Dangers on the Internet
Download
Report
Transcript Dangers on the Internet
Dangers on
the Internet
Presenter: Chris Weber
School Liaison, Springtown Intermediate School
Text Talk Icebreaker
Quiz from the Ad Council
“Your Kids can fill in the blanks, can you?
1.LOL: Laugh Out Loud
2. BRB:
3. MUSM:
4. A/S/L:
5. BF:
6. TAW:
7. SN:
8. POS:
9. WTGP:
10. LMIRL:
Text Talk Icebreaker
Quiz from the Ad Council
“Your Kids can fill in the blanks, can you?
1.LOL: Laugh Out Loud
2. BRB: Be Right Back
3. MUSM: Miss You So Much
4. A/S/L: Age/Sex/Location
5. BF: Boyfriend
6. TAW: Teachers Are Watching
7. SN: Screename
8. POS: Parent Over Shoulder
9. WTGP: Want to go Private?
10. LMIRL: Lets Meet in Real Life
Basic Understanding
A computer is nothing more than a
gigantic calculator
The internet is a tangible network of
information stored and retrieved on
computers
It can all be a scary place
Definitions for today
Internet- A vast network of interconnected computer
systems which permit users to communicate and share
information.
(http://library.mcneese.edu/tutorial/glossary.htm)
Intraweb- a restricted computer network; a private network
created using World Wide Web software
(wordnetweb.princeton.edu/perl/webwn )
World Wide Web- WWW, web computer network consisting
of a collection of internet sites that offer text and graphics
and sound and animation resources through the hypertext
transfer protocol (wordnetweb.princeton.edu/perl/webwn )
HTTP/HTTPS- The Hypertext Transfer Protocol (HTTP) is the
set of rules for exchanging files (text, graphic images,
sound, video, and other multimedia files) on the World
Wide Web.
(www.its.strath.ac.uk/helpdesk/glossary/ )
Definitions for today continued…
SSL- A session layer protocol that provides authentication and
confidentiality to applications.
(www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html )
Firewall- Firewalls can limit and stop access to computers by unauthorized
people or systems
(www.netalert.gov.au/advice/publications/guides/a_teachers_guide_to_int
ernet_safety/glossary.html )
Social Networking- connecting and communicating with other users/people
over the world wide web. Example, Facebook
File sharing- process by which downloadable software permits users to
share music, video, image or book files directly with peers. Examples of
this software include Napster, KaZaA, and iMesh (www.mediaawareness.ca/english/resources/special_initiatives/wa_resources/wa_shar
ed/backgrounders/internet_glossary.cfm )
Streaming- A method of "playing" animated/motion picture or audio data
received over a network. The transmitted data file is played in real time as
it arrives at the recipient's end.
(memory.loc.gov/ammem/techdocs/repository/gengloss.html )
Mp3/mp4- Mp3 is a standard audio format for music/audio tracks on the
computer. Mp4 is an IPOD-compatible format for video.
MPEG/MPEG2- •MPEG (pronounced M-peg), which stands for Moving
Picture Experts Group, is the name of a family of standards used for
coding audio-visual information (eg, movies, video, music) in a digital
compressed format. (www.videospecialist.it/faq/canopus-hdvglossary.html)
Tenants of Internet Safety
1.
2.
3.
If something looks too good to be
true, it is…
Common sense is a law that is
rarely followed; it will save you
from 90% of what will harm you on
the internet
Assume your children or vulnerable
adults in your house are not aware
of the dangers of the internet
Dangers of the Internet
By its very structure, the Internet is vast
and unsecured
• Information can be uploaded from anywhere to
anywhere that it is allowed
• The law of survival of the fittest reigns
supreme; whoever is smart enough can put
what they want out there
• It is never going away, “The Internet is
becoming the town square for the global
village of tomorrow.
Bill Gates”
Technology Introduction Video
Dangers of the Internet
Common threat #1- sharing of private
information
• Whether voluntarily or involuntarily, Phishing is
something that happens everywhere
• Phishing, “The attempt to fraudulently acquire
sensitive information (eg, passwords, account
numbers, or financial information) by
masquerading as a trustworthy person or
business in a seemingly official
communication.”
(infosat.tamu.edu/students/glossary.htm )
Phishing Video
Dangers of the Internet
Common threat #2- unavoidable
attacks from hackers/people who
want to ruin your computers
• In an unrestricted environment, people
will push as hard as they can to get
away with as much as they want
• People try through: network attacks,
“trojan” programs through downloads,
spyware, malware, etc…
Trace IP Address Video
Hack through IP Address Video
Should I give up Chris?
There is a simple solution…”Just give
me your credit card numbers for
verification and I will take it from
here…”
Real Solution: Anti-Virus software
and common sense
• McAfee, Symantec(Norton), etc…
• Follow our rules for internet use later in
the presentation
Kids and the Internet
Again, assume that your children do
not know what is out there and start
from there
Make a general list of rules/procedures
that you and your family will follow
while on the computer/internet
Pull the computer out of the bedroom
and put in a well supervised place
Internet Handout for Kids
Own Your Space. Keep It Safe!
Keep Away
Keep Away from Internet strangers no matter what they tell you, because you have no way of knowing who they
really are. Don’t talk to strangers online and never meet them face-to-face.
Keep Telling
Keep Telling your parents or a trusted adult about everything you see on the Internet. Always tell them when
something online makes you uncomfortable.
Keep Safe
Keep Safe your personal information—all of it! Never give out your real name, address, phone number, the name
of your school, or a picture of yourself to anyone online. Also, use passwords whenever you can.
And Remember...
•
Gaming—Always keep your firewall on.
•
Shopping —Never provide passwords to anyone online, no matter who asks.
•
Downloading Music —Install software to guard against spyware and unwanted adware.
•
Socializing Online —Never meet in-person someone you met online.
•
Back up your files regularly —including digital photos, music, and important files.
•
The Internet is forever—Everything you do on the Internet is tracked, monitored, and stored.
•
Anonymity is a myth—ISPs, governments around the world, marketers who want to sell you junk, and
even savvy predators can track your interests, follow your digital footprints, and figure out who you are.
•
Cyber ethics apply to everyone—Online harassment can lead to legal implications. Be the good person
online that you are when you’re offline.
Norton™ by Copyright © 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, and Norton are trademarks
or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners. 04/07 12162534
Internet Presence Video
Internet Presence Video
Social Networking Revolution
MySpace and Facebook have
changed the way our children, and
all of us, now “hang out”
• Our kids run the risk of TMI(Too Much
Information) exponentially more now
than ever before
• You can navigate safely and so can they.
Make sure you know first how to protect
their privacy
Facebook Privacy Tutorial
Social Networking
This too is not going away anytime soon
• Ad revenues alone are the source of profit for
these companies. So they are not going away
if there is money to be made
The best thing to do to protect yourself
and children/vulnerable adults is to
lockdown your privacy settings as much as
possible
Facebook set a trend in privacy
management, so other sites have probably
adopted similar settings/parameters for
privacy control
Rules for Internet Use
1. use antivirus software
• This avoids 95% of the headaches you would encounter if you
were unprotected on the internet
2. do not open forwards with attachments
• I promise you the funny cat video is not worth it if you have to
replace your computer because your friend sent you a virus…
3. download only from sites that you trust or you have
been told are ok to download from
• Just because the description says it is ok, does not mean it is.
• Your antivirus should scan the folder and let you know,
somewhat reliably, that it is safe to open
4. Lock down privacy settings on any and all social
networking, profile listing sites that you or anyone in
your house uses
5. Keep on learning because this, and other
technology, is not going away
Resources
Are available through email:
[email protected]
I will try to post them to the
Springtown ISD website or the
Intermediate School website-I need
to ask about that
If none of that works, you can
always give me a cd/flash drive and I
can copy it for you