Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet...

29
Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands Ct Ashburn, VA 20147 http://navigators.com Phone : 703-729-1757 [email protected] (put “training” in email subject) navigators.com/ parentguide.html

Transcript of Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet...

Page 1: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Safety Issues for Online Kids (and the rest of the family)

Rev. 09/2006

Russ Haynal Internet

Instructor, Speaker, and Paradigm Shaker

21015 Forest Highlands CtAshburn, VA 20147

http://navigators.com

Phone : [email protected](put “training” in email subject)

navigators.com/parentguide.html

Page 2: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 2

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Online resources

• There are many websites ready to assist you

• Some sites are for adults while other sites are geared towards the kids.

Page 3: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 3

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Some Statistics…

• 87% of teenagers (12-17) use the internet

• 54% of internet-connected families with teens use filters

• 73% of online teens say their household computer is located in a public place inside the house.

• 62% of parents report checking up on their child’s surfing habits after he or she has gone online…

• …but only 33% of teens who use the internet from home say they believe their parents monitor their online activity.

• 65% of all parents and 64% of all teens say that teens do things online that they wouldn’t want their parents to know about.

• Myspace.com is ranked #6 in traffic

• There are 95 registered sex offenders in Loudoun County

1 in 5 kids online is sexually solicited.

Page 4: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 4

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/

MySpace.com traffic

= Registered Sex Offender’s Address

Page 5: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 5

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Common Home Set-ups

Phone Modem

Broadband Modem

Internet Gateway

Router

ISP / Internet

Dial-up Modem With a single PC- Temporary Connection

Broadband Modem With a single PC- Persistent Connection

Broadband Modem With multiple PCs- “Internet gateway router” may include extra features: Firewall, Wireless

getting_connected.html

Broadband Modem

Do you control when the Internet is connected?

Page 6: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 6

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/

Explore Your Router’s Features…

• Schedule the Internet to “turn off” automatically for whole house or specific computers

• Block specific “problem” websites. (not a good solution for everything)

• Add a password to your router to protect these settings

• Make notes, so you know how to change settings

Page 7: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 7

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Personal Firewalls

• A firewall should monitor incoming and outgoing traffic (windows XP firewall is incoming only)

• All firewalls require administration (set-up configuration, updates, making holes for applications)

• Change the default administrative password included in the firewall

• Firewall can block chat programs, and catch any new programs your kids might download

firewall.html

Page 8: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 8

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/

Software: Enforcing Time Limits

• A time-limit program can control when, and for how long, each application can be used. (i.e. AOL Chat = 30 minutes /day from 6pm-8pm) (source:www.pcmonitor.com)

Page 9: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 9

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Explore Your Web Browser Settings

• Internet Explorer = Tools Internet Options

• Netscape = Edit Preferences

Settings for Active X, scripts, etc

Cookies Settings

privacy.html

Page 10: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 10

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Sneaking around your filters…

• Kids may use anonymizers to get around your filters.

• Now your filter must also include the anonymizer’s address

• The “kids” are sharing these techniques with each other.

Page 11: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 11

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Eliminate search result “accidents”

• Search results may contain offensive sites

• Most search engines have a preference you can set to eliminate such accidents

• Use specialty search tools (i.e. library)

Page 12: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 12

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Web Browser History

• Hit “ctrl-h” to display your web browser’s History

• Clicking on a “folder” will show a list of web pages visited from that Website

• For a search engine, the search terms will also be displayed

• Clicking on an individual page icon will load that page now.

• “smart kids” can clear entire history, or delete specific entries in the history.

Page 13: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 13

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Kid’s E-mail and SPAM

• Kids will receive the same kind of spam you receive

• Teach kids to avoid posting their email on public webpages where a spammer’s robot will harvest it

• Most webmail offers user-selected levels of spam filtering

• Younger kids may be best served by “exclusive” option

Page 14: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 14

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Your ISP labels your connection

Most Internet connections label you based on geography. A stranger emailing with your child can probably determine that you are in Northern Virginia

persona.html

Page 15: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 15

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/What about the other applications?

• Many applications you use are “internet enabled”

• These applications carry your connection persona, and may have their own set of privacy and security settings

Internet Access Internet

privacy_other_apps.html

Page 16: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 16

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/AOL Instant Messenger

• Chat Programs offer lots of options

• Decide what settings are “best” for your child, and then verify these settings occasionally

Who is on your child’s buddy list?

Page 17: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 17

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Look for the options / settings

• Homework: Examine every application on your PC which is “internet aware”, you need to explore through every preference / option menu

• Your firewall settings are WORTHLESS, if your 12-year old enables your entire Hard disk to be shared with everyone who also uses that chat program, music swapper, etc.

privacy_other_apps.html

Page 18: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 18

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Blog = online diary / guestbook

• Millions of kids now have their own blog

• A blog may include all of the following

– Journal entries from your child

– Postings from friends

– Links to friend’s blogs

– Photographs (especially cool or outrageous ones)

– Personality tests – can be quite detailed

• Whatever gets posted, may be read by parent, teacher, coach, college admissions officer, sexual predator, etc.

Page 19: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 19

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Can you see the computer screen?

• Move the entire computer into family room / kitchen desk (if space allows)

• Leave Computer in den, but add a second Keyboard, Video, Mouse (KVM), connected via long cables

Family Room Den

Network cable

• KVM Extender can transmit KVM signals via a single thin network cable

VGA Extension Cable

PS2 Extension Cables (2)

VGA Cable

USB MouseUSB Keyboard

(VGA Splitter)

DenFamily Room

Page 20: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 20

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Summary

• Do nothing…

• Require password for internet access

• Time constraints on when access is available

• Move computer screen to a visible location

• Know what applications are being installed and how they are configured (AOL IM, Kazaa, hotmail – email filter options, etc, etc)

• Install parent control software

– Blacklists, vs. logs

– Monitoring web vs monitoring everything (key logger)

– Time limit specific applications such as chat

• Talk/listen to child – let them understand how they can be tracked – email articles to them about online predator cases.

• Yes this takes time and effort (welcome to parenting)

• Next, What about the neighbor’s computer, where your child goes instead?

• What happens when the child moves out?

navigators.com/parentguide.html

Your Options:

Page 21: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 21

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/

• Extra topics that anyone who owns a computer needs to

know….

Page 22: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 22

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Identity theft

• Identity theft occurs when someone has collected enough personal information about you, that they can “impersonate” you.

• They can use your identification information to access your existing financial accounts, investment accounts, etc.

• They can use your identification information to establish new accounts (checking, credit card, loans) based on your name/credit history.

• They run up debt, write bad checks, and then move on. All debt incurred is now yours.

• They can collect your personal Information through traditional means – dumpster diving, scam solicitations, corrupt employee.

• Now add the risk from Internet/PC usage:

• Hacker gains access to your PC: bank account information, investment software, cookies, auto-complete password, auto web form fill-ins’ and family genealogy (birth date, mother’s maiden name)

• Hacker gains access to your relative’s PC which has a genealogy program.

Identity Theft is the fastest growing crime in America9.900,000 victims during 2003

privacy.html

Page 23: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 23

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Spyware Statistics

Total number of PC scans: 1,483,517 Total instances of spyware found: 40,846,089 Instances of spyware per PC: 27.5

System Monitors

To date: 245,432

April: 60,873

March: 35,915

Trojans

To date: 257,761

April: 72,842

March: 38,385

Adware

To date: 7,642,556

April: 2,298,201

March: 1,262,078

Adware Cookies

To date 32,700,340

April 8,873,555

March 5,750,392

Results from EarthLink’s Spy Audit programs (1/1/04-4/30/04)

Source: www.earthlink.net/spyaudit/press/

Page 24: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 24

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/

Piggy Back Applications(Spyware, Adware)

• Some Free program include piggy-back programs (they provide revenue to the free program)

• For example: a stealth p2p network application is bundled with Kazaa

– Buried in the user agreement:

– "You hereby grant “Brilliant” the right to access and use the unused computing power and storage space on your computer/s and/or Internet access or bandwidth for the aggregation of content and use in distributed computing,"

• “Brilliant” now has the keys to your computer.

• 150 million copies of Kazaa have been downloaded.

• How hard would it be for a hacker to also access these capabilities?

privacy_other_apps.html

• Programs such as ad-aware (by lavasoft) and “Spybot Search and destroy”, can be used to identify /remove such programs.

Page 25: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 25

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Anti-Virus Software

• Every machine should have updated anti-virus software installed, and running

• AV software will occasionally scan every file on your machine for viruses

• AV software should automatically examine every incoming file (via, floppy disk, email attachment, web download, peer-to peer download)

• The heart of most AV programs is a “dictionary” of pre-defined viruses which is compared to your files. The dictionary may have over 60,000 definitions.

• AV programs will also monitor certain sensitive system resources for any changes – You may need to disable AV software when installing certain kinds of programs.

Important: the virus definition dictionary must to be updated frequently (Over 3,000 new viruses were discovered during the first half of 2002)

virus.html

Page 26: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 26

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Keep your system up to date

• My New Laptop, pre-loaded with Windows XP Professional, required 8.2 MB of Critical Updates the very first time I launched Windows Update.

• “windows update” requires Internet Explorer Version 5.01 or higher

privacy.html

Page 27: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 27

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Third Party cookies

Web pages can include graphics (and therefore cookies) from “third parties”

[email protected] history

[email protected]_phoneViewing history

badplace.comFake [email protected] history

Jokes.com ID#_201loan.com ID#_4873

badplace.com ID#_539

3p.com

3p.com ID#_435349

Your Cookies

[email protected] viewing [email protected]_phoneYour viewing historybadplace.comFake [email protected] viewing history

Buys/sells your data with its “partners”

Copyright navigators.com

The “third party site” can compile an extensive profile on you, and sell this information to companies that are online and offline.

Page 28: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 28

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Managing Cookies

• Older Browsers offered limited tools for managing cookies

• Third-party Software tools were developed to meet user’s needs

• Newest Browsers contain many more cookie management tools

Netscape 4.79 – edit -> preferences ->advanced Explorer 6.0 – Tools -> Internet Options

Nice Feature: You can explicitly allow cookies from specific web sites (i.e. amazon.com ) while blocking all other sites.

cookies.html

Page 29: Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet Instructor, Speaker, and Paradigm Shaker 21015 Forest Highlands.

Page 29

Russ Haynal/navigators.com/

Internet Instructor & Speaker

http:/Public Terminals

• Public terminals = Library, Kinkos, Hotel Lobby, Cyber Café, etc

• Is there any kind of consistent “administration” to guarantee the integrity of these computers?

For a public terminal, you should always assume that the machine has been compromised, and that a “keystroke logger” is quietly capturing all keystrokes. ( usernames, passwords, credit cards, etc)