880 likes | 1.47k Views
Technology: Friend or Foe? Robert Leri March 2006 Agenda Introductions Overview Online Threats for All Using the Internet Safely for Kids What the School District is Doing Closing Online Threats for All Let’s talk! Virus Spam Phishing SpyWare In addition to other online threats…
E N D
Technology: Friend or Foe? Robert Leri March 2006
Agenda • Introductions • Overview • Online Threats for All • Using the Internet Safely for Kids • What the School District is Doing • Closing
Online Threats for All • Let’s talk! • Virus • Spam • Phishing • SpyWare • In addition to other online threats…
Virus • What is a Computer Virus? • Self-replicating program • Attaches to other programs • Tries to avoid detection • Different infection categories • Two stages of infection: • Infection phase • Attack phase • Payload or payoff • Malicious or mischievous action
Virus Facts • Brain - first virus in the wild (1986) • Types • Macros, File Infectors, Trojans, System Sectors, • Worms, Hoaxes • Multiple infection categories • Means of infection • Email attachments • Spoofed e-mails from victim’s address book • Internet • Removable media (disks) • Purposes • Cracking • Payload
Preventing Virus Infections • Do not open files attached from an unknown, suspicious or untrustworthy source. • Do not open any files attached to an email unless you know what it is. • Do not open any files attached to an email if the subject line is questionable or unexpected. • Delete chain emails and junk email. • Do not download any files from strangers. • Exercise caution when downloading files from the Internet.
Preventing Virus Infections • Update your anti-virus software regularly. • Back up your files on a regular basis. • When in doubt, always err on the side of caution and do not open, download, or execute any files or email attachments. Not executing is the more important of these caveats. • Microsoft security located at http://www.microsoft.com/security.
What is Spam • It's a luncheon meat, kinda pink, comes in a can, made by Hormel. • Most Americans intuitively, viscerally associate "Spam" with "no nutritive or aesthetic value," though it is still relatively popular (especially in Hawaii) and can be found in almost any grocery store.) • The canned luncheon meat has its own newsgroup, alt.spam.
Spam Facts • There are approximately 80 “world class spammers” who pay on the order of US$100K/month for bandwidth and servers • 200 spam operations account for 90% of all spam • [Spamhaus, June 2004] • AOL rejects 80% of all incoming mail as spam; 80% of remaining is never opened (probably spam) for 96% total spam • [Carl Hutzler, AOL, personal communication, 2004] • Email volume increased 600% in 2003, all of it spam • [MAAWG, April 2004] • Zombie machines generate 90% of all spam
Stopping Spam? • Protect your computer • Spam is a growing source of computer viruses. • It's critical that you protect your computer from virus-carrying spam messages. • Install and regularly update antivirus and anti-spam software. • If you don't have the extra protection of a firewall, get it.
Stopping Spam? • Protect your email address • Reserve one email address for your trusted personal and business contacts. • Create a separate, expendable email address for other online uses. • Protect yourself • Don't try, don't buy and don't reply to spam. • Just delete it. • It's a great way to prevent receiving more spam in the future.
Adware • Adware is software that displays advertisements on your computer. • These are ads that inexplicably pop up on your display screen, even if you're not browsing the Internet. • Some companies provide "free" software in exchange for advertising on your display. • It's how they make their money.
Spyware • Spyware is software that sends your personal information to a third party without your permission or knowledge. • This can include information about Web sites you visit or something more sensitive like your user name and password. • Unscrupulous companies often use this data to send you unsolicited targeted advertisements.
Preventing Malware • New anti-virus software • Ad-Aware Personal • http://www.lavasoft.de/software/adaware • Spyware Exterminator • http://www.stompsoft.com/ • Microsoft • http://www.microsoft.com/windowsxp/using/security/expert/honeycutt_spyware.mspx
HELPING CHILDREN USE THE INTERNET POSITIVELY & SAFELY Arcadia Unified School District, March 2006
THIS PRESENTATION TAKING A BALANCED APPROACH ! Why is this issue important? What is so positive for Children? What are the dangers for Children? What can you do now? Practical resources + Questions
WHAT IS THE INTERNET LIKE FOR CHILDREN? Connects you to the world Like bringing a city into the home or classroom The good&The bad Let’s make sure the good outweighs the bad!
A bit about you…. How many of you have high speed internet access at home ? What sort of things do your children like doing on the internet ? What sort of concerns do you have about your children’s use of the internet ?
PART I IMPORTANT WHY IS THIS
Content Contact Commerce PART I 1) WHAT ARE THE DANGERS ? Whilst there are enormous benefits for children using the internet at home and at school there are potential dangers for children using the net unsupervised. These can broadly be grouped into 3 C s: • Threatening e-mails • Online bullying • Strangers in Chat rooms • Strangers posting to blogs • Pornography • Racist content • Inaccurate information • Blur betweenadvertising & content • Invasions of privacy & SPAM
PART I 2) ADULTS + CHILDREN USE THE NET IN DIFFERENT WAYS PARENTS Mostly e-mail and web for research YOUNG PEOPLE Interactive chat, IM, Music, Games, DO YOU KNOW HOW YOUR CHILD USES THE NET? WE NEED TO BE INVOLVED IN OUR CHILDREN’S ONLINE ACTIVITY, VALIDATE THEIR SKILLS & LEARN FROM THEM
PART I 3) THE DIFFERENCE BETWEEN KNOWLEDGE + WISDOM KNOWLEDGEMany children pick up technology quicker ! WISDOM Understanding how to behave in a virtual world HELP YOUR CHILDREN TO UNDERSTAND THE CONTEXT TECHNOLOGY IS THROWING UP NEW IMPORTANT SAFETY ISSUES WHICH CHILDREN MAY NOT SEE
PART I 4) SUPERVISED/UNSUPERVISED ACCESS POINTS IN SCHOOL Generally supervised, protected and monitored OUT OF SCHOOL Often no filtering, supervision or monitoring WE NEED TO DO MORE THAN SUPERVISE- WE NEED TO HELP EDUCATE CHALLENGE = to ensure that children are safe wherever they use the internet
PART II WHAT’S SO POSITIVE
Discover Connect Create WHAT CAN YOU DO WITH THE NET? • Search • Homework • Projects • The biggest library in the world • E-mail • Newsgroups communities and clubs • Chat • Blog • Brings kids together • Web sites • Text, art, music, photos, video... • Anyone can become a publisher
PART III WHAT ARE THE DANGERS
Content Contact Commerce THE DANGERS TO CHILDREN • Pornography • Racism • Inaccurate information • Threatening e-mail • Bullying • Paedophiles in chat rooms/blogs • Invasion of privacy • Blur between advertising & content
Promotes a demeaning view of women (& men) Encourages false fantasies Can be used to sexualise young children Addictive Easily available on the Net PORNOGRAPHY SMART TIP Consider using filtering Be careful to type in the correct web site address!
Web an ideal medium for small extreme groups Some pose as churches, or other “acceptable” groups Some target children RACIST & HATE SITES SMART TIP See www.adl.org for details of sites to avoid
Spoof sites URL mimickers eg www.microdoft.com Historical revisionist material Inaccurate health information INACCURATE CONTENT SMART TIP Look for source, date, links & references See www.quick.org.uk for helpful checklist
Chat –web based Instant Messaging Blogging Games – MOO, MUD, MUSH etc. Cyber sex Contact Interactive services online SMART TIP Get your kids to explain how chat, blogging & IM work!
What is Instant Messaging? • Instant Messaging (sometimes called “IM,” “IMing,” or “Messaging” ) is the ability to: • easily see whether a chosen friend or co-worker is connected to the internet and, if they are, • exchange text messages with them. • Instant Messaging differs from ordinary email in that the messages are delivered immediately, making dialog much easier than with email. Definition courtesy whatis.com
Other Common IM Features • ChatJoin a number of your contacts to exchange messages in a private chat room. • File transferSend and receive computer files. • News headlines or alertsInstant notification of breaking news. Source: Technology & Learning, 11/02, p.48
TalkSpeak directly to your contacts You need a sound card (standard on all computers these days) and a microphone. E-mail notificationThe IM system flags new e-mail Other Common IM Features Source: Technology & Learning, 11/02, p.48
Why is IM Important to Parents? • 74% of online teens use instant messaging. In comparison, 44% of online adults have used IM. • 45% of online teens use Instant Messaging each time they are online. • 69% of online teens use IM at least a few times each week. Data courtesy www.pewinternet.org
Why is IM REALLY Important to Parents? • 37% of online teens have used IM to write something that they would not have said in person. • 41% of online teens say they use email and instant messaging to contact teachers or classmates about schoolwork. Data courtesy www.pewinternet.org
Safety Concerns • IM is used in the grooming process because its more private than public chat rooms • IM and Chat are closely linked products and moving from one to another can take just one click • The alert function means that people know when you online.
Here are a few tips to avoid potential pitfalls: • Choose products with parental controls • Each IM product asks you to fill out a profile of yourself. Be sure not to include private information such as phone number and address or school name. • Never click on unknown or suspicious hyperlinks. • Never accept files, or send them to people that you don’t know. • Keep IM address secret in Chatrooms
THE DANGERS IN CHAT • You don’t know who people are • People lie about their age and other interests • Flattery can make kids feel important • Determined adults can seek abusive relationships • Contacts shift quickly to messaging, e mail and mobile phones • Chat is just a click away! E.g.
ONE FAMILY’S STORY.. My daughter was contacted starting in February this year by a pedophile whilst using a chat room. He quickly moved to e-mail and shortly afterwards sent her pornography, purporting to be pictures of himself. My daughter was just 12 at this time. After grooming her for some weeks, he made telephone contact and eventually persuaded her to miss school and meet him. In total, he met her five times and took her back to his flat where she was sexually abused… … I have worked in the computer industry for 18 years, latterly with the Internet, and had no idea what went on in these chat rooms. Surely there is some regulatory body that can make the ISPs monitor at least the teenage chat rooms to make sure kids aren’t in danger…. Perhaps you can offer some guidance?”
Aimed at chat users and parents Celebrity introduction Cartoons and a chat safety banner in open source html Simple non-technical language for parents The response to this case www.chatdanger.com
Blog is short for web log Personal journal often open for commenting Blogging: Asynchronous chat & static web pages SMART TIP Review the content of your child’s blog and know security/access settings..
Blogging: The Great News • A friendlier look and feel from message boards • The control given to the blog's creator. • Viewing blogs can be an easy way to access advice and thoughts from experts and leaders in highly-specialized areas and fields. • Viewing and initiating blogs can provide opportunities to connect, share resources and network within a community of people who share similar interests. • Blogs allow for information to be quickly posted on the Web, making them much easier to update daily.
Blogging: The Not-So-Great News • Since most weblogs aren't edited, it's difficult to know how credible the information is. • Information shared in blogs may be too subjective or trivial to be meaningful in any kind of educational way. • Blogs may provide easy access to offensive content. • Young bloggers may put themselves at risk by sharing too much personal information.