17
Stuart Bannerman

Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

Embed Size (px)

Citation preview

Page 1: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

Stuart Bannerman

Page 2: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

Child SafetyCyberbullying

cyberbullying information

Predatory adultsChild Exploitation and Online Protection Centre

Offensive material

Advice on protecting children from inappropriate material

Page 3: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

MalwareVirusesWormsTrojansRootkitsSpywareAdwareCrimeware

Page 4: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

VirusesComputer programs that can reproduce

themselves and infect computersAttach themselves to existing programsHave to be activated by computer userCause ‘unexpected, usually negative, events’

Page 5: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

WormsReproduce themselves automaticallyNo user activation requiredCan disable services on the computer

Page 6: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

TrojansNon-replicatingLooks like something usefulOnce installed, allows others access to your

computer

Page 7: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

RootkitsProgram designed to conceal malware

Page 8: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

SpywareCollects information about userCan change browser home pageCan disable services

Page 9: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

AdwareSoftware that displays adverts, with or

without consent

Page 10: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

Software that displays adverts, with or without consentWell-known adware programs/programs distributed with adware

180SearchAssistant AOL Instant Messenger Ask.com Toolbar (Toolbar is automatically installed with many

different programs, even after you uncheck Ask.com during the installation process.)

Bearshare Bonzi Buddy ClipGenie Comet Cursor Crazy Girls Cydoor Daemon Tools - (Software comes bundled with the "Daemon Tools

WhenUSave Toolbar" but can be unchecked during installation)

DivX DollarRevenue eBike Insurance eCar Insurance eVan Insurance Ebates MoneyMaker ErrorSafe Evernote FaceGame.exe Foxit PDF Reader FlashGet Gamespy Gamevance

Gator Gool.exe Kazaa Kiwee Toolbar Messenger Plus! Live - (Software comes bundled with adware, but

can be unchecked during installation) MessengerSkinner Mirar Toolbar Oemji Toolbar PornDigger! Smiley Central Spotify - (A subscription can be paid to remove ads.) Tribal Fusion Viewpoint Media Player VirusProtectPro Vuze WeatherBug WhenU WinAce (now with MeMedia AdVantage) Windows Live Messenger Winzix Yahoo! Messenger Zango Zango Toolbar Zwinky

Page 11: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

CrimewareDesigned to steal identityThen takes funds or carries out unauthorised

transactionsNorton has a specific tool to detect it

Page 12: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

Card fraudAdvice on avoiding card fraud

Page 13: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

PhishingMasquerading as financial institution in order

to obtain account details

Page 14: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material
Page 15: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

Consumer affairsCitizens Advice produce guides to your rights

when buying on-line

Citizens Advice factsheet on buying over the web

Citizens Advice factsheet on buying on auction sites

Page 16: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material

SpamSpam is unsolicited (junk) emailIt is usually directed into a special folder

Page 17: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material