying solution in place. solution in place.

Page 32: Enter  Your Child’s Cyber World

Cyber Bullying TipsCyber Bullying Tips

Don’t erase the messages—they may Don’t erase the messages—they may be needed to take action. be needed to take action. Protect yourself—never agree to meet Protect yourself—never agree to meet with the person or with anyone you with the person or with anyone you meet online. meet online. If bullied through chat or instant If bullied through chat or instant messaging, the “bully” can often be messaging, the “bully” can often be blocked. blocked. If you are threatened with harm, If you are threatened with harm, inform the local police. inform the local police.

Page 33: Enter  Your Child’s Cyber World
Page 34: Enter  Your Child’s Cyber World
Page 35: Enter  Your Child’s Cyber World

What Can Parents Do?What Can Parents Do?

Establish a bond of trust and open Establish a bond of trust and open communication with their child.communication with their child.Place / keep computer(s) with Internet Place / keep computer(s) with Internet access in an open, commonly used access in an open, commonly used space.space. Learn about the new technologiesLearn about the new technologies Commend your child for reporting Commend your child for reporting cyber issuescyber issuesParent and Child Internet AgreementParent and Child Internet Agreement

Page 36: Enter  Your Child’s Cyber World

What Can Parents Do?What Can Parents Do?

Cybersitter offers a good stealth mode, letting parents filter and monitor kids' activities without their knowledge. Cybersitter can record both sides of IM sessions, as well as log all sites visited and any violations. This information can then be automatically e-mailed to you in a daily activity report.

Cybersitter relies on an extensive, frequently updated database of sites and word patterns. By default, Cybersitter blocks content related to sex, drugs, hate, and violence, as well as blocking all image searches. But parents can select from 32 content categories—including cults, gambling, file sharing, wrestling, and free e-mail sites—to tailor the filter to their needs. These settings are applied to Web browsing, e-mail, instant messaging, and newsgroups. Or you can simply block all instant messaging, newsgroups, FTP

access, and file sharing. .

Page 37: Enter  Your Child’s Cyber World

Have you googled yourself?Have you googled yourself?

http://www.google.comhttp://www.google.com

Search your name, email address, Search your name, email address, telephone number, home addresstelephone number, home address

Search children’s, spouse, relativesSearch children’s, spouse, relatives

It may be possible to remove It may be possible to remove unwanted information from some sitesunwanted information from some sites

Page 38: Enter  Your Child’s Cyber World

GCPS POLICIES AND GCPS POLICIES AND PROCEDURESPROCEDURES

Page 39: Enter  Your Child’s Cyber World

What Can Schools Do?What Can Schools Do? GCPS/Chattahoochee Elementary SchoolGCPS/Chattahoochee Elementary School

GCPS FirewallGCPS FirewallBlocked Sites and ProceduresBlocked Sites and ProceduresAcceptable Use PoliciesAcceptable Use Policies– Both Students and StaffBoth Students and Staff

Supervision of Computer LabsSupervision of Computer Labs– Teachers, Parent Volunteers, Tech StaffTeachers, Parent Volunteers, Tech Staff

Technology OrientationTechnology Orientation– Both Students and StaffBoth Students and Staff

Counselor ProgramsCounselor Programs

Page 40: Enter  Your Child’s Cyber World
Page 41: Enter  Your Child’s Cyber World

Enter Your Child’s Cyber WorldEnter Your Child’s Cyber World

1.1. Tracy Parrish – Enter Your Child’s Cyber Tracy Parrish – Enter Your Child’s Cyber WorldWorld

– Internet Safety Quiz for AdultsInternet Safety Quiz for Adults– Presentation: Enter Your Child’s Cyber Presentation: Enter Your Child’s Cyber

WorldWorldInformation complied by Osborne Middle SchoolInformation complied by Osborne Middle School

2.2. Additional Tools Additional Tools Handouts Handouts Web ResourcesWeb Resources Parent/Student Contracts Parent/Student Contracts

3.3. Question & AnswerQuestion & Answer

Page 42: Enter  Your Child’s Cyber World

Sites of InterestSites of InterestCyberSmart:CyberSmart:www.cybersmart.orgwww.cybersmart.orgNetsmartz:Netsmartz:http://www.netsmartz.orghttp://www.netsmartz.orgGeorgia State Computer Crimes Task Force Educators Sub-Georgia State Computer Crimes Task Force Educators Sub-Committee:Committee:http://sci-one.kennesaw.edu/EduSechttp://sci-one.kennesaw.edu/EduSecNetNanny Internet Filter:NetNanny Internet Filter:http://www.netnanny.com/index.htmlhttp://www.netnanny.com/index.htmlSpyBot privacy cleaner: SpyBot privacy cleaner: http://security.kolla.de/http://security.kolla.de/Ad-Aware privacy cleaner: Ad-Aware privacy cleaner: http://www.lavasoftusa.com/http://www.lavasoftusa.com/GATech InfoSec Law Library:GATech InfoSec Law Library:http://www.security.gatech.edu/policy/law_library/http://www.security.gatech.edu/policy/law_library/Free Antivirus:Free Antivirus:http://www.grisoft.com/http://www.grisoft.com/