the importance of internet safety security and education l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Dr. Joanna F. DeFranco School of Graduate & Professional Studies Engineering Division Penn State University jfd104@p PowerPoint Presentation
Download Presentation
Dr. Joanna F. DeFranco School of Graduate & Professional Studies Engineering Division Penn State University jfd104@p

Loading in 2 Seconds...

play fullscreen
1 / 46

Dr. Joanna F. DeFranco School of Graduate & Professional Studies Engineering Division Penn State University jfd104@p - PowerPoint PPT Presentation


  • 191 Views
  • Uploaded on

The Importance of Internet Safety, Security, and Education. Dr. Joanna F. DeFranco School of Graduate & Professional Studies Engineering Division Penn State University jfd104@psu.edu. Objectives of this presentation.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Dr. Joanna F. DeFranco School of Graduate & Professional Studies Engineering Division Penn State University jfd104@p' - paul2


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
objectives of this presentation
Objectives of this presentation
  • Bring awareness to the issues that affect our kids, our future workforce, and us:
    • Social engineering
    • Predators
    • Mobile phone Safety
    • Viruses
    • Privacy

PCEA - Cooperative Education Conference - 2010

native or immigrant
Native or Immigrant?
  • Native: people who grew up with the Internet. Approximately people who are 30 and younger
  • Immigrant: people over the age of 30 who did not grow up with the Internet.

Challenge – the Immigrants are raising the natives………

Term coined by Marc Prensky

PCEA - Cooperative Education Conference - 2010

some positive impacts of the internet
Some Positive Impacts of the Internet
  • Education
  • Communication
  • Business
  • Socializing

PCEA - Cooperative Education Conference - 2010

why is it suddenly ok to talk to strangers
Why is it suddenly OK to talk to strangers?
  • We tell our kids not to talk to stranger but yet our kids are on the Internet doing just that.
  • Facebook has 500 million users
  • 72 million are ages 0-17
  • 54% of 13-14 year olds have Facebook pages
  • 15-17 year old Internet users spend 19.9 hours a week online

PCEA - Cooperative Education Conference - 2010

burglars social networks
Burglars Social Networks

18% of all social network users post upcoming travel plans

*Dear Mr. Myers: In August, I innocently placed a note on my Facebook page that said our family would be taking an out-of-town vacation over Labor Day weekend.

When we returned we found that thieves had taken thousands of dollars in jewelry and electronics from our house.

*Bucks County Courier Times, 9/25/10

PCEA - Cooperative Education Conference - 2010

if you don t want your information to show up everywhere don t over share
“If you don’t want your information to show up everywhere – don’t over share”

PCEA - Cooperative Education Conference - 2010

geotags a picture is not worth revealing your address
Geotags: A picture is NOT worth revealing your address!!!
  • Photos taken from your smartphone will reveal your location
  • You don’t even have to tell the criminal where you live – just post your picture on the web in front of your house. That will give them an exact latitude and longitude
  • Solution – TURN OFF GPS ON YOUR PHONE when taking photos

“Geotags in web photos reveal information about you”

PCEA - Cooperative Education Conference - 2010

lawyers social networks
Lawyers Social Networks
  • Facebook is turning into the divorce layers’ secret weapon.
    • 1600 divorce lawyers from around the country say Facebook was the primary source of evidence followed by MySpace and Twitter.
  • A printout of disparaging Facebook comments is powerful in a court.
  • Photos that are posted by your “friends”

PCEA - Cooperative Education Conference - 2010

why do people do this
Why do people do this??
  • Internet is very social place – but we access it in seclusion
  • Some treat the net as a personal diary and sometimes a confessional.
  • Some (especially kids) think the dangers “won’t happen to them”.

“The Internet should be treated more like a shopping mall or library”– WSJ 8/7/2010

PCEA - Cooperative Education Conference - 2010

do we have a right to privacy
Do we have a right to privacy?

There is a large population of people who either forgot or don’t find privacy important

9th amendment of the constitution:

“The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.”

1st: Freedom of Religion, Press, Expression

4th: Search and Seizure (need warrant)

5th: …nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use ……

PCEA - Cooperative Education Conference - 2010

slide12

http://www.privacyrights.org/print/fs/fs1-surv.htm

*Be Aware *Be Assertive *Be an Advocate

Don’t send personal information through chat, email, instant messages, forums, online profile

Wipe your computer’s hard drive before your donate, sell or trash it

Protect your SS#

Be careful of what you say on cordless or mobile phones

Read the fine print

PCEA - Cooperative Education Conference - 2010

jobs there facebook page may be more important than their resume
Jobs - There Facebook page may be more important than their resume!!
  • You say: “Be careful what you post because a potential employer may look you up.”

“Whatever, I’ll just delete it later…..”

recovering deleted information
Recovering deleted information
  • File creation
    • OS finds free space not yet written to, write data, saves pointer to that file in a database.
  • File deletion
    • OS eliminates the pointers to that file’s location on the hard drive in the database.
    • The space that was used for the file becomes “unallocated”,

PCEA - Cooperative Education Conference - 2010

social engineering
Social Engineering
  • Non-technical intrusion that relies on human interaction and often involves tricking other people into breaking normal security procedures.
  • Manipulate people into divulging confidential information

PCEA - Cooperative Education Conference - 2010

social engineering16
Social Engineering
  • by phone
  • Online Social Engineering
  • Reverse Social Engineering
  • USB Drives

PCEA - Cooperative Education Conference - 2010

phishing example
Phishing example

From "Webmail Helpdesk" <itshelps@live.com>

"Webmail Helpdesk" <itshelps@live.com>⊕

Attn: User,  

This message is from ITS message center to all account owners. We are currently upgrading our email data base. We are deleting all unused account to create more space for new accounts.

We are currently performing maintenance for our Digital Webmail. We intend upgrading our Digital Webmail Security Server for better online services.

CONFIRM YOUR ACCOUNT DETAILS

Userid:

Password

Date of Birth:

Warning!!! Any account owner that refuses to update his or her account within Three days of this update notification will loose his or her account permanently and this procedure is attributed to a routine webmail softwareupdate.

Thank you for using our webmail!ITS Support TeamWarning Code :IT67565434

PCEA - Cooperative Education Conference - 2010

example reverse social engineering example fakeav
EXAMPLE: Reverse Social Engineering Example: FakeAV
  • AKA Fake Antivirus, Rogue Antivirus, ScareWare
  • From 1000 – 500,000 different variants
  • Sent directly to the victim as an attachment or as a link in a spam message.
  • Another form has been observed to deliver FakeAV, such as instant messaging applications including Google Talk.10

PCEA - Cooperative Education Conference - 2010

social engineering19
Social engineering
  • Takes advantage of trust relationships formed on social networking sites
    • Steal personal data that will make them $
    • Convince you to click on something that is basically a virus.

PCEA - Cooperative Education Conference - 2010

online predators 3 rd priority of the fbi
Online Predators 3rd priority of the FBI
  • Counterterrorism (international, domestic, weapons of mass destruction
  • Counterintelligence (espionage)
  • Cyber Crime
    • Computer Intrusions
    • Online predators
    • Piracy/intellectual property theft
    • Internet fraud

4. Public Corruption (government fraud, election crimes, foreign corrupt practices

5. Civil Rights (hate crime, human trafficking…..)

PCEA - Cooperative Education Conference - 2010

is your child the target of a predator
Is your child the target of a predator?
  • Look for signals
    • Large amounts of time online
    • Child receives phone calls from people you don’t know
    • Child turns computer monitor off when you come into the room.
    • Child becomes withdrawn from the family
    • Receiving gifts through the mail

PCEA - Cooperative Education Conference - 2010

suggestions from the fbi
Suggestions from the FBI
  • Keep computer in a common room
  • Communicate with your kids about the dangers
  • Maintain access to your child’s account and randomly check his or her email

“TRUST BUT VERIFY”

PCEA - Cooperative Education Conference - 2010

new generation of mobile phones
New generation of Mobile phones
  • Use of 3G phones has increased illicit activities.

PCEA - Cooperative Education Conference - 2010

slide25

* Philadelphia Inquirer, 7-22-2010

PCEA - Cooperative Education Conference - 2010

sexting
Sexting
  • Teens don’t realize the ramifications:
    • Send to one person – that person sends to friends – those friends send to friends – becomes viral.
    • Once you send it out – you can’t take it back.
    • Affect future careers (it won’t happen to them)

PCEA - Cooperative Education Conference - 2010

what can parents do
What can parents do?
  • Check your child’s mobile phone.
    • Look at picture sent and received.
  • If your teen acts overly possessive of their phone – don’t back off. Find out what they are doing!!
  • TALK to your teen about the dangers of sexting and the potential legal consequences.

PCEA - Cooperative Education Conference - 2010

texting while driving
Texting while driving
  • Laws are not enough
    • People can put the phone in there lap and text
  • Once the accident occurs the police will know
  • Technology is already in the market
    • iZUP
    • DriveAssist for Teens
    • ZoomSafer

“INSIDE MOBILE: Using Mobile Technology to Prevent Texting While Driving” March, 2010

PCEA - Cooperative Education Conference - 2010

viruses hackers
Viruses/Hackers

Skill level of hacker

Sophistication of viruses

PCEA - Cooperative Education Conference - 2010

avoiding viruses
Avoiding viruses
  • Practice careful Web browsing habits
    • Don’t be so quick to click
    • Don’t click on pop-up windows
  • Be careful of scams
    • Especially coming through email – “Phishing”
    • Avoid clicking on hyperlinks in e-mail messages
  • Be careful when downloading/installing applications
    • Facebook (“FACEBOOK in PRIVACY BREACH” WSJ 10/18/2010)
    • Mobile phones

PCEA - Cooperative Education Conference - 2010

phishing example31
Phishing Example

From "C. Y. Ling"<cyling@citicbank.com> ⊕

Subject Partnership

Date Sun, Oct 17, 2010 10:06 PM

Good day, I am Mr. C.Y. Ling, alternate CEO of the operations of CITIC Bank International, China. I have a proposal for you in the tune of One Hundred & Five Million EUR, after successful transfer, we shall share in the ratio of forty for you and sixty for me. Please reply for specifics. Yours, Mr. C.Y. Ling.

PCEA - Cooperative Education Conference - 2010

slide32

From"Disc Super Store"<orderconfirmation@superstore.com>⊕

SubjectiPhone Order Confirmation

Date Thu, Oct 14, 2010 11:41 PM

Hello,

Your credit card has been successfully charged. Please click on the link below and open it to view a copy of your receipt:

View The Receipt

Thank you for buying the new iPhone 4, we shall send you a shipping confirmation e-mail immediately your order has shipped out.

Sales Team,

Disc Super Online Store

PCEA - Cooperative Education Conference - 2010

on line banking
On-line Banking
  • 80% US households have come to do their banking over the Internet
  • Surprisingly many customers believe online banking is every bit as safe as branch banking
  • 2009 – 4,295 malicious software apps
  • 2010 – 65,098 malicious software apps
  • 2009 - 85% of big banks incurred losses stemming from cyber-attacks

PCEA - Cooperative Education Conference - 2010

botnets
Botnets
  • Definition: multiple computers infected with remote-controlled software that allows a single hacker to run automated programs on the botnet behind the users’ back.
  • “robotnetworks”
    • Malware that makes your computer a robot
    • Perpetuates phishing scams

*”Cyber-Threat Proliferation Today’s Truly Pervasive Global Epidemic” , Tom Kellermann, Security

PCEA - Cooperative Education Conference - 2010

on line banking36
On-Line Banking

“Banks seek HELP to stop online thieves”

HOW?

“they urge CUSTOMERS to be vigilant as threats rise”

*USA TODAY – Friday July 30, 2010

PCEA - Cooperative Education Conference - 2010

hackers steal millions from british bank accounts 9 29 2010
“Hackers Steal millions from British Bank Accounts” 9/29/2010
  • Police arrested 19 people over the fraud
  • Virus infected computers stealing passwords and other sensitive details from the CUSTOMERS.
  • Then they siphon money from the accounts.
  • Customers need to
    • Update their security systems/set firewalls
    • Look for unusual or different log on experience

PCEA - Cooperative Education Conference - 2010

what is a firewall
What is a firewall?
  • A combination hardware and software intended to prevent unauthorized access to a company’s internal computer resources of hardware and software
how does this happen
How does this happen?
  • They look for security holes in a web browser
    • Online banking systems are at least one full generation behind the current techniques employed by cyber crooks.
  • News Flash: They don’t target big banks – they go after mid sized companies, and YOU!
    • Zeus virus carried in an email
    • Software installed
    • Captures passwords, account numbers and other data used to log into online bank accounts
  • ** STOLE $70 million ->
what to do
What to do:

“ABA (American Bankers Association) is now asking customers to “partner” with banks to keep cyber-robbers in check”

  • Monitor your own accounts for unauthorized transactions – on a continuous (daily) basis.
  • Check your contact information often
  • Protect your password information.
  • Don’t open emails from people you don’t know – if you open it – don’t click on any attachments or web links.

PCEA - Cooperative Education Conference - 2010

cybercrooks use web apps to infiltrate smartphones usa today 8 3 2010
“Cybercrooks use Web apps to infiltrate smartphones”-USA Today 8/3/2010
  • Smartphone shipments topped 54 million in the first 3 months this year (57% jump in one year)
  • Hackers took notice
  • Virus for Droid will harvest phone numbers and data that can be used to disclose your location.
  • There were 80 infected Droid web apps discovered last week

PCEA - Cooperative Education Conference - 2010

smartphone
Smartphone
  • Smartphone apps harvest, spread personal information

PCEA - Cooperative Education Conference - 2010

take a ways
“Take A Ways”
  • Technology is great taken with a big dose of caution.
  • The best way to protect your children is to teach them to protect themselves.
  • Lets teach our young adults the reasons why we need to be paranoid while using technology.
    • Job applications
    • Privacy
    • Identity Theft
    • Banking
    • Thieves
    • http://www.Ic3.gov

PCEA - Cooperative Education Conference - 2010

questions
Questions?

PCEA - Cooperative Education Conference - 2010

references
References
  • Plagiarism – Canelli, R., “Internet makes cheating easier”, Bucks County Courier Times August 22, 2010
  • Sexting – Steinberg, S., “Sexting surges nationwide, and it’s not just teens doing it”, Philadelphia Inquirer, July 22, 2010
  • Facebook – Schroeder, Laurie Mason, “Facebook turning into divorce lawyers’ secret weapon”, Courier Times, August 15, 2010.
  • http://www.netsmartz.org/safety/risks.htm
  • Lawyers.com “Sexting: Pornography or High Tech Flirting?”

PCEA - Cooperative Education Conference - 2010

references continued
References continued

6.http://federalcriminaldefenseinvestigator.blogspot.com/2010/08/geotags-in-web-photos-reveal-secrets.html (retrieved 10/12/2010)

7. “Popularity of social networking sites leading to more home burglaries” Bucks County Courier Times 9/25/2010

8. “The Great Privacy Debate” , The wall street journal August 7th 2010

PCEA - Cooperative Education Conference - 2010