/
Protecting your children online Protecting your children online

Protecting your children online - PowerPoint Presentation

emmy
emmy . @emmy
Follow
64 views
Uploaded On 2024-01-29

Protecting your children online - PPT Presentation

Brian D Wisniewski GCIH CISSP ITIL IAM Agenda Introduction 3 Key Concepts The Web The Deep Web amp The Dark Web Ages 47 Ages 810 Ages 1113 Ages 14 Resources 3 Key Concepts ID: 1043031

ages web social amp web ages amp social online license service facebook content girls twitter media www boys deep

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Protecting your children online" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1. Protecting your children onlineBrian D. Wisniewski, GCIH, CISSP, ITIL, IAM

2. AgendaIntroduction3 Key ConceptsThe Web, The Deep Web, & The Dark WebAges 4-7Ages 8-10Ages 11-13Ages 14+Resources

3. 3 Key Concepts

4.

5. Sobering Statistics93% of boys & 62% of girls have been exposed to internet pornography before the age of 18.76% of first encounters with online predators happen in chat rooms.40% of teens have seen pictures on social networking sites of kids getting drunk, passed out, or using drugs.39% of teens have posted sexually suggestive messages.83% of boys & 57% of girls have seen group sex online.18% of boys & 10% of girls have seen rape or sexual violence15% of boys & 9% of girls have seen child pornography.Source: Covenant Eyes 1/17/2012 & “Associated Press-MTV Digital Abuse Survey 8/2011 conducted by Knowledge Networks

6. The Web, The Deep Web, & The Dark Web

7. The Web, The Deep Web, & The Dark Web (cont’d)

8. The Web, The Deep Web, & The Dark Web (cont’d)

9. Ages 4 - 7

10. Ages 4 - 7

11. Ages 8 - 10

12. CyberbullyingUsing a computer to torment, threaten, harass, humiliate, embarrass, or target another childExamples of Cyberbullying:FlamingHarassmentDenigration Online Website Polls

13. Cyberbullying

14. Cyberbullying88% of teens have seen someone be mean or cruel to another person on a social network site.55% see other people just ignoring what is going on.38% of online girls report being bullied.26% of online boys report being bullied. 41% of older girls (15-17) report being bullied—more than any other age or gender group.Teens who spend more than 3 hours per school day on online social networks are 110% more likely to be a victim of cyber-bullying.Source: Covenant Eyes 1/17/2012

15. Ages 11 - 13Are they ready for Social Media or a Smart Phone?

16. Ages 11 – 13Social Media – Get Involved!

17. Making Your Profile PrivateSet Post-by-Post PrivacyDefault Privacy

18. Social Networking TipsSet Limits on Internet TimeDiscuss what not to share online:There are no secrets in cyber-spaceNothing can be deleted when put on the webBeware of cyber strangers:PredatorsCyberbullies

19. iPhone:Settings General Location Services and then either configure the location settings on a per-application basis or globally for all applications.Android:Open the camera program click the small icon that looks like a satellite dish set Store Location to "Off"Make the Right DecisionsDeactivate Geotagging

20. A Case Study

21. Ages 14+Instagram1. Privacy Settings2. Profile Appearance3. Location Share4. Following and Followers5. Help Your Children Understand the Privacy Features & Risks

22. Gaming

23. GamingSafety Tips

24. Ages 14+https://account.microsoft.com/family/about

25. Ages 14+

26. Mobile Telephones

27. Mobile Telephone Guidelines

28. Ages 14+

29. Ages 14+

30. Protect Your DevicesKeep Computers in an open areaInstall Full Security Suite (Anti-Virus/Firewall)Educate Children on Security Software and Not to Share Personal InformationInstall Latest Security PatchesLimit Administrator RightsUse Tough Passwords to CrackUse Nicknames, NOT Real NamesUse Good Judgment

31. A Note About Social MediaRealize most Social Media sites Terms of Service include "a worldwide, non-exclusive, royalty-free license (with the right to sublicense)“ on YOUR content. OCTOBER 1, 2007THIS is no “star is born” story for the digital age, though at first it may seem like one.One moment, Alison Chang, a 15-year-old student from Dallas, is cheerfully goofing around at a local church-sponsored car wash, posing with a friend for a photo. Weeks later, that photo is posted online and catches the eye of an ad agency in Australia, and Alison appears on a billboard in Adelaide as part of a Virgin Mobile advertising campaign. Four months later, she and her family are in Federal District Court in Dallas suing for damages.On the billboard, Alison’s friend has vanished and so has the Adidas logo on her hat. Her image is accompanied by a mocking slogan — according to the ad, Alison is the kind of loser “pen friend” (pen pal) whom subscribers will finally be able to “dump” when they get a cellphone.

32. A Note About Social Media (cont’d)FacebookWith over a billion users, Facebook is the definitive homepage for many web users. Its terms of service, data use and cookie use policy span more than 14,000 words over eight separate pages and would take even the quickest reader more than two hours to dig through. But what rights have you handed over to Facebook? Specifically for photos and video uploaded to the site, Facebook has a license to use your content in any way it sees fit, with a license that goes beyond merely covering the operation of the service in its current form. Facebook can transfer or sub-license its rights over a user’s content to another company or organization if needed. Facebook’s license does not end upon the deactivation or deletion of a user’s account, content is only released from this license once all other users that have interacted with the content have also broken their ties with it (for example, a photo or video shared or tagged with a group of friends). TwitterFast becoming the second social network behind Facebook, Twitter's model for monetizing the service has yet to be established, a fact clearly seen in its terms of service. Twitter's terms give it broad scope to use, change and distribute any photos, writing or video posted through Twitter's service, to any other forms of media or distribution method it wishes, including those which Twitter has not yet thought of or developed. Similarly to Facebook, Twitter's license also allows it to pass any of your content to any partner organizations for any reason.

33. Good ResourcesNational Cyber Security Alliance:www.staysafeonline.orgThink you know:www.thinkyouknow.co.uk/parentsNational center for missing and exploited children:www.netsmartz.org/ParentsChildnet International:www.childnet-int.orgFor advice, resources, facts, tools, etc.Ikeep Safe:www.ikeepsafe.org/for-parentsFor current topics, safe plans, parent how-to’s, etc.

34. Thank You!