1 / 28

INTERNET SAFETY

INTERNET SAFETY. Brian Blaszak Erie 1 BOCES bblaszak@e1b.org 821-7241. Course Overview. Schools E-mail Precautions Kids vs. Adults Messaging Your Child/Student Internet Predators Internet Sources. Schools. I-Safe Program www.isafe.org

nora
Download Presentation

INTERNET SAFETY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTERNET SAFETY Brian Blaszak Erie 1 BOCES bblaszak@e1b.org 821-7241

  2. Course Overview • Schools • E-mail • Precautions • Kids vs. Adults • Messaging • Your Child/Student • Internet Predators • Internet Sources

  3. Schools • I-Safe Program • www.isafe.org • Overview: is the worldwide leader in the Internet safety education. Founded in 1998 and endorsed by the U.S. Congress, i-SAFE is a non-profit foundation dedicated to protecting the online experiences of youth everywhere. i-SAFE incorporates classroom curriculum with dynamic community outreach to empower students, teachers, parents, law enforcement, and concerned adults to make the Internet a safer place. Please join us today in the fight to safeguard our children’s online experience.

  4. Schools • School Filters • For the most part, schools are a safe place for kids to explore the Internet. • WHY? Supervision and Filters block most content • Problems: Too many websites and natural change • Kids ALWAYS have or try to find a way around it!

  5. Schools • RESEARCH Projects! • Teachers need to take extra steps to look at the websites they are giving students for projects…don’t just let them go to Google and go wild… • Find out who is running the website: • http://www.easywhois.com • Always do some of the research yourself • Typo Squatting (whitehouse.com vs. .gov)

  6. Schools • Plagiarism: “I only took some of it…” • “Google it” (If it is not in the first 10 pages of Google, they may not have plagiarized). • Helpful websites: Some of these sites are pay sites: • http://www.pdkintl.org/kappan/k0404web.htm

  7. Schools • Popular Websites for students you may not have known about: • www.ratemyteacher.com • www.myspace.com • www.facebook.com (need HS/College e-mail) • www.wikipedia.com • http://www.urbandictionary.com/

  8. E-mail • Write down your personal e-mail address on a scrap piece of paper • What does your e-mail address reveal about you? • TMI…Too Much Information! (In some cases) • Examples from I-Safe: • LilGrl41390 • Footballstar#5 • Syracuse_babe

  9. Policing Your Computers • Computer Location: Family Room, Living Room, etc • Know the “ins” and “outs” of the computer • History of Internet Activity • “Cookies” • Awareness of programs on the computer • Take time to explore the Internet and see what is out there • Key Logger Program (records the typing on the computer)

  10. Pay Bills Book vacations Shop Directions Sports E-mail family and friends Information Chat Blogging My Space Gambling Videos and Music Porn Sports Trouble: Violent and Delinquency Kids Vs. Adults: Adults are the “Tech Immigrants” Adults Kids

  11. Precautions • Be Real…talk to your kids and students about the real dangers out there • Explore the Internet together • Top Internet Searches • Set time limits • Computer Locations should be in sight at home • Set passwords to your computer

  12. Instant Messaging • Popular programs: AOL, MSN, Yahoo, Cell • Check out the “Buddy Lists” • Find the Print option • If your child/student is being harassed LEARN THE TEXT LANGAUGE!

  13. LOL- Laugh out loud LMAO- Laugh my ass off BAG- Bust a Gut BB4N- Bye-Bye for Now BRB- Be Right Back DIKU- Do I Know You? CTN- Can’t Talk Now P911- Parent in room: Watch language PAL- Parents are listening 9- someone is looking over my shoulder 99- person has left the room Text Acronyms Need more? http://www.netlingo.com/emailsh.cfm

  14. INTERNET PREDATORS • DATELINE NBC: • Ran a series of 6 stories called “To Catch a Predator” • 1st: no one was arrested, just an expose in the Washington DC area • 2nd: move to a different state (California) • 3rd: 50 men were arrested in this sting • Dateline: Predators • http://www.msnbc.msn.com/id/10912603/ remus.rutgers.edu

  15. INTERNET PREDATORS • Other articles of Internet Safety: • WGRZ: What is your child doing? • TMI: Article from DATELINE on account info • My Space arrest from prank • My Space invader: teens are not as safe as they think • Perverted Justice (mentioned in the DATELINE video-Wikipedia article)

  16. Internet Predators • How hard is for them to find their prey? • EASY! How can they do it? • MYSPACE.COM • CHATROOMS • BLOGS • Let’s Explore how easy it is to find out about someone on My Space

  17. Is your child in danger? • Google their name and see what comes up • Create a fake account on My Space or a real account with no information so you can explore the site • Go to the Search feature in My Space and type in their name It is a fine line between being nosey and protecting your children and students!

  18. Ways of Protection • Monitor your child’s Internet activity • Change their screen names • Take your address and phone numbers off any local phone directory • Sex offender website (see where registered sex offenders are in your neighborhood) • http://www.familywatchdog.us/

  19. Malicious Code • A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity; some viruses cause only mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.  People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mailswith viruses as attachments in the e-mail. http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

  20. Malicious Code • A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.  http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

  21. Malicious Code • A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

  22. Malicious Code • The first steps to protecting your computer are to ensure your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you should have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan Horses. Additionally you want to make sure your anti-virus program has the ability to scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from even reaching your computer. If this isn't enough protection, then you may want to consider installing a firewall as well. http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

  23. Malicious Code • A firewall is a system which prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic. For individual home users, the most popular firewall choice is a software firewall.  A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network. http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp

  24. Dear valued customer, We recently updated our accounts and noticed that your account information appears to have old information according to our records. Please click on the link below and type in your account information so we can have updated records of your account. http://www.soyouwanna.com/site/syws/marathon/marathon.html Thank you, HSBC Bank

  25. PHISHING • The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless he clicked on the provided link and updated the credit card information that the genuine eBay already had. Because it is relatively simple to make a Web site look like a legitimate organizations site by mimicking the HTMLcode, the scam counted on people being tricked into thinking they were actually being contacted by eBay and were subsequently going to eBay’s site to update their account information.

  26. Helpful Internet Resources • www.isafe.org • www.netsmartz.org • www.chatdanger.com • www.cybertipline.com • www.internetfiltereview.com

  27. Questions • Concerns? • Questions? • Comments?

  28. BLOG Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual. Typically updated daily, blogs often reflect the personality of the author. http://www.webopedia.com/

More Related