Technology friend or foe l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 87

Technology: Friend or Foe? PowerPoint PPT Presentation

Technology: Friend or Foe? Robert Leri March 2006 Agenda Introductions Overview Online Threats for All Using the Internet Safely for Kids What the School District is Doing Closing Online Threats for All Let’s talk! Virus Spam Phishing SpyWare In addition to other online threats…

Download Presentation

Technology: Friend or Foe?

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Technology friend or foe l.jpg

Technology: Friend or Foe?

Robert Leri

March 2006


Agenda l.jpg

Agenda

  • Introductions

  • Overview

  • Online Threats for All

  • Using the Internet Safely for Kids

  • What the School District is Doing

  • Closing


Online threats for all l.jpg

Online Threats for All

  • Let’s talk!

    • Virus

    • Spam

    • Phishing

    • SpyWare

    • In addition to other online threats…


Virus l.jpg

Virus

  • What is a Computer Virus?

    • Self-replicating program

    • Attaches to other programs

    • Tries to avoid detection

    • Different infection categories

  • Two stages of infection:

    • Infection phase

    • Attack phase

  • Payload or payoff

    • Malicious or mischievous action


Virus facts l.jpg

Virus Facts

  • Brain - first virus in the wild (1986)

  • Types

    • Macros, File Infectors, Trojans, System Sectors,

    • Worms, Hoaxes

  • Multiple infection categories

  • Means of infection

    • Email attachments

    • Spoofed e-mails from victim’s address book

    • Internet

    • Removable media (disks)

  • Purposes

    • Cracking

    • Payload


Preventing virus infections l.jpg

Preventing Virus Infections

  • Do not open files attached from an unknown, suspicious or untrustworthy source.

  • Do not open any files attached to an email unless you know what it is.

  • Do not open any files attached to an email if the subject line is questionable or unexpected.

  • Delete chain emails and junk email.

  • Do not download any files from strangers.

  • Exercise caution when downloading files from the Internet.


Preventing virus infections7 l.jpg

Preventing Virus Infections

  • Update your anti-virus software regularly.

  • Back up your files on a regular basis.

  • When in doubt, always err on the side of caution and do not open, download, or execute any files or email attachments. Not executing is the more important of these caveats.

  • Microsoft security located at http://www.microsoft.com/security.


What is spam l.jpg

What is Spam

  • It's a luncheon meat, kinda pink, comes in a can, made by Hormel.

  • Most Americans intuitively, viscerally associate "Spam" with "no nutritive or aesthetic value," though it is still relatively popular (especially in Hawaii) and can be found in almost any grocery store.)

  • The canned luncheon meat has its own newsgroup, alt.spam.


Spam facts l.jpg

Spam Facts

  • There are approximately 80 “world class spammers” who pay on the order of US$100K/month for bandwidth and servers

  • 200 spam operations account for 90% of all spam

    • [Spamhaus, June 2004]

  • AOL rejects 80% of all incoming mail as spam; 80% of remaining is never opened (probably spam) for 96% total spam

    • [Carl Hutzler, AOL, personal communication, 2004]

  • Email volume increased 600% in 2003, all of it spam

    • [MAAWG, April 2004]

  • Zombie machines generate 90% of all spam


Stopping spam l.jpg

Stopping Spam?

  • Protect your computer

    • Spam is a growing source of computer viruses.

    • It's critical that you protect your computer from virus-carrying spam messages.

    • Install and regularly update antivirus and anti-spam software.

    • If you don't have the extra protection of a firewall, get it.


Slide11 l.jpg

Stopping Spam?

  • Protect your email address

    • Reserve one email address for your trusted personal and business contacts.

    • Create a separate, expendable email address for other online uses.

  • Protect yourself

    • Don't try, don't buy and don't reply to spam.

    • Just delete it.

    • It's a great way to prevent receiving more spam in the future.


Gone phishing l.jpg

Gone Phishing?


Have you been phished l.jpg

Have you been phished?


Adware l.jpg

Adware

  • Adware is software that displays advertisements on your computer.

  • These are ads that inexplicably pop up on your display screen, even if you're not browsing the Internet.

  • Some companies provide "free" software in exchange for advertising on your display.

  • It's how they make their money.


Spyware l.jpg

Spyware

  • Spyware is software that sends your personal information to a third party without your permission or knowledge.

  • This can include information about Web sites you visit or something more sensitive like your user name and password.

  • Unscrupulous companies often use this data to send you unsolicited targeted advertisements.


Preventing malware l.jpg

Preventing Malware

  • New anti-virus software

  • Ad-Aware Personal

    • http://www.lavasoft.de/software/adaware

  • Spyware Exterminator

    • http://www.stompsoft.com/

  • Microsoft

    • http://www.microsoft.com/windowsxp/using/security/expert/honeycutt_spyware.mspx


Slide18 l.jpg

HELPING CHILDREN USE THE INTERNET

POSITIVELY & SAFELY

Arcadia Unified School District, March 2006


Slide19 l.jpg

THIS PRESENTATION

TAKING A BALANCED APPROACH !

Why is this issue important?

What is so positive for Children?

What are the dangers for Children?

What can you do now?

Practical resources + Questions


Slide20 l.jpg

WHAT IS THE INTERNET LIKE FOR CHILDREN?

Connects you to the world

Like bringing a city into the home or classroom

The good&The bad

Let’s make sure the good outweighs the bad!


Slide21 l.jpg

A bit about you….

How many of you have high speed internet access at home ?

What sort of things do your children like doing on the internet ?

What sort of concerns do you have about your children’s use of the internet ?


Slide22 l.jpg

PART I

IMPORTANT

WHY IS THIS


Slide23 l.jpg

Content

Contact

Commerce

PART I

1) WHAT ARE THE DANGERS ?

Whilst there are enormous benefits for children using the internet at home and at school there are potential dangers for children using the net unsupervised. These can broadly be grouped into 3 C s:

  • Threatening e-mails

  • Online bullying

  • Strangers in Chat rooms

  • Strangers posting to blogs

  • Pornography

  • Racist content

  • Inaccurate information

  • Blur betweenadvertising & content

  • Invasions of privacy & SPAM


Slide24 l.jpg

PART I

2) ADULTS + CHILDREN USE THE NET IN DIFFERENT WAYS

PARENTS Mostly e-mail and web for research

YOUNG PEOPLE

Interactive chat, IM, Music, Games,

DO YOU KNOW HOW YOUR CHILD USES THE NET?

WE NEED TO BE INVOLVED IN OUR CHILDREN’S ONLINE ACTIVITY, VALIDATE THEIR SKILLS & LEARN FROM THEM


Slide25 l.jpg

PART I

3) THE DIFFERENCE BETWEEN KNOWLEDGE + WISDOM

KNOWLEDGEMany children pick up technology quicker !

WISDOM

Understanding how to behave in a virtual world

HELP YOUR CHILDREN TO UNDERSTAND THE CONTEXT

TECHNOLOGY IS THROWING UP NEW IMPORTANT SAFETY ISSUES WHICH CHILDREN MAY NOT SEE


Slide26 l.jpg

PART I

4) SUPERVISED/UNSUPERVISED ACCESS POINTS

IN SCHOOL

Generally supervised, protected and monitored

OUT OF SCHOOL

Often no filtering, supervision or monitoring

WE NEED TO DO MORE THAN SUPERVISE- WE NEED TO HELP EDUCATE

CHALLENGE =to ensure that children are safewherever they use the internet


Slide27 l.jpg

PART II

WHAT’S SO POSITIVE


What can you do with the net l.jpg

Discover

Connect

Create

WHAT CAN YOU DO WITH THE NET?

  • Search

  • Homework

  • Projects

  • The biggest library in the world

  • E-mail

  • Newsgroups communities and clubs

  • Chat

  • Blog

  • Brings kids together

  • Web sites

  • Text, art,music, photos, video...

  • Anyone can become a publisher


Slide29 l.jpg

PART III

WHAT ARE THE DANGERS


The dangers to children l.jpg

Content

Contact

Commerce

THE DANGERS TO CHILDREN

  • Pornography

  • Racism

  • Inaccurate information

  • Threatening e-mail

  • Bullying

  • Paedophiles in chat rooms/blogs

  • Invasion of privacy

  • Blur between advertising & content


Pornography l.jpg

Promotes a demeaning view of women (& men)

Encourages false fantasies

Can be used to sexualise young children

Addictive

Easily available on the Net

PORNOGRAPHY

SMART TIP

Consider using filtering

Be careful to type in the correct web site address!


Racist hate sites l.jpg

Web an ideal medium for small extreme groups

Some pose as churches, or other “acceptable” groups

Some target children

RACIST & HATE SITES

SMART TIP

See www.adl.org for details of sites to avoid


Inaccurate content l.jpg

Spoof sites

URL mimickers eg www.microdoft.com

Historical revisionist material

Inaccurate health information

INACCURATE CONTENT

SMART TIP

Look for source, date, links & references

See www.quick.org.uk for helpful checklist


Interactive services online l.jpg

Chat –web based

Instant Messaging

Blogging

Games – MOO, MUD, MUSH etc.

Cyber sex

Contact

Interactive services online

SMART TIP

Get your kids to explain how chat, blogging & IM work!


Slide35 l.jpg

What is Instant Messaging?

  • Instant Messaging (sometimes called “IM,” “IMing,” or “Messaging” ) is the ability to:

    • easily see whether a chosen friend or co-worker is connected to the internet and, if they are,

    • exchange text messages with them.

  • Instant Messaging differs from ordinary email in that the messages are delivered immediately, making dialog much easier than with email.

Definition courtesy whatis.com


Slide36 l.jpg

Other Common IM Features

  • ChatJoin a number of your contacts to exchange messages in a private chat room.

  • File transferSend and receive computer files.

  • News headlines or alertsInstant notification of breaking news.

Source: Technology & Learning, 11/02, p.48


Slide37 l.jpg

TalkSpeak directly to your contacts

You need a sound card (standard on all computers these days) and a microphone.

E-mail notificationThe IM system flags new e-mail

Other Common IM Features

Source: Technology & Learning, 11/02, p.48


Slide38 l.jpg

Why is IM Important to Parents?

  • 74% of online teens use instant messaging. In comparison, 44% of online adults have used IM.

  • 45% of online teens use Instant Messaging each time they are online.

  • 69% of online teens use IM at least a few times each week.

Data courtesy www.pewinternet.org


Slide39 l.jpg

Why is IM REALLY Important to Parents?

  • 37% of online teens have used IM to write something that they would not have said in person.

  • 41% of online teens say they use email and instant messaging to contact teachers or classmates about schoolwork.

Data courtesy www.pewinternet.org


Safety concerns l.jpg

Safety Concerns

  • IM is used in the grooming process because its more private than public chat rooms

  • IM and Chat are closely linked products and moving from one to another can take just one click

  • The alert function means that people know when you online.


Here are a few tips to avoid potential pitfalls l.jpg

Here are a few tips to avoid potential pitfalls:

  • Choose products with parental controls

  • Each IM product asks you to fill out a profile of yourself. Be sure not to include private information such as phone number and address or school name.

  • Never click on unknown or suspicious hyperlinks.

  • Never accept files, or send them to people that you don’t know.

  • Keep IM address secret in Chatrooms


The dangers in chat l.jpg

THE DANGERS IN CHAT

  • You don’t know who people are

  • People lie about their age and other interests

  • Flattery can make kids feel important

  • Determined adults can seek abusive relationships

  • Contacts shift quickly to messaging, e mail and mobile phones

  • Chat is just a click away! E.g.


One family s story l.jpg

ONE FAMILY’S STORY..

My daughter was contacted starting in February this year by a pedophile whilst using a chat room. He quickly moved to e-mail and shortly afterwards sent her pornography, purporting to be pictures of himself. My daughter was just 12 at this time.

After grooming her for some weeks, he made telephone contact and eventually persuaded her to miss school and meet him.

In total, he met her five times and took her back to his flat where she was sexually abused…

… I have worked in the computer industry for 18 years, latterly with the Internet, and had no idea what went on in these chat rooms. Surely there is some regulatory body that can make the ISPs monitor at least the teenage chat rooms to make sure kids aren’t in danger…. Perhaps you can offer some guidance?”


The response to this case www chatdanger com l.jpg

Aimed at chat users and parents

Celebrity introduction

Cartoons and a chat safety banner in open source html

Simple non-technical language for parents

The response to this case www.chatdanger.com


Blogging asynchronous chat static web pages l.jpg

Blog is short for web log

Personal journal often open for commenting

Blogging: Asynchronous chat & static web pages

SMART TIP

Review the content of your child’s blog and

know security/access settings..


Blogging the great news l.jpg

Blogging: The Great News

  • A friendlier look and feel from message boards

  • The control given to the blog's creator.

  • Viewing blogs can be an easy way to access advice and thoughts from experts and leaders in highly-specialized areas and fields.

  • Viewing and initiating blogs can provide opportunities to connect, share resources and network within a community of people who share similar interests.

  • Blogs allow for information to be quickly posted on the Web, making them much easier to update daily.


Blogging the not so great news l.jpg

Blogging: The Not-So-Great News

  • Since most weblogs aren't edited, it's difficult to know how credible the information is.

  • Information shared in blogs may be too subjective or trivial to be meaningful in any kind of educational way.

  • Blogs may provide easy access to offensive content.

  • Young bloggers may put themselves at risk by sharing too much personal information.


Blogging some quick facts l.jpg

Blogging: Some Quick Facts

  • Every day 8,000-17,000 new blogs appear online.

  • On average a new blog is created nearly every 5.8 seconds and more than 3 blogs are updated every second.

  • The Pew Internet Project estimates that by the end of 2004 there were over 8 million U.S.-based blogs.


Blogging safely l.jpg

Blogging Safely

  • Protect your identity.

    • Avoid including personal information or anything that can identify you.

    • Strategies like using an online name rather than your real name, using an unidentifiable e-mail, and using an avatar instead of a photo can help protect your privacy.

  • Select a suitable blog host.

    • When selecting a Web site to host your blog, look for one that hosts for people with similar tastes and sensibilities.

    • Check to see if the host site provides good support.

    • There should be a FAQ section as well as an e-mail address that you can use if you have any questions or problems.


Blogging safely56 l.jpg

Blogging Safely

  • If you only want close friends and family to read your blog, find a site that offers password protection.

  • Read the privacy policy.

    • Check to see if the site has a privacy policy.

    • Read it and take note of what may happen to any information you enter on the site.

  • Be nice to people.

    • Make sure your blog contains accurate and truthful information.

    • Make sure you treat other people with respect and only write about people if you have their permission.

    • Never disclose any personal information about your friends or family.


Blogging think about it l.jpg

Blogging: Think About It

  • All the information you include as part of your blog could potentially be accessed by anyone - including your mother!

  • Be careful not to include any information that could potentially be embarrassing to you or your family and friends or haunt you later on.

  • You never know who will be reading your entries. Think of a blog as a personal journal or diary... that can be read by anyone, anywhere, anytime.


Online bullying l.jpg

Online Bullying

  • http://www.netsmartz.org/resources/reallife.htm


Links with handphones text messaging l.jpg

Mobile phones are personal & private

Kids love text messaging

You can send text from many web sites anonymously

You can have text chat

What next ?…….

Links with handphones & text messaging

SMART TIP

Encourage your kids not to give out their mobile no.


Slide60 l.jpg

Commercialism on the net

Subtle Pressure

  • Blur between much content & advertising

  • Subtle request for information (games, auctions competitions)

  • Collection of information makes net marketers dream

  • Many parents unaware of dangers

  • Eat kelloggs cereal

  • Find codes in box

  • Punch them in to get points

  • Use points to get cool stuff.

SMART TIP

Be careful about filling in online forms!


Slide61 l.jpg

INTERNET ADDICTION

  • Using the internet can be addictive

  • Signs are –

    • compulsive use – no interruptions

    • long hours

    • secretive use

  • If combined with high risk activities can be dangerous

SMART TIP

Link internet use to offline interests eg sport


In the news l.jpg

In the News…


In the news63 l.jpg

In the News…


Slide65 l.jpg

PART IV

SO WHAT SHOULD YOU DONOW


Slide66 l.jpg

SO WHAT SHOULD YOU DONOW ?

1) Get involved in your children’s online activity at home.Check you know what applications they are using, especially chat rooms and games played with others online. Ask who their “e-pals” are. Get them to teach you about how things work.

2) Support the school– Review the Acceptable Use Policy and take an active interest in what your children are doing at school.

3) Encourage internet use that builds on offline activities. It helps to keep the computer in a family room not tucked away in a child’s bedroom. Help your children to use the Internet for home work and leisure interests.

4) Use some of the tools on the computer to help you.


Slide67 l.jpg

4) TOOLS TO HELP

  • Website addresses + favorites folders

  • Browsers (history)

  • Search engines

  • E-mail accounts – reputable and supervised (hotmail)

  • Filtering tools

  • Mobile phones.


5 filtering and blocking l.jpg

5) Filtering and Blocking

  • Different types

    • Access to sites

    • Time limiting

    • Outgoing content

    • Monitoring

    • Kids search engines

  • Recognise the limitations

  • Never 100% effective

SMART TIP

See www.getnetwise.org lists over 140 tools


Slide69 l.jpg

6 ) REINFORCE THE “SMART” RULES WITH YOUR CHILDREN

SAFE – Staying safe online involves being careful and thinking about whether it is safe to give out personal information


Slide70 l.jpg

SAFE– Staying safe online involves being careful and thinking about whether it is safe to give out personal information

MEETING– Meeting up withsomeone you have contacted in cyberspace can be dangerous. Only do so with your parent’s permission and then when they can be present.


Slide71 l.jpg

SAFE – Staying safe online involves being careful and thinking about whether it is safe to give out personal information

MEETING– Meeting up with someone you have contacted in cyberspace can be dangerous. Only do so with your parent’s/carer’s permission and then when they can be present.

ACCEPT– Accepting e-mails or opening files from people you don’t know can be dangerous. – they may contain viruses or nasty messages.


Slide72 l.jpg

SAFE– Staying safe online involves being careful and thinking about whether it is safe to give out personal information

MEETING–Meeting up withsomeone you have contacted in cyberspace can be dangerous. Only do so with your parent’s/carer’s permission and then when they can be present.

ACCEPT– Accepting e-mails or opening files from people you don’t know can be dangerous. – they may contain viruses or nasty messages.

RELIABLE – Anyone can put anything on the net and remember people can lie and not be who they say they are in chat rooms.


Slide73 l.jpg

SAFE– Staying safe online involves being careful and thinking about whether it is safe to give out personal information

MEETING– Meeting up withsomeone you have contacted in cyberspace can be dangerous. Only do so with your parent’s/carer’s permission and then when they can be present.

ACCEPT– Accepting e-mails or opening files from people you don’t know can be dangerous. – they may contain viruses or nasty messages.

RELIABLE – Anyone can put anything on the net and remember people can lie and not be who they say they are in chat rooms.

TELL – Tell your parent or teacher if someone or something makes you feel uncomfortable or worried.


Slide74 l.jpg

See www.kidsmart.org.uk/smart for more info.


Slide75 l.jpg

KIDSMART LEAFLETS FOR YOUR SCHOOL AND PARENTS !

"The internet is great fun and a brilliant way to keep in contact with friends. However, it is really important that we all use the Net safely and always remember these SMART rules to stay safe online."

Ant and Dec


Slide76 l.jpg

QUESTIONS?

www.kidsmart.org.uk

www.chatdanger.com

www.ausd.net

www.childnet-int.org

Produced by Childnet International. Copyright 2003


Ausd and the internet l.jpg

AUSD and the Internet

Programs, policies, & procedures to help ensure a safe online environment for our community


Web filtering l.jpg

Web Filtering

  • Proxy server filters all requests to the Internet

    • Pornography/sex

    • Questionable Activities Including Hate

    • Malware

    • Anonymizer

    • Online Chat

  • Nothing is 100%!


Every mouse click is logged l.jpg

Every Mouse Click is Logged


E mail spam and content filtering l.jpg

E-Mail Spam and Content Filtering

  • Inbound e-mail scanned

    • Virus attachment

    • Inappropriate content

    • Spam

    • Phising

  • Nothing is 100%!


Some e mail numbers l.jpg

Some E-Mail Numbers

  • One week in AUSD

    • Total Messages entering system: 254,841

    • Blocked due to blacklist: 159,585

    • Blocked due to viral infection: 121

    • Blocked due to spam

      or inappropriate content: 24,373

    • Total Messages delivered 70,762

    • 27.76% of incoming email is accepted

    • 72.24 percent is blocked


District provided services l.jpg

District Provided Services

  • District web sites and intranet

  • Student e-mail (6-12)

  • Student web space (6-12)

  • CLASSLink (teacher web pages)

  • Blogging service

    • Teacher controlled

    • Moderated

    • Monitored


Helping students understand l.jpg

Helping Students Understand…

  • AUSD Acceptable Use Agreement & accompanying annual instruction

  • Technology standards in all grade levels addressing appropriate & safe technology use

  • Imbedded information literacy skills in content standards


Slide86 l.jpg

By learning together, taking care and supporting our children we can help our children get the benefit, avoid danger and use the internet to fully

Discover

Connect

Create


Questions l.jpg

Questions?

Be sure to visit the technology section of the AUSD web site:

www.ausd.net


  • Login