View
1.164
Download
1
Category
Preview:
DESCRIPTION
Here\'s how to protect yourself from Internet pests.
Citation preview
Keeping out of harm’s way on the Internet
Some advice and guidance from Data Doctors
Sources: • ChildNet International• Carnegie Mellon Cylab• Oklahoma State University• Data Doctors • Etc.
Internet Trends Benefits Risks
Safety Techniques for Everyone
Adware, Spyware, Malware Phishing, Pharming
Hands-on assistance
WHY IS THIS
Overview
IMPORTANT
PARENTS Mostly e-mail and web for research DO YOU KNOW
HOW YOUR CHILD USES THE
NET?
WE NEED TO BE INVOLVED IN OUR CHILDREN’S ONLINE ACTIVITY, VALIDATE THEIR SKILLS & LEARN
FROM THEM
YOUNG PEOPLE
Interactive chat, IM, Music, Games,
2) ADULTS + CHILDREN USE THE NET IN DIFFERENT WAYS
Overview
KNOWLEDGE Many children
pick up technology quicker ! HELP YOUR
CHILDREN TO UNDERSTAND THE CONTEXT
TECHNOLOGY IS THROWING UP NEW IMPORTANT SAFETY ISSUES WHICH CHILDREN MAY NOT SEE
WISDOM
Understanding how to behave
in a virtual world
3) THE DIFFERENCE BETWEEN KNOWLEDGE + WISDOM
Overview
IN SCHOOL
Generally supervised,
protected and monitored
WE NEED TO DO MORE
THAN SUPERVISE- WE NEED TO
HELP EDUCATE
CHALLENGE = to ensure that children are safe wherever they use
the internet
OUT OF SCHOOL
Often no filtering, supervision or
monitoring
4) SUPERVISED/UNSUPERVISED ACCESS POINTS
Overview
Benefits
WHAT’S SO POSITIVE
WHAT CAN YOU DO WITH THE NET?
Discover Connect Create
• Search
• Homework
• Projects
The biggest library in the world
• Newsgroups communities and clubs
• Chat
Brings kids together at local call rates
• Web sites
• Text, art, music,
photos, video...
Anyone can become a publisher
WHAT WE DID WITH THE PUPILS THIS AFTERNOON
Three examples which shows the power of the Net for children to…Discover
Connect
Create
Risks
WHAT ARE THE DANGERS
THE DANGERS TO CHILDREN
Content Contact Commerce
• Pornography
• Racism
• Inaccurate information
• Threatening
• Pedophiles in chat
rooms
• Invasion of privacy
• Blur between advertising &
content
PORNOGRAPHY Promotes a demeaning
view of women (& men) Encourages false
fantasies Can be used to sexualise
young children Addictive Easily available on the Net
SMART TIPConsider using filtering
Be careful to type in the correct web site address!
RACIST & HATE SITES
Web an ideal medium for small extreme groups
Some pose as churches, or other “acceptable” groups
Some target children
See www.adl.org for details of sites to avoidSMART TIP
INACCURATE CONTENT
Spoof sites URL mimickers eg
www.microdoft.com Historical revisionist
material Inaccurate health
information
Look for source, date, links & referencesSee www.quick.org.uk for helpful checklist
SMART TIP
Interactive services online
Social – MySpace, etc. Chat –web based Instant Messaging Games – MOO, MUD,
MUSH etc. Cyber sex
Contact
Get your kids to explain how chat and IM work!SMART TIP
Internet Security Trends Benefits Risks
Safety Techniques for Everyone Adware, Spyware, Malware Phishing, Pharming
Internet Safety for Parents Social Networking Filters, etc. Non-technical Q&A Hands-on assistance
Different Types of Spyware
Spyware Adware Embedded Programs Trojan Horse Browser Hijackers Dialers Malware
Why do people make Spyware?
Profit A challenge Malice Boredom Business
How do I know if I’ve got Spyware?
Computer is running slower than normal Popups (on or off the internet) New toolbars Home page changes Search results look different Error messages when accessing the web
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
How do I prevent Spyware? Be conscious of what you are clicking
on/downloading Some pop-ups have what appears to be a close
button, but will actually try to install spyware when you click on it. Always look for the topmost right red X.
Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time.
The Least Wanted List
Weatherbug (GAIN or Claria)Hotbar180 Search AssistantMyWebSearchPopular ScreensaversComet CursorsA Better Internet (Aurora)Kazaa / MorpheusGameSpy ArcadeWhenUSaveNew.NetStarware ToolbarMySearch
Begin2Search180SolutionsZangoCoolWebSearchDyFuCABonzaiBuddyBargainBuddyDashbarGatorWeatherScopeBest Offers NetworkPrecision TimeFunWeb
How do I get rid of Spyware?Use a legitimate spyware removal program
We suggest E-Trust Anti-Virus and Pest Patrol by Computer Associates
Free programs are available for download, however Not generally as proactive Potentially reduced protection MUCH better than no protection
Phishing Most commonly an Email stating your account
Information needs updating Watch for URL’s that are numeric or different
from the link you clicked on Best thing to do is to type in the URL and
check your account directly without following any links in the Email
Many legitimate emails no longer contain a link (Paypal)
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
How secure do you need to be?
Be Prudent not Paranoid Look for secure sites (https://...) Did you initiate the action? Why is this free? Is the source trustworthy? When in doubt Google it (to find the real
site)
Safer Alternatives
Download.com – All programs are adware/spyware free
Freesaver.com – Screensavers from this site are safe DO NOT click on ads
Cleansoftware.org DataDoctors.com Etc.
What Can YOU Do?What Can YOU Do?
Countdown: Top Ten Tips to secure your cyberspace
Reference: National Cybersecurity Alliance http://www.staysafeonline.info/home-tips.html
Top Ten Count Down
10. Check your computer security regularly
Computers have different security configurations web browser security settings file sharing
Some settings get changed with time Ex: cookies, pop-up windows
9. Disconnect from the Internet when not in use Limit the time your computer is exposed to getting
hacked hackers are always looking for target machines
Pro: no risks when you are disconnected Con: may loose some functionalities when offline
Voice over IP Instant Messenger other services
8. Don’t share access to your computer with strangers
Your OS may allow others to access your files The ability to share files can be used to infect your computer File sharing risks:
get viruses have personal data stolen
7. Back up regularly Backup your system as “often” as how
“much” data you are willing to lose work done last month? last week? today?
Use external devices Make sure you are able to restore data from
your backup Have a start-up disk handy in case your
computer system files get damaged
6. Use smart passwords
Passwords give access to your machine and information people may guess the password lots of automatic systems discover passwords in few seconds
“Golden rule” for how to create a good password 8 characters minimum be as meaningless as possible use uppercase & lowercase letters, symbols and numbers. e.g., xk2&LP97 use a “phrase” to remember: “MyWife1sAg00dCook”
Use multiple passwords Do not share passwords with others Change passwords regularly
5. Download and install security patches for your computer Sometimes bugs are discovered in a program
that may allow a hacker to attack Patches are solutions to those breaches Check your vendors’ websites for updates Ensure you are getting the patch from a
trustworthy source
Firewalls create a protective “wall” between your computer system and the outside world
they determine which ports the machine is allowed to receive your data through
Available at most computer stores and in some operating systems
4. Protect your computer:use firewalls
3. Use care when reading email and downloading files
Emails are the principal sources of computer virus infections
Be sure you know the source and the reason for receiving an attachment before opening it Many viruses spread because they originate from a
familiar email address Be wary of URLs in email Use care when downloading files:
Do not run/install program with unknown origin Do not download software unless you know it was
written by a person or a company you trust Do not give permission to third parties to download
software on your machine
2. Use antivirus/Spyware software, and keep it up to date
Protects your computer against known viruses/spyware new threats emerge daily
Update your software tools regularly check the web site of your anti-virus
software company to see some sample descriptions of viruses and to get regular updates for your software
Use Windows automatic updates
1. Be aware and a promoterof proper cybersecurity practices
Learn cyber security practices: how to update antivirus/spyware
tools how to download security
patches how to backup your system how to create a proper password Try a site-advisor tool (e.g
McAfee) Educate your family members,
colleagues, friends
Top Ten Tips Summary
Check your security settings on a regular basis Disconnect from the Internet when not in use Don’t share access to your computer Backup your data regularly Use smart passwords Download and install security patches for your computer Use a firewall Open email attachments only from known people and when
expected, and download files only from trusted sites Use antivirus software and keep it up to date Become aware and share awareness
Recommended