Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3....
-
Upload
gerard-lambert -
Category
Documents
-
view
221 -
download
1
Transcript of Internet Safety. Nine (9) Dangers on the Internet 1. Identity theft 2. Phishing & Pharming 3....
Internet Safety
Nine (9) Dangers on the Internet1. Identity theft
2. Phishing & Pharming
3. Hacking4. Drive by downloads (don’t click on everything)
5. Pop ups (don’t click on everything)
6. Pornography
7. Cyberbullying
8. Predators
9. Posting
Dangers on the Internet Defined
Identity theft occurs when someone uses another person's personal information such as name, Social Security number, driver's license number, credit card number, or other identifying information to take on that person's identity in order to commit fraud or other crimes.
Dangers on the Internet DefinedPHARMING
Using fake web sites to attempt to gather personal information
PHISHINGUsing fake emails to attempt to gather personal
information
Example: An email from your bank comes claiming there is a security issue with your account. They ask you to complete the form attached and send it to them. The form asks for your name, address, bank account number….Uh oh!
Dangers on the Internet Defined
Hacking is using a computer to gain unauthorized access to data in a system
Drive by DownloadsA drive-by download is when a malicious web site you visit downloads
and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control. This is currently the most prevalent threat, and one that is hard to guard against.
Dangers on the Internet Defined
Pop UpsSmall internet windows that pop up on your screen can be
useful, annoying or dangerous – often used by advertisers to get your attention or by viruses to trick you into clicking on them.
PornographyInternet porn is sexually explicit content made available
online in various formats including images, video files and video games.
Dangers on the Internet DefinedCyberbullying: Cyberbullying is the use of
technology to harass, threaten, embarrass, or target another person
Defining Cyberbullying
How do you respond to cyber threats or bullying?1. Ignore, don’t respond
2. Block them
3. Tell someone
WWW.STOPCYBERBULLYING.ORG
Two Kinds of Cyberbullying
A. Direct attacks
(messages sent to you directly)
B. By proxy
(using others to help cyberbully the victim, either with or without the accomplice’s knowledge)
Direct Attack Cyberbullying 1. Instant Messaging/Text Messaging
Harassment
2. Stealing Passwords
3. Blogs
4. Web Sites
From STOP BULLYING.ORG
5. Sending Pictures through E-mail and Cell Phones a) There have been cases of teens sending mass e-mails to other users, that include nude or degrading pictures of other teens. Once an e-mail like this is sent, it is passed around to hundreds of other people within hours; there is no way of controlling where it goes.
b) Many of the newer cell phones allow kids to send pictures to each other. The kids receive the pictures directly on their phones, and may send it to everyone in their address books. After viewing the picture at a Web site, some kids have actually posted these often pornographic pictures on Kazaa and other programs for anyone to download.
c) Kids often take a picture of someone in a locker room, bathroom or dressing room and post it online or send it to others on cell phones.
6. Internet Polling
7. Interactive Gaming
8. Sending Malicious Code
9. Sending Porn and Other Junk E-Mail and IMs
From STOPBULLYING.ORG
10. Impersonation Posing as the victim, the cyberbully can do considerable damage . They may post a provocative message in a hate group's chatroom posing as the victim, inviting an attack against the victim, often giving the name, address and telephone number of the victim to make the hate group's job easier. They often also send a message to someone posing as the victim, saying hateful or threatening things while masquerading as the victim. They may also alter a message really from the victim, making it appear that they have said nasty things or shared secrets with others.
Cyberbullying by proxy
Cyberbullying by proxy is when a cyberbully gets someone else to their dirty work.
Most of the time the accomplices don’t know they are being used by a cyberbully
This is the most dangerous type of cyberbullying because it often gets adults involved in the harassment and people who don’t know they are dealing with a kid.
Cyberbullying by proxy
Examples: The most typical way a cyberbullying by proxy attack occurs is when the cyberbully
gets control of the victim's account and sends out hateful or rude messages to everyone on their buddy list pretending to be the victim. They may also change the victim's password so they can't get into their own account. The victim's friends get angry with the victim, thinking they had sent the messages without knowing they have been used by the cyberbully. But it's not always this minor. Sometimes the cyberbully tries to get more people involved.
For example...Mary wants to get Jennifer back for not inviting her to her party. She goes online and, posing as Jennifer, posts "I hate Brittany, she is so stupid, ugly and fat!" on buddyprofile.com. Mary may tell Brittany and her friends that she read the post on buddyprofile.com and blames Jennifer for being mean. Brittany and her friends now start attacking Jennifer, and may report her to buddyprofile.com or her school. They are doing Mary's dirty work for her. Mary looks like the "good guy" and Jennifer may be punished by her parents, lose her account with buddyprofile.com and get into trouble at school. And Brittany and her friends may start to cyberbully Jennifer too.
Cyberbullying by proxy
Examples: Sometimes it is much more serious than that. When cyberbullies want to get others to do their
dirty work quickly, they often post information about, or pose as, their victim in hate group chat rooms and on their discussion boards. Cyberbullies have even posted this information in child molester chat rooms and discussion boards, advertising their victim for sex. They then sit back and wait for the members of that hate group or child molester group to attack or contact the victim online and, sometimes, offline.
For this to work, the cyberbully needs to post offline or online contact information about the victim. Real information, not the account they used to impersonate the victim (if they are posing as the victim to provoke an attack). For example...Jack is angry that Blake was chosen as captain of the junior varsity basketball team. Blake is black. Jack finds a white supremist group online and posts in their chat room that Blake said nasty things about whites and their group in particular. He then posts Blake's cell phone number and screen name. People from the group start calling and IMing Blake with threats and hateful messages. Jack has no idea how much danger he has placed Blake in, and Blake doesn't know why he in under attack. In cases of cyberbullying by proxy, when hate or child molester groups are involved, the victim is in danger of physical harm and law enforcement must be contacted immediately.
Assessing Threats
The only difference between “cyberbullying” and cyber-harassment is the age of both the victim and the perpetrator. Both have to be underage for it to be bullying.
Dangers on the Internet continuedPredator: One that victimizes, plunders, or destroys,
especially for one's own gain. The online predator is a criminal who uses the Internet to steal personal information or search for victims. Crimes that involve online predators include identity theft, stalking, kidnapping and child sex abuse.
Promises Julie’s Journey
Survivor Diaries
Kacie was a 13 year old little girl that lived in a small rural area Arkansas. Kacie was a 7th grade student where she was an honor student. Kacie lived with her father Rick and one of her brothers, 19 year old Tim.
On December 3, 2002 Kacie was at home alone while her father, a police officer, was at work and her brother had gone to the college library. Tim returned to the home to find Kacie missing.
Kacie’s family knew that Kacie would never leave the home without first contacting them so they expected something to be wrong from the beginning.
The family involved law enforcement immediately. A massive investigation involving the Arkansas State Police, FBI, and every law enforcement agency in Faulkner County lead to the fact that Kacie was abducted by an Internet predator. The predator was posing as a 17 year from California but was in fact a 47 year old man.
Law enforcement moved quickly and did everything they could to bring Kacie home safely. In less than 20 hours they had a suspect, a suspect vehicle and had located the predator and Kacie.
Kacie was found in a van located inside a mini storage building in Conway Arkansas. Kacie had been shot in the head and her abductor shot himself when law enforcement officers arrived on the scene.
Kacie was abducted and murdered by an internet predator. Someone that Kacie thought was her friend. Internet predators are hiding behind your computer screen right now, waiting for their next victim.
Anything you post online, anyone can see
Dangers of the Internet
Posting : Sharing information or photos that can be used to track your location (geo-tagging), like where you live, or revealing things that can be made public and you can never make them private again.
personal informationTwo kinds of stupid
Teens and Sexting
May of last year, we first brought you news of an emerging trend among young people—the sharing of sexual images and texts through cell phones, commonly known as SEXTING. Due to the widespread availability of mobile technology, the sky-high hormone levels of young people, and the difficulty that they can have understanding the consequences of their decisions, not-so-innocent text messages are being sent from cell phones all over America.
It’s particularly distressing when the consequences of sexting get so out of hand that a teenager feels the only solution is suicide. When Jesse Logan pressed ‘send’ from her cell phone, she did not imagine that an audience beyond her boyfriend would receive her nude pictures. (Sexting article, People Magazine)
Sexting continued… THINK ABOUT THE CONSEQUENCES of taking, sending, or forwarding a
sexual picture of someone underage, even if it’s of you. You could get kicked off of sports teams, face humiliation, lose educational opportunities, and even get in trouble with the law.
NEVER TAKE images of yourself that you wouldn’t want everyone—your
classmates, your teachers, your family, or your employers—to see. BEFORE HITTING SEND, remember that you can’t control where this
image may travel. What you send to a boyfriend or girlfriend could easily end up with their friends, and their friends, and their friends…
IF YOU FORWARD a sexual picture of someone underage, you are as
responsible for this image as the original sender. You could face child pornography charges, go to jail, and have to register as a sex offender.
REPORT any nude pictures you receive on your cell phone to an adult you
trust. Do not delete the message. Instead, get your parents or guardians, teachers, and school counselors involved immediately
Keeping Yourself Safe While Online
1. Safe UsernameWhat makes a username safe? Unsafe?
2. Protect personal informationNever give out your
Social Security Number
Address
School
Phone #
Age or Birthdate
NAME
Staying Safe While Online continued
3. Never meet in-person with anyone you have “met” online without discussing it with your parents.Parents agree to the meetingParents go with youMeeting is in a public place
Staying Safe continued
4. Use privacy settings for social networking sites like FacebookKeep friends safe too! Don’t chat and include
information that may give out too much of their information
Know that seemingly “safe information” can be piece of a puzzle that helps a predator find you or your friend
Anything you post a “friend” or “friend of a friend” can save on their computer forever
Staying Safe continued
5. Ignore online bullies. Report.
6. Chat only with people you know in the physical world
7. Use firewalls and pop-up blockers, etc.
8. Be careful about what you post
9. Create secure PasswordsHow do you create a safe password?
Creating a SAFER password
Use letters and numbersMixture of uppercase/lowercase lettersInclude symbols (shift key)Make it a minimum of 8-12 characters – no maxDo not use your favorite hobby, like Chess143,
pet’s name, or other things that might be easily guessed
Change your password oftenDon’t share your password or write it down
STAY SAFE!
Review
Now, you tell me –
What are the basics of staying safe while using technology like
computers, cell phones, gaming devices??