Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand...
-
Upload
susan-broomfield -
Category
Documents
-
view
222 -
download
2
Transcript of Cyber Safety: Keeping Your Kids Safe in a High Technology World Crime Prevention Bureau Thousand...
Cyber Safety:Cyber Safety:““Keeping Your Keeping Your Kids SafeKids Safein a in a High Technology High Technology
World”World”
Cyber Safety:Cyber Safety:““Keeping Your Keeping Your Kids SafeKids Safein a in a High Technology High Technology
World”World”Crime Prevention Bureau
Thousand Oaks Police Department
Sgt. Eric [email protected]
Tonight’s AgendaTonight’s Agenda:: Tonight’s AgendaTonight’s Agenda::
“Internet 101”Cyber-BullyingSocial MediaInternet PredatorsParenting Tips
Becoming Computer Becoming Computer Savvy –Savvy –
Internet 101Internet 101
Becoming Computer Becoming Computer Savvy –Savvy –
Internet 101Internet 101Blog – Short for weblog
Browser – A program that allows you to search the world wide web (WWW)
Chat room – Chat with others over the web messages and/or live video
Blocking software – Computer programs that filter content from the internet base on specific criteria
File sharing – Accessing files from one computer to another
ISP – Internet Service Provider – a company that sells direct access to the internet
HTTP- Hypertext Transfer Protocol if there is an “S” at the end this is a secure site.
IP Address – Set of 4 numbers; uniquely identifies every computer
IM – Instant Message
URL- Uniform Resource Locater, basically an internet address
Router – Access point to hook computers to the internet
101 – Continued101 – Continued101 – Continued101 – ContinuedA/S/L – age, sex, location
POS – parent over shoulder
53x – sex
GNOC – get naked on camera
IBN – I’m buck naked
(L)MIRL- (let’s) meet in real life
OLL- online love
TDTM – talk dirty to me
F2F – face to face
WYRN – what’s your real name
ILU or ILY or 143 – I love you
GNBL4U – got nothing but love for youwww.noslang.com
101 – 101 – ContinuedContinued 101 – 101 – ContinuedContinued
BRB-Be right backGNOC-Get naked on cameraP911-Parent EmergencyPIR-Parent in roomPOS-Parent over shoulderW/E-WhateverGTG-Got to goDTG-Don’t go thereWTGP?-Want to go private?
Typical Emoticons Typical Emoticons; ) Winking:*( Crying#-) Wiped-out-partied all night%*} Inebriated%\ Hangover8-# Death:-d~ Smoker:->< Ready to kiss:/I No smoking
Cyber Bullying is bullying that takes place online using cell phones, computers and tablets through social media sites, text messages and websites.
Cyber-Bullying, What is Cyber-Bullying, What is it?it?
Cyber-Bullying, What is Cyber-Bullying, What is it?it?
Cyber-BullyingCyber-BullyingCyber-BullyingCyber-BullyingOver half of teens have been bullied online
70% of teens report seeing frequent bullying online
90% of teens who have seen social-media bullying say they have ignored it.
Girls are twice as likely as boys to be victims
About 1 in 5 teens have posted or sent sexually suggestive or nude pictures of themselves to others. This often leads to being harassed and teased
Cyber-BullyingCyber-BullyingCyber-BullyingCyber-Bullying
What should we do?What should we do?What should we do?What should we do?Talk to your kids. Become computer savvy.Internet ControlsConsequencesComputer in common areaLook for signs Save evidence and try to
identify the bully. Take screen shots
Notify the school and police department
Social Media
What is Social Media?What is Social Media?
Social Networking Sites are a group of Internet-based applications that allow the creation and exchange of user generated content.
Purpose: allows users to establish friendships, romantic interests, or make business connections
Teens and Social MediaTeens and Social MediaTeens and Social MediaTeens and Social Media95% of teens regularly access the internet / social media*
3 out of 4 teens access the internet on mobile devices*
Teens spend an average of 7 1/2 hours per day checking social media status, texting, browsing internet, watching videos, listening to music, etc.^
Average age seems to be getting younger
*Commonsensemedia.org, ^WashingtonPost.com
Social Media TrendsSocial Media TrendsSocial Media TrendsSocial Media Trends
As more parents embrace Facebook they’re driving teens away to look for more secretive social media sites or apps
Why Do Kids like these Sites?Why Do Kids like these Sites?
Exposes them to the entire world Accesses people anywhere at anytime Create and showcase who they are Can keep tabs on their friends and on the latest hot
topics and what is “in” Social Networking sites are THEIR OWN SPACE Gives a sense of empowerment in controlling their own
world without their parents
Monitor you teen’s online activity
Monitor you teen’s online activity
Set up privacy settings prior to giving your teen a mobile device. (It’s your phone…It’s your rules)
Use monitoring software (PhoneSheriff) It’s ok to snoop / spy on your teens activity 67% of teens say they are confident they have successfully
hidden their online activity from their parents* 34% of parents say they monitor teens activity* You now have to become Social Media savvy*facebook-parental-controls-review.toptenreviews.com
What did my teenager What did my teenager just say ??just say ??
What did my teenager What did my teenager just say ??just say ??
“I got a toro! I’m gonna swoop my dank tank. HMU, let’s chief.”
Toro (Toro glass) = Brand of blown glass pipe / bong
Swoop = To pick up
Dank Tank = Jar containing weed or term for HQ weed
HMU = Hit Me Up
Chief = To smoke weed
Use advanced search
GOOGLE your child…GOOGLE your child…GOOGLE your child…GOOGLE your child…
To find photos
Security ImplicationsSecurity Implications Since these sites rely on connections and
communications, you are encouraged to provide information about yourself. People are usually not cautious because:
The Internet provides a sense of anonymity The lack of physical interaction provides a
false sense of security People tailor information for friends to
read and forget others may see the information
People offer insights to impress potential friends and associates and give out more information than is prudent
Protect Yourself Using SIPPS
Protect Yourself Using SIPPS
Strangers-Be wary of strangers. The Internet makes it easy for people to misrepresent themselves and their motives
Internet-It is a public resource. Only post information that you are comfortable with anyone seeing and knowing about you—especially in your profile and in your blogs
Personal Information-Do not post information that will make you vulnerable (address, age, routines, schedules, etc.) This also includes information your connections may post about you
Privacy Policies-Some sites share information such as email addresses or user preferences
Skepticism-Do not believe everything you read. Misleading and false information is always posted, including a user’s own identities. Take precautions and verify information
Safe Blogging TipsSafe Blogging Tips Be anonymous as possible - Avoid posting any
information that can enable a stranger to locate you Protect your info - Use the service’s privacy controls Avoid in-person meetings - It is never risk-free. If you do
decide on a meeting, always meet in a public place and take your friends
Check comments regularly - Do not respond to mean, offensive, or embarrassing comments. Delete them and block those people from posting further comments
Be honest about your age - Membership rules are there to protect you
Safe Blogging TipsSafe Blogging TipsThink about how different sites work -some allow a defined
community while others allow anyone to view postingsHave control over info you post -restrict your page to a select
group of peopleScreen names -make sure your screen name does not say
too much about youPhotos -consider not posting one. Photos can be altered or
broadcasted through other mediumsInformation posted -post only info that you feel comfortable
with others seeing. It may came back to haunt you in the future for jobs, school applications, law enforcement, etc.
Once sent, always out -you can never take back information once it is posted
Safe Blogging Tips Safe Blogging TipsBe wary of new online friends -ask your friends if they
know any new person and do your own research via search engines
Flirting -Unacceptable to flirt with strangers. You never know who they really are, who you are communicating with, or the motives of the other person
Always trust your instincts - if your inner person is giving you warning/danger signs that something is wrong—LISTEN TO YOUR INSTINCTS
How to save evidence How to save evidence to take to the police.to take to the police.How to save evidence How to save evidence to take to the police.to take to the police.
Go to page, hit shift key and print screen key at the same time.
Evidence saving Evidence saving continuedcontinued
Evidence saving Evidence saving continuedcontinued
Open up Microsoft paint.
Click on “Edit”
Click on “Paste”
File will then paste onto screen
Internet PredatorsInternet
Predators
“Hi, You sound real cute!! How old are you and what do you like doing after school?”
“I am 14 and a bit of a fitness fanatic, I often go power lifting after school. Do you want to meet?”
Insight into PredatorsInsight into PredatorsInsight into PredatorsInsight into Predators
Only 18% of youth use chat rooms, however, majority of crimes initiated in chat rooms
82% of online sex crimes against minors used the victim’s social networking site to find likes and dislikes
65% of the offenders used victim’s social networking site to gain home and school information
Majority of victims between 13-15. 75% were girlsSolicitations occur in Chatrooms (37%), I/Ms (40%), other
including gaming devices (21%)Internetsafety101.org
What you do reflects on What you do reflects on you…foreveryou…forever
What you do reflects on What you do reflects on you…foreveryou…forever
Teen brains are still developing and they can’t control all of their impulse behaviors
Not thinking about implications of pictures
What about future employers? College applications? Police investigations? Schools?
•A recent study by ExucuNet, 83% used web searching as a part of the job applicant-screening process. •43% eliminated applicants
Check HistoryCheck HistoryCheck HistoryCheck History
HISTORY ICON
Tools to Use:Tools to Use:Tools to Use:Tools to Use:Filtering and
blocking softwareTime monitoring
SoftwareKey Logging /Key
Stroking Software
• Net Nanny
• Web Watcher
• McAfee Safe Watcher
• Profil Parental watcher 2
• PC Pandora
• Family Protector
• Spytech SpyAgent
• eBlaster
• Spector Pro
• Phone Sheriff (Mobil devices)
Parenting = Values and Parenting = Values and StandardsStandards
Parenting = Values and Parenting = Values and StandardsStandards
Safe internet behavior starts in the real world, with focus on imparting values and standards
Help them understand their actions can cause harm to people, even if they can’t see them.
Help them to learn ethical decision making.
Challenge unhealthy values and standards
Staying Safe Online:A Young Person's Contract
1. I will ALWAYS tell a parent or another adult immediately, if something is confusing or seems scary or threatening.
2. I will NEVER give out my full name, real address, telephone number, school name or location, schedule, password, or other identifying information when I'm online. I will check with an adult for any exceptions.
3. I will NEVER have a face-to-face meeting with someone I've met online. In rare cases, my parents may decide it's OK, but if I do decide to meet a cyber-pal, I will make sure we meet in a public place and that a parent or guardian is with me.
4. I will NEVER respond online to any messages that use bad words or words that are scary, threatening, or just feel weird. If I get that kind of message, I'll print it out and tell an adult immediately. The adult can then contact the online service or appropriate agency. If I'm uncomfortable in a live chat room, I will use the "ignore" button.
5. I will NEVER go into a new online area that is going to cost additional money without first asking permission from my parent or teacher.
6. I will NEVER send a picture over the Internet or via regular mail to anyone without my parent's permission.
7. I WILL NOT give out a credit card number online without a parent present.
Young Person_________________ Date______Parent/Guardian_______________ Date______
PARENT / CHILD CONTRACTPARENT / CHILD CONTRACTPARENT / CHILD CONTRACTPARENT / CHILD CONTRACT
Red Flags, Warning Signs
Red Flags, Warning Signs
Internet addictionSecretive behaviorEmpty history file after internet useEmotionally upset appearance during or
after internet useDisturbed relationships with parents,
family, and friends.Receipt of packagesSubtle comments (Cyber-Safe Kids, Cyber-Savvy Teens, Nancy Willard)
Red Flags - ResponsesRed Flags - ResponsesSubtle comment – ask them , “What do you think you
should do?”Investigate furtherCalm down before talking.Initiate your discussion carefullyRespond to evidence of unsafe or irresponsible use of
Internet with effective disciplineIf you find your child is involved with an online stranger,
DO NOT confront, they could erase evidence, runaway with person or alert stranger, CALL POLICE
(Cyber-Safe Kids, Cyber-Savvy Teens, Nancy Willard p55)
Know the rules, Know the rules, the lawsthe laws.
Know the rules, Know the rules, the lawsthe laws.School Rules
Terms of Use AgreementsCriminal Law
Threats of violence to people or propertyExtortion or CoercionObscene or harassing phone calls or text messagesHarassment or StalkingGang related activity Child PornographySexual ExploitationSale of an illegal substance or itemComputer security violations
Know the rules, Know the rules, the lawsthe laws.
Know the rules, Know the rules, the lawsthe laws.
Civil Law StandardsDefamationInvasion of privacyIntentional infliction of emotional distressCopyright infringement
C.O.P.P. A.C.O.P.P. A.Children’s Online Privacy Protection Act 1998States that any website trying to get ANY personal
information from a child under the age of 13 MUST have parental permission.
Your consent isn’t necessary if the website is collecting your child’s email address simply to respond to a one time request for information.
You may revoke consent at anytime.
Computer Safety TipsComputer Safety Tips Use password strategies -Create alphanumeric
passwords that are hard to crack and create different passwords for each account. Change passwords periodically and never give out your passwords to anyone—including your friends
Install a firewall -Absolutely necessary if you share-file programs, helps prevent hackers and the theft of information on your computer,
Never open suspected attachments -Regardless of how intriguing they are or curious you are—delete them
Computer Safety TipsComputer Safety Tips Be a cyber citizen -use the Internet to share
knowledge and make lives better. Keep safe, use good manners and respect the laws
Do not open e-mail from unknown sources -delete them especially ones with ‘exe’ extensions
Back-up -use external media Security -Evaluate security setting at least twice a
year and use security patches, Use security patches and check for virus updates
Computer Safety TipsComputer Safety Tips Anti-virus software - get regular updates. Viruses
are always changing Sharing access to your computer - DON’T! Disconnect -When not using the Internet, shut down or
cut off the Internet connection
Resources / LinksResources / LinksResources / LinksResources / Links www.netsmartz.net www.isafe.org www.onguardonline.gov www.cybertipline.com www.connectsafely.org www.getnetwise.org www.ncpc.org www.toakspd.org