Document Sample
INTERNET SAFETY Powered By Docstoc

     Brian Blaszak
     Erie 1 BOCES
         Course Overview
 Schools
 E-mail
 Precautions
 Kids vs. Adults
 Messaging
 Your Child/Student
 Internet Predators
 Internet Sources
   I-Safe Program
    – Overview: is the worldwide leader in the Internet
      safety education. Founded in 1998 and endorsed by
      the U.S. Congress, i-SAFE is a non-profit foundation
      dedicated to protecting the online experiences of
      youth everywhere. i-SAFE incorporates classroom
      curriculum with dynamic community outreach to
      empower students, teachers, parents, law
      enforcement, and concerned adults to make the
      Internet a safer place. Please join us today in the
      fight to safeguard our children’s online experience.
   School Filters
    – For the most part, schools are a safe place for
      kids to explore the Internet.
    – WHY? Supervision and Filters block most
    – Problems: Too many websites and natural
    – Kids ALWAYS have or try to find a way around
 RESEARCH Projects!
 Teachers need to take extra steps to look
  at the websites they are giving students
  for projects…don’t just let them go to
  Google and go wild…
 Find out who is running the website:
    – Always do some of the research yourself
    – Typo Squatting ( vs. .gov)
 Plagiarism: “I only took some of it…”
 “Google it” (If it is not in the first 10 pages
  of Google, they may not have plagiarized).
 Helpful websites: Some of these sites are
  pay sites:
   Popular Websites for students you may not
    have known about:
    – (need HS/College e-mail)
   Write down your personal e-mail address
    on a scrap piece of paper
    – What does your e-mail address reveal about
    – TMI…Too Much Information! (In some cases)
    – Examples from I-Safe:
        LilGrl41390
        Footballstar#5
        Syracuse_babe
        Policing Your Computers
 Computer Location: Family Room, Living
  Room, etc
 Know the “ins” and “outs” of the computer
    – History of Internet Activity
    – “Cookies”
    – Awareness of programs on the computer
    – Take time to explore the Internet and see what
      is out there
    – Key Logger Program (records the typing on the
             Kids Vs. Adults:
    Adults are the “Tech Immigrants”
           Adults                   Kids

   Pay Bills              Chat
   Book vacations         Blogging
   Shop                   My Space
   Directions             Gambling
   Sports                 Videos and Music
   E-mail family and      Porn
    friends                Sports
   Information            Trouble: Violent and
 Be Real…talk to your kids and students
  about the real dangers out there
 Explore the Internet together
    – Top Internet Searches
 Set time limits
 Computer Locations should be in sight at
 Set passwords to your computer
         Instant Messaging
 Popular programs: AOL, MSN, Yahoo, Cell
 Check out the “Buddy Lists”
 Find the Print option
    – If your child/student is being harassed

              Text Acronyms
   LOL- Laugh out loud              CTN- Can’t Talk Now
   LMAO- Laugh my ass               P911- Parent in room:
    off                               Watch language
   BAG- Bust a Gut                  PAL- Parents are
   BB4N- Bye-Bye for                 listening
    Now                              9- someone is looking
   BRB- Be Right Back                over my shoulder
   DIKU- Do I Know                  99- person has left
    You?                              the room
          Need more?
        – Ran a series of 6 stories called “To Catch a
        – 1st: no one was arrested, just an expose in
          the Washington DC area
        – 2nd: move to a different state (California)
        – 3rd: 50 men were arrested in this sting
        – Dateline: Predators
   Other articles of Internet Safety:
    – WGRZ: What is your child doing?
    – TMI: Article from DATELINE on account info
    – My Space arrest from prank
    – My Space invader: teens are not as safe as
      they think
    – Perverted Justice (mentioned in the
      DATELINE video-Wikipedia article)
       Internet Predators
 How hard is for them to find their prey?
 EASY! How can they do it?
 Let’s Explore how easy it is to find out
  about someone on My Space
     Is your child in danger?
 Google their name and see what comes up
 Create a fake account on My Space or a
  real account with no information so you
  can explore the site
 Go to the Search feature in My Space and
  type in their name

 It is a fine line between
 being nosey and protecting
 your children and students!
        Ways of Protection
 Monitor your child’s Internet activity
 Change their screen names
 Take your address and phone numbers off
  any local phone directory
 Sex offender website (see where
  registered sex offenders are in your
                     Malicious Code
     A computer virus attaches itself to a program or file so
      it can spread from one computer to another, leaving
      infections as it travels. Much like human viruses,
      computer viruses can range in severity; some viruses
      cause only mildly annoying effects while others can
      damage your hardware, software, or files. Almost all
      viruses are attached to an executable file, which means
      the virus may exist on your computer but it cannot infect
      your computer unless you run or open the malicious
      program. It is important to note that a virus cannot be
      spread without a human action, (such as running an
      infected program) to keep it going. People continue the
      spread of a computer virus, mostly unknowingly, by
      sharing infecting files or sending e-mails with viruses as
      attachments in the e-mail.
                     Malicious Code
     A worm is similar to a virus by its design, and is
      considered to be a sub-class of a virus. Worms spread
      from computer to computer, but unlike a virus, it has the
      ability to travel without any help from a person. A worm
      takes advantage of file or information transport features
      on your system, which allows it to travel unaided. The
      biggest danger with a worm is its ability to replicate itself
      on your system, so rather than your computer sending
      out a single worm, it could send out hundreds or
      thousands of copies of itself, creating a huge devastating
      effect. One example would be for a worm to send a copy
      of itself to everyone listed in your e-mail address book.
      Then, the worm replicates and sends itself out to
      everyone listed in each of the receiver's address book,
      and the manifest continues on down the line.
                      Malicious Code
     A Trojan Horse is full of as much trickery as the mythological
      Trojan Horse it was named after. The Trojan Horse, at first glance
      will appear to be useful software but will actually do damage once
      installed or run on your computer. Those on the receiving end of a
      Trojan Horse are usually tricked into opening them because they
      appear to be receiving legitimate software or files from a legitimate
      source. When a Trojan is activated on your computer, the results
      can vary. Some Trojans are designed to be more annoying than
      malicious (like changing your desktop, adding silly active desktop
      icons) or they can cause serious damage by deleting files and
      destroying information on your system. Trojans are also known to
      create a backdoor on your computer that gives malicious users
      access to your system, possibly allowing confidential or personal
      information to be compromised. Unlike viruses and worms, Trojans
      do not reproduce by infecting other files nor do they self-replicate.
                     Malicious Code
     The first steps to protecting your computer are to ensure
      your operating system (OS) is up-to-date. This is
      essential if you are running a Microsoft Windows OS.
      Secondly, you should have anti-virus software installed
      on your system and ensure you download updates
      frequently to ensure your software has the latest fixes
      for new viruses, worms, and Trojan Horses. Additionally
      you want to make sure your anti-virus program has the
      ability to scan e-mail and files as they are downloaded
      from the Internet. This will help prevent malicious
      programs from even reaching your computer. If this isn't
      enough protection, then you may want to consider
      installing a firewall as well.
                      Malicious Code
     A firewall is a system which prevents unauthorized use and access
      to your computer. A firewall can be either hardware or software.
      Hardware firewalls provide a strong degree of protection from most
      forms of attack coming from the outside world and can be
      purchased as a stand-alone product or in broadband routers.
      Unfortunately, when battling viruses, worms and Trojans, a
      hardware firewall may be less effective than a software firewall, as
      it could possibly ignore embedded worms in out going e-mails and
      see this as regular network traffic. For individual home users, the
      most popular firewall choice is a software firewall. A good software
      firewall will protect your computer from outside attempts to control
      or gain access your computer, and usually provides additional
      protection against the most common Trojan programs or e-mail
      worms. The downside to software firewalls is that they will only
      protect the computer they are installed on, not a network.
                  Dear valued customer,
         We recently updated our accounts and noticed
    that your account information appears to have old
  information according to our records. Please click on
 the link below and type in your account information so
      we can have updated records of your account.
                                           Thank you,
                                           HSBC Bank
   The act of sending an e-mail to a user falsely claiming to be an
    established legitimate enterprise in an attempt to scam the user into
    surrendering private information that will be used for identity theft.
    The e-mail directs the user to visit a Web site where they are asked
    to update personal information, such as passwords and credit card,
    social security, and bank account numbers, that the legitimate
    organization already has. The Web site, however, is bogus and set
    up only to steal the user’s information. For example, 2003 saw the
    proliferation of a phishing scam in which users received e-mails
    supposedly from eBay claiming that the user’s account was about to
    be suspended unless he clicked on the provided link and updated
    the credit card information that the genuine eBay already had.
    Because it is relatively simple to make a Web site look like a
    legitimate organizations site by mimicking the HTML code, the scam
    counted on people being tricked into thinking they were actually
    being contacted by eBay and were subsequently going to eBay’s site
    to update their account information.
 Helpful Internet Resources
 Concerns?
 Questions?
 Comments?
Short for Web log, a blog is
a Web page that serves as a
publicly accessible personal
  journal for an individual.
   Typically updated daily,
    blogs often reflect the
 personality of the author.

Shared By: