SlideShare una empresa de Scribd logo
1 de 57
Keeping out of harm’s way on the Internet Some advice and guidance from  Data Doctors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHY IS THIS Overview IMPORTANT
PARENTS  Mostly e-mail and web for research  DO YOU KNOW HOW YOUR CHILD USES THE NET?   WE NEED TO BE INVOLVED IN OUR CHILDREN’S ONLINE ACTIVITY, VALIDATE THEIR SKILLS & LEARN FROM THEM  YOUNG PEOPLE  Interactive chat, IM, Music, Games,  2) ADULTS + CHILDREN USE THE NET IN DIFFERENT WAYS   Overview
KNOWLEDGE   Many children pick up technology quicker !   HELP YOUR CHILDREN TO UNDERSTAND THE CONTEXT   TECHNOLOGY IS THROWING UP NEW  IMPORTANT SAFETY ISSUES WHICH CHILDREN MAY NOT SEE WISDOM Understanding how to behave in a virtual world   3) THE DIFFERENCE BETWEEN KNOWLEDGE +  WISDOM   Overview
IN SCHOOL  Generally supervised, protected and monitored   WE NEED TO DO MORE THAN SUPERVISE-  WE NEED TO HELP EDUCATE CHALLENGE = to ensure that children are safe wherever they use the internet  OUT OF SCHOOL Often no filtering, supervision or monitoring  4) SUPERVISED/UNSUPERVISED ACCESS POINTS   Overview
Benefits WHAT’S SO   POSITIVE
WHAT CAN YOU DO WITH THE NET? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Discover Connect Create
WHAT WE DID WITH THE PUPILS THIS AFTERNOON
Three examples which shows the power of the Net for children to … Discover  Connect  Create
Risks WHAT ARE THE  DANGERS
THE DANGERS TO CHILDREN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Content Contact Commerce
PORNOGRAPHY   ,[object Object],[object Object],[object Object],[object Object],[object Object],SMART TIP Consider using filtering  Be careful to type in the correct web site address!
RACIST & HATE SITES ,[object Object],[object Object],[object Object],See  www.adl.org  for details of sites to avoid SMART TIP
INACCURATE CONTENT ,[object Object],[object Object],[object Object],[object Object],Look for source, date, links & references See  www.quick.org.uk  for helpful checklist SMART TIP
Interactive services online ,[object Object],[object Object],[object Object],[object Object],[object Object],Get your kids to explain how chat and IM work! SMART TIP Contact
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Different Types of Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why do people make Spyware? ,[object Object],[object Object],[object Object],[object Object],[object Object]
How do I know if I’ve got Spyware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
What does Spyware look like?
How do I prevent Spyware? ,[object Object],[object Object],[object Object]
The Least Wanted List ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do I get rid of Spyware? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object],[object Object],[object Object]
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
Phishing Examples
How secure do you need to be? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safer Alternatives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Microsoft Issues Patches, but Users Don’t Apply Them Forrester Research Report April 3, 2003
What Can YOU Do? ,[object Object],[object Object]
Top Ten Count Down 10 9 8 7 6 5 4 3 2 1
10. Check your computer security regularly ,[object Object],[object Object],[object Object],[object Object],[object Object]
9. Disconnect from the Internet when not in use ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
8.  Don’t share access to your computer with strangers ,[object Object],[object Object],[object Object],[object Object],[object Object]
7. Back up regularly ,[object Object],[object Object],[object Object],[object Object],[object Object]
6. Use smart passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
5. Download and install security patches for your computer ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],4. Protect your computer: use firewalls
3. Use care when reading email and downloading files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2.  Use antivirus/Spyware software,  and keep it up to date ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top Ten Tips Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Homejaysonstreet
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and SafetyConor O'Neill
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 

La actualidad más candente (20)

How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Internet safety
Internet safetyInternet safety
Internet safety
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Internet safety
Internet safetyInternet safety
Internet safety
 

Similar a Protect Yourself From Internet Pests

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafetyteachesict
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet SecurityZoaib Mirza
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 

Similar a Protect Yourself From Internet Pests (20)

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Promote Education Internet Security
Promote Education Internet SecurityPromote Education Internet Security
Promote Education Internet Security
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
IT Security
IT SecurityIT Security
IT Security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
What is malware
What is malwareWhat is malware
What is malware
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 

Protect Yourself From Internet Pests

Notas del editor

  1. Hello and welcome. I am (Insert Name) from (Insert Name of Organization). Today I am going to share with you some important information about computers, the Internet and how we can all work together to keep kids safe online. This presentation and the accompanying brochures have been provided by the Surfwatch Safety Partnership, a group that is committed to educating parents, families and communities about ways to safeguard children online.
  2. But you have to be careful with email too. Dangerous strangers have been known to use email to create ‘a relationship’ with children. Often, they will assume a false identity, posing as a youngster themselves to build trust with children online. Another thing to watch for is spam. Like the ‘junk mail’ you get in your mail box at home, spam is unwanted email that is trying to sell you merchandise or services. Pornographic spam is very common and it often contains explicit photographs and links to pornographic Web sites. Another very real, and increasingly common, risk is having your computer damaged by a virus. Viruses are little ‘bits’ of computer code that, when let loose in your computer when an email is opened, can do anything from creating a harmless message on your screen to ‘crashing’ your hard drive, in effect making your computer breakdown completely and irreparably.
  3. Image –Again this illustrates how the Internet puts the whole world in the hands of children – we are giving them access to this world through the Internet – awesome responsibility but wonderful opportunity. – I suppose the question is do you know what world they are accessing ? This photo was taken of a real parent’s hand and child (friends of Childnet).
  4. A lot of adults use the net for e-mail, research and purchasing things, while most young people see simply “surfing” as passé and want to use the interactive features such as games, and chat building online communities and develop their own space. Do you as a parent know really know what your child is doing online ? Because of new Internet applications such as Chat, IM, peer-to-peer networks etc, it is increasingly important that children understand the online safety issues and know how to respond to the potential dangers whatever application they are using on the Internet. Very important for us to validate the skills which young people are using in accessing the Internet.
  5. It’s good to start by looking at why this is important, and get a general picture of how our children approach technology.   There is no doubt that kids are very quick to gain the basic technical skills – if you like the knowledge – about how to find their way around computers and the net. They are much quicker than adults, as anyone who has taken their 10 year old on at a computer game will know.   BUT, and it is a big BUT that is not the same as wisdom. Knowing how to drive a car does not make you a safe driver. Looking old enough to get into a nightclub doesn’t mean you will handle the situation well. If the Internet is like letting a city into your home, then your children need to learn how to handle that city, how to behave online and get the best from the Net.   This gap between wisdom and knowledge needs to be bridged. Put at it’s simplest it is about good parenting. You may not be the greatest technical whiz but you are a parent, and you help your child through adolescence on many other issues. So we need to get alongside our kids, especially from their first ventures online.   That will help us all as technology is changing rapidly and we can all learn together. Don’t be afraid to learn technical tips from your kids – and then maybe they will pick up some life skills tips from you!
  6. This point is very simple but helps to highlight the challenge. You could ask for a show of hands as to how many parents use a filtering product on their computer at home. A similar analogy for showing why schools are concerned about this subject is smoking. – Many years ago a school might have said we don’t have a problem with smoking because children are banned from smoking on the premises ! – clearly it is a huge health and safety issue which children need to understand – similarly with the Internet – even aspects of the Internet which we don’t use in school.
  7. Link to this section by saying that part of the challenge is that when you hear scare stories and hear about how the Internet has been used to harm children it is vital to remind ourselves just why this medium is so valuable to schools and families as they support and teach young children. We hope that this next section will really inspire you and excite you as to how Children themselves are making the best out of the net.
  8. Call out the words Discover, Connect and Create as they appear and then go through each one individually. Discover – give an example of a useful piece of information you can find online that would be very difficult to get offline eg the temperature today in London, headlines in an Australian Newspaper Connect – other media can provide information but the Internet also puts children in direct touch with each other. Much cheaper than phoning, much quicker than writing using the post. Create – now anyone with access to the net can publish. – very exciting for schools – have a look at Bonjour.org a wonderful French language teaching resource written by an individual French teacher working here in the UK ! – (a Childnet award winning projects)
  9. The Staying SMART online module introduction at www.kidsmart.org.uk is very good at illustrating 8 key things which young people love about using the Internet. – you could ALT TAB to this website if you have internet connection or you can order it from Childnet on a CD rom. When Childnet staff run the session in the school we introduce this section as explaining what we did in the classroom earlier in the day. – (And what we learnt about the children about their parent’s use of the Internet !!! )
  10. Say that it would be great if we could just stop the presentation at that point and all go home. But sadly there are dangers on the Internet for children and this next section helps us look carefully at some of these dangers.
  11. Allow the three dangers to emerge and speak them out emphasizing the first letter C. This will help people remember them. Go through each danger individually reminding people of the city image. Content – the most searched for word on the internet is Sex. It is now estimated that at least 200,000 US citizens are addicted to pornography on the Internet. But there are other problems – the issue of inaccurate information could be very serious if your child took bad advice on a health problem. Contact – a parent’s worst fear is that another adult might try and contact their child and then meet them offline – this is very rare but sadly it has happened. Commerce – the increasing commercial nature of the Internet means your children may be tempted to fill in their personal details in all sorts of places on the web and end up getting marketing information you wouldn’t want them to see.
  12. Pornography has been available for many years, but the Internet has made it much more available.Indeed the porn industry has led the way in internet technology – (credit card purchasing, streaming and webcams, pop ups and “toaster adverts” etc. Reality is that people can now access more pornography – without leaving their own homes; without paying for it; and they can keep pictures stored in a place others may not find it.   Say that the two examples are www.whitehouse.com - remind people how close this is to the www.whitehouse.gov site they looked at earlier. Just three letters difference. Shows how children can access it by mistake. The other example is of a bizarre site called www.nakednews.com on which news readers read serious news but take their clothes off as they are doing it.   Many parents can be shocked when they first go on the Internet because they think that some material such as pornography should be illegal. Because the Internet is an international medium, and in many countries pornography is openly allowed, most of the material is perfectly legal in the country where it originates. But that does mean that it doesn’t cause harm and that it is accessible by children. But why should we be concerned if our children see pornography: Porn is not about beauty or seeing women or men as a whole – just about the physical vital statistics. Therefore it encourages a false and unachievable fantasy about sex with women or men at any time, in any place, in the way you want it. Porn can be used by pedophiles to make young children think that they too should undress and engage in sex. And porn can be addictive.   The SMART tip here illustrates that a good filtering package can help block a great deal, but important to stress that lots of porn can come as attachments in hotmail accounts and that some children can get around filtering packages. Also be careful to use favorites files and type in correct website address !
  13. Pornography is not the only kind of problem on the web. There also many sites which promote racism and hatred. We should not be surprised by this… the Internet is a fantastic tool for bringing together people with a very specialist interest, enabling them to find each other and then communicate. That can of course have a very positive value, but it is also true of extreme minority political groups. And on the web, it is easy to pose as something that appears acceptable – eg the graphic relates to the worldwide church of the Creator. Some of these groups sadly target children – point to web capture on screen.   Smart tip is that if you want to see a complete list and further information on sites of concern look at the Anti Defamation League site – www.adl.com
  14. As well as racist sites some sites can also be misleading or include blatant inaccurate content. For example: Spoof sites are those that pretend to be the real thing but in fact are mere imitations, often taking positions that are the opposite of those that the real site supports. Then there are URL mimickers who register a URL that is slightly different to one that attracts a lot of traffic eg dinsey.com and most famous of all whitehouse.com rather than whitehouse.gov. A local example is class95.com – a porn site rather than the Singapore radio station. Web sites can offer inaccurate material that rewrites history – the illustrated site – www.martinlutherking.org provides a very inaccurate view of the great man’s life. Such inaccuracies can be very important if they concern topics that impact on personal safety and well being e.g. health information. Kids should be advised to be very careful about medical information online.   Smart tips suggests that ways of checking out sites are to look for who published them – the source; when they were last updated (in case the information is out of date); who is linked to the site – you can search for this in google with link: and then the URL. Links provide evidence of third party endorsement; and finally any references on the site – corroborating information and its source.
  15. Many adults think of the Internet primarily as either a tool for e-mail or for finding information on the web. Children are huge users of a third Internet application – interactive services. The difference with these forms of service is that they are in real time i.e. you are in touch with people who are online at the same time as you are. Under this heading I want to talk about CHAT – for having a conversation with a large number of people - very widely used sometimes from well known web sites (eg singnet) and sometimes using software you can download called IRC – Internet Relay Chat. Instant Messaging – this is for talking one to one usually to people you know. Like Chat there are commercial programmes from companies like Yahoo!, AOL, and Microsoft and also more general software called ICQ – which stands for I Seek You . Games – with wonderful acronyms like MOO, MUD and MUSH, use chat as a means of allowing interaction between players Mobile phones – SMS text messages are very popular with teenagers and now you can chat using your handphone as well Cybersex – this is a particular use of interactive services, especially messaging, to fantasize about sex
  16. But you have to be careful with email too. Dangerous strangers have been known to use email to create ‘a relationship’ with children. Often, they will assume a false identity, posing as a youngster themselves to build trust with children online. Another thing to watch for is spam. Like the ‘junk mail’ you get in your mail box at home, spam is unwanted email that is trying to sell you merchandise or services. Pornographic spam is very common and it often contains explicit photographs and links to pornographic Web sites. Another very real, and increasingly common, risk is having your computer damaged by a virus. Viruses are little ‘bits’ of computer code that, when let loose in your computer when an email is opened, can do anything from creating a harmless message on your screen to ‘crashing’ your hard drive, in effect making your computer breakdown completely and irreparably.
  17. Computer security settings are basically those setting that deal with security concerns. Why?: You may configure your computer to do something and it gets automatically changed mention the “trade off”: more opportunities/features more risks… How?: Verify browser settings, email configuration, etc. what is the difference between “high” and “low”
  18. Why?: - “Can’t get infected if you’re not connected” - When the PC is connected there is a path to the whole world Mention Pro/Cons: Pro: No risk when not connected. Cons: May loose services and contacts when offline (e.g. VoIP, IM) How?: -Turn off your PC at night!
  19. What?: Your OS may allow other computers on a network to access the hard-drive of your computer in order to “share files”. Why?: This ability can be used to infect your computer or simply view documents in your computer Ex: Windows file sharing, Peer-to-peer applications
  20. Why?: -You may loose data - How much data are you willing to loose? How?: -Back up regularly -Make sure you’re able to restore from the backup -Have a start-up disk handy
  21. Most major software companies today release updates and patches to close newly discovered vulnerabilities in their software. Sometimes bugs are discovered in a program that may allow a criminal hacker to attack your computer Why?: - Bugs exist in software, and solutions are found for those bugs. These solutions need to be installed on top of the application How?: - Check Vendor Websites - Ensure you are getting the patches from a trustworthy site - You may install a utility that does the job for you.
  22. Antrax: during the 2001
  23. Why?. New virus emerging daily, so anti-virus programs need regular updates to recognize these new viruses. Antrax: during the 2001
  24. Why?: Learn how to avoid infections and you need to know what to do in case your computer gets infected. How?:- Learn cyber security practices and apply them - Educate the people around you Ex: - Attend conferences like this, learn about cybersecurity