1 / 53

Nancy A. George Cooperating School Districts

Internet Safety for Everyone. Nancy A. George Cooperating School Districts. Cyber Security. Cyber Security. Spam Identity Theft Malicious Code Steganography. Cyber Security. Spam Unsolicited email sent to a large number of addresses. May contain: Inappropriate graphic images Viruses

Download Presentation

Nancy A. George Cooperating School Districts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Safety for Everyone Nancy A. George Cooperating School Districts

  2. Cyber Security

  3. Cyber Security • Spam • Identity Theft • Malicious Code • Steganography

  4. Cyber Security Spam • Unsolicited email sent to a large number of addresses. • May contain: • Inappropriate graphic images • Viruses • Fraudulent information or requests for information

  5. Cyber Security Can-Spam Act Requires spammer to follow certain guidelines including honoring unsubscribe requests, but does not ban spam

  6. Cyber Security Reduce the amount of spam you receive: • Choose a non-obvious email address. • Limit where you enter your email address • Use spam-blocking software. • Don’t open spam email (or anything that looks suspicious. • Don’t respond to spam email. • Report spam to your ISP and the sender’s ISP.

  7. Cyber Security Identity Theft Theft of person identifying information • Name • Address • Credit Card Number • Social Security Number and use of that data to open new charge accounts, order merchandise, or borrow money.

  8. Cyber Security Phishing Phishing attacks use spoofed emails and fraudulent websites which imitate legitimate companies to entice people to share passwords or credit card numbers.

  9. Cyber Security Protect yourself against Phishing: • Be wary of any email asking for personal information. • Avoid hyperlinks that may take you to a fraudulent site. • If you have been phished, report it to your local police and financial institutions. • Save all correspondence that may serve as evidence.

  10. Cyber Security Malicious Code • Virus • A small program written to alter the way a computer operates without the permission or knowledge of the user. • Worm • A program that replicates itself from system to system without the use of the host file. • Trojan Horse • Imposters/files that claim to be something desirable, but in fact are malicious

  11. Cyber Security Steganography Hiding a message within an image, audio or video file. Used as an alternative to encryption because unlike encrypted messages, it is undetectable.

  12. Cyber Security Some people believe that terrorists, corporate raiders, and drug traffickers use steganography to commit crimes and plan attacks. To avoid playing a role in the transmission of illegal messages, do not forward email to people you do not know.

  13. The need for Internet safety from the student perspective….

  14. Internet Safety Issues During a 2003-2004 I-SAFE survey of 20,000 middle school students, it was reported that while online: • 10% were asked to meet someone face-to-face. • 16% received mean or threatening messages while on the Internet. • 40% visited an inappropriate place on the Internet.

  15. Internet Safety Issues Students do not always have the skills to respond appropriately and responsibly. In the same survey: • 24% saw nothing wrong with chatting with a stranger on the Internet and 39% trusted those with whom they chatted. • 10% met someone from the Internet face-to-face. 4% more than once. • 52% said hurtful or angry things to another person online.

  16. How Do We Use the Internet? Playground Accomplish Tasks Entertainment Research Blog Pay bills Online games Book travel Chat rooms Shop Download music Instant Message News gathering Kids & Teens Adults

  17. What Guidelines or LawsAre in Place in Our Physical Communities to Protect Youth? • Stranger Danger • Don’t believe everything you see. • Movie, video game, television ratings • Tobacco and alcohol restrictions • Societal parameters

  18. What Guidelines Are in Place for the Virtual Community?

  19. Internet Safety Concepts • Inappropriate Material • Cyber Bullying • Personal Safety • Predator Identification

  20. What types of online material do you believe are inappropriate for kids and teens?

  21. Cyber Community Citizenship Inappropriate material appears in: • Advertisements • Key Word Searches • Typo squatting • Spam email

  22. Personal Safety • Screen Names • Profiles • Chat rooms • Instant messaging • Online conversations • FBI Cyber Safety Tips

  23. Personal Safety During a 2003-2004 i-SAFE survey of 20,000 middle school students, it was reported that while online: • 55% joined at least one website requesting personal information. • 25% saw nothing wrong with chatting with a stranger online. • 10% believed it was OK to post their picture online.

  24. What if a stranger from the Internet followed one of your students home from school one day…

  25. Personal Safety Screen Name A name used when communicating with others online.

  26. Clip art licensed from the Clip Art Gallery on DiscoverySchool.com Personal Safety LiLGrl41390 syracusebabe footballstar#5 jesse2Hot4ya

  27. Personal Safety Profile Online description of the user. They are searchable and can be viewed by anyone.

  28. Personal Safety Chat Room A website, part of a website, or part of an online service that provides a venue for communities of users with a common interest to communicate in real time.

  29. Personal Safety Instant Messaging The ability to exchange text messages with another Internet user in real time.

  30. Clip art licensed from the Clip Art Gallery on DiscoverySchool.com Personal Safety LOL BRB BWL DIKU DOM IPN P CTN P911 PAL 9 999

  31. Clip art licensed from the Clip Art Gallery on DiscoverySchool.com Personal Safety LOL Laugh out loud BRB Be right back BWL Bursting with laughter DIKU Do I know you? DOM Dirty old man IPN I’m posting naked PM Private message CTN Can’t talk now P911 Parent in room watch your language PAL Parents are listening 9 Someone is looking over my shoulder 999 The person has left the room

  32. Personal Safety 60% of online teens have received email or instant messages from a perfect stranger. 63% of those have responded.

  33. Clip art licensed from the Clip Art Gallery on DiscoverySchool.com Personal Safety Analyze a chat dialog.

  34. Personal Safety A/S/L?

  35. Personal Safety Review Personal Safety Tips: • Never reveal identifying information in your screen name, profile, or conversations to people you don’t know. • Identifying information includes a name, address, phone number, and school name. • Never arrange a face-to-face meeting with a stranger from the Internet, without first discussing with your parents.

  36. Cyber Predators

  37. Cyber Predators During a 2003-2004 i-SAFE survey of 20,000 middle school students, it was reported that while online: • 39% trusted those with whom they chatted. • 19% were upset by something a stranger said. • 10% were asked by someone they met on the Internet to meet face-to-face. • 10% met a new person from the Internet face-to-face.

  38. Cyber Predators Common Characteristics of Predators • Computer Savvy • College Graduates • Successful Careers • Male

  39. Cyber Predators Communication Tools • Chat Rooms • Private Chats • Instant Messaging • Email • Phone

More Related