15
Group 4: Jennelyn Castro Laura Cruz Darlene David Lorie Montague

Cyber Predator Presentation

Embed Size (px)

DESCRIPTION

Powerpoint presentation on cyber predators.

Citation preview

Page 1: Cyber Predator Presentation

Group 4:Jennelyn Castro

Laura CruzDarlene David

Lorie Montague

Page 2: Cyber Predator Presentation

What is a Cyber Predator? Internet user who

exploits vulnerable people for Sexual Financial purposes.

Page 3: Cyber Predator Presentation

Cyber Predators Predators Characteristics: Close to 100% are

male 91% are white

and non-Hispanic 91% hold a full-

time job.

Page 4: Cyber Predator Presentation

Catching a Cyber Predator

Counterattack against cyber-predators

The Sting of Online Predators

Microsoft Collaborates With Global Police

Page 5: Cyber Predator Presentation

• Know the warning sign.

• Talk openly with your children

• Place the computer in an open area of your home.

• Limit computer time. • Establish rules for Internet use • Post them near the computer

How to Protect Kids from Online Predator

Page 6: Cyber Predator Presentation

Get involved.

Purchase software that prevents adware and spyware.

Purchase tracking software.

Check history and cookie files to monitor sites.

Page 7: Cyber Predator Presentation

Put a password on the computer.

Teach your child about internet safety.• Warn your child not to join any mailing lists • Encourage your child not to visit strange

sites.

Page 8: Cyber Predator Presentation

Disturbing Statistics100,000 Web sites offering child pornography.

79% of teens aren’t careful when giving out information

64% teens do things online without parents knowledge.

Page 9: Cyber Predator Presentation

$3 billion Child pornography revenue annually.

1 in 5 Children are sexually solicited online

• only 25% of those told a parent

89% Sexual solicitations occurred in • chat rooms • Instant Messaging

Page 10: Cyber Predator Presentation

Where predators are found• Chat Rooms• Instant Messenger• Myspace• Facebook• Xanga

Page 11: Cyber Predator Presentation

Software

You can find software that willLimit the time your child spends onlineBlock inappropriate web pagesMonitor Instant Messenger chatsRestrict game-playBlock file sharing programsKeep your kids from sending personal

information online

Page 12: Cyber Predator Presentation

Protective Settings

Set up content advisor on internet explorer

List of approved and block sites or Content Advisor

Safe Surf http://www.safesurf.com/iesetup/

Page 13: Cyber Predator Presentation

Protective Tools• Kid-safe search engines

– Hazoo– Yahooligans– KidsClick

• Internet Filters• All in one parental control software• Banning Myspace from schools • Kinds of Software

– Mach 7 the Remote Spy Keylogger

Page 14: Cyber Predator Presentation

BooksThe Smart Mom’s Guide to Online Safety• Learn how to keep your children safe • Learn the warning signs • Discover what happens on social

networking sites, blogs and other online channels.

Page 15: Cyber Predator Presentation

Learn why nothing is permanently deleted from the Internet

Discover online dangers at your public library.

Learn why photo and video sharing sites can impact your child’s life