Protecting your children online

Download Report

Transcript Protecting your children online

Brian D. Wisniewski, GCIH, CISSP, ITIL, IAM
Agenda








Introduction
3 Key Concepts
The Web,
The Deep Web,
& The Dark Web
Ages 4-7
Ages 8-10
Ages 11-13
Ages 14+
Resources
3 Key Concepts
CYBERSECURITY- teaching children
computer safety
CYBERSAFETY- teaching online behaviors
to protect a child’s physical wellbeing
CYBERETHICS- teaching children to treat
others online as they would like to be
treated
Sobering Statistics
1.
2.
3.
4.
5.
6.
7.
93% of boys & 62% of girls have been exposed to internet
pornography before the age of 18.
76% of first encounters with online predators happen in
chat rooms.
40% of teens have seen pictures on social networking sites
of kids getting drunk, passed out, or using drugs.
39% of teens have posted sexually suggestive messages.
83% of boys & 57% of girls have seen group sex online.
18% of boys & 10% of girls have seen rape or sexual
violence
15% of boys & 9% of girls have seen child pornography.
Source: Covenant Eyes 1/17/2012 & “Associated Press-MTV Digital Abuse Survey 8/2011
conducted by Knowledge Networks
The Web, The Deep Web,
& The Dark Web
The Web, The Deep Web,
& The Dark Web (cont’d)
The Web, The Deep Web,
& The Dark Web (cont’d)
Ages 4 - 7
Ages 4 - 7
Ages 8 - 10
Cyberbullying
Using a computer to torment, threaten, harass,
humiliate, embarrass, or target another child
Examples of Cyberbullying:
 Flaming
 Harassment
 Denigration
 Online Website Polls
Cyberbullying
Cyberbullying
•88% of teens have seen someone be mean or cruel to
another person on a social network site.
•55% see other people just ignoring what is going on.
•38% of online girls report being bullied.
•26% of online boys report being bullied.
•41% of older girls (15-17) report being bullied—more than
any other age or gender group.
Teens who spend more than 3 hours per school day on online
social networks are
110% more likely to be a victim of cyber-bullying.
Source: Covenant Eyes 1/17/2012
Ages 11 - 13

Are they ready for Social Media or a
Smart Phone?
Ages 11 – 13

Social Media – Get Involved!
Set Privacy
Controls
Learn
Social
Networking
Sites
Friend your
Child
Monitor
Postings
Talk to your
Child about
Dangers
Making Your Profile Private
Default Privacy
Set Post-byPost Privacy
Social Networking Tips
Make the Right Decisions
Deactivate Geotagging
iPhone:
Settings General Location Services and then
either configure the location settings on a perapplication basis or globally for all applications.
Android:
Open the camera program click the small icon
that looks like a satellite dish set Store
Location to "Off"
A Case Study
Ages 14+

Instagram
 1. Privacy Settings
 2. Profile Appearance
 3. Location Share
 4. Following and Followers
 5. Help Your Children Understand the
Privacy Features & Risks
Gaming
Adults Swearing at Children,
Bullying
Intentional Blocking of a Character
Contact with Adult Strangers
Parents Purchase 18+ Rated
Games
Gaming
Use Avatar
Prohibition
won’t work.
Nicknames
ONLY
Safety Tips
NO downloads
from strangers.
Avoid voice
video features.
NO personal
information.
Report & Block
Ages 14+

https://account.microsoft.com/family/about
Ages 14+
Mobile Telephones
Smart Phones Access the Internet:
•
•
•
•
•
•
Instant Messenger
E-Mail
Social Networking
Live TV
Videos
Music
Complications and Concerns:
•
•
•
•
Used Anywhere
Sleep deprivation
Always reachable
Unregulated
Mobile Telephone Guidelines
Know the device’s capabilities
Agree what content is allowed
Save abusive messages/images
Decide consequences
Encourage balanced use
Ages 14+
Ages 14+
Protect Your Devices

Keep Computers in an open
area

Install Full Security Suite
(Anti-Virus/Firewall)



Limit Administrator Rights

Use Tough Passwords to
Crack
Educate Children on Security
Software and Not to Share
Personal Information

Use Nicknames, NOT Real
Names
Install Latest Security Patches

Use Good Judgment
A Note About Social Media

Realize most Social Media sites Terms
of Service include "a worldwide, nonexclusive, royalty-free license (with the
right to sublicense)“ on YOUR content.
OCTOBER 1, 2007
THIS is no “star is born” story for the digital age, though at first it may seem like one.
One moment, Alison Chang, a 15-year-old student from Dallas, is cheerfully goofing around at a local churchsponsored car wash, posing with a friend for a photo. Weeks later, that photo is posted online and catches the
eye of an ad agency in Australia, and Alison appears on a billboard in Adelaide as part of a Virgin Mobile
advertising campaign.
Four months later, she and her family are in Federal District Court in Dallas suing for damages.
On the billboard, Alison’s friend has vanished and so has the Adidas logo on her hat. Her image is
accompanied by a mocking slogan — according to the ad, Alison is the kind of loser “pen friend” (pen pal)
whom subscribers will finally be able to “dump” when they get a cellphone.
A Note About Social Media (cont’d)

Facebook



With over a billion users, Facebook is the definitive homepage for many web users.
Its terms of service, data use and cookie use policy span more than 14,000 words
over eight separate pages and would take even the quickest reader more than two
hours to dig through. But what rights have you handed over to Facebook?
Specifically for photos and video uploaded to the site, Facebook has a license to
use your content in any way it sees fit, with a license that goes beyond
merely covering the operation of the service in its current form. Facebook
can transfer or sub-license its rights over a user’s content to another
company or organization if needed. Facebook’s license does not end upon
the deactivation or deletion of a user’s account, content is only released from
this license once all other users that have interacted with the content have also
broken their ties with it (for example, a photo or video shared or tagged with a
group of friends).
Twitter

Fast becoming the second social network behind Facebook, Twitter's model for
monetizing the service has yet to be established, a fact clearly seen in its terms of
service. Twitter's terms give it broad scope to use, change and distribute any
photos, writing or video posted through Twitter's service, to any other forms
of media or distribution method it wishes, including those which Twitter has
not yet thought of or developed. Similarly to Facebook, Twitter's license also
allows it to pass any of your content to any partner organizations for any reason.
Good Resources
National Cyber Security Alliance:
www.staysafeonline.org

Think you know:
www.thinkyouknow.co.uk/parents

National center for missing and exploited children:
www.netsmartz.org/Parents

Childnet International:
www.childnet-int.org
For advice, resources, facts, tools, etc.

Ikeep Safe:
www.ikeepsafe.org/for-parents
For current topics, safe plans, parent how-to’s, etc.

Thank You!