Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet...
-
Upload
anthony-wilkerson -
Category
Documents
-
view
216 -
download
0
Transcript of Safety Issues for Online Kids (and the rest of the family) Rev. 09/2006 Russ Haynal Internet...
Safety Issues for Online Kids (and the rest of the family)
Rev. 09/2006
Russ Haynal Internet
Instructor, Speaker, and Paradigm Shaker
21015 Forest Highlands CtAshburn, VA 20147
http://navigators.com
Phone : [email protected](put “training” in email subject)
navigators.com/parentguide.html
Page 2
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Online resources
• There are many websites ready to assist you
• Some sites are for adults while other sites are geared towards the kids.
Page 3
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Some Statistics…
• 87% of teenagers (12-17) use the internet
• 54% of internet-connected families with teens use filters
• 73% of online teens say their household computer is located in a public place inside the house.
• 62% of parents report checking up on their child’s surfing habits after he or she has gone online…
• …but only 33% of teens who use the internet from home say they believe their parents monitor their online activity.
• 65% of all parents and 64% of all teens say that teens do things online that they wouldn’t want their parents to know about.
• Myspace.com is ranked #6 in traffic
• There are 95 registered sex offenders in Loudoun County
1 in 5 kids online is sexually solicited.
Page 4
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/
MySpace.com traffic
= Registered Sex Offender’s Address
Page 5
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Common Home Set-ups
Phone Modem
Broadband Modem
Internet Gateway
Router
ISP / Internet
Dial-up Modem With a single PC- Temporary Connection
Broadband Modem With a single PC- Persistent Connection
Broadband Modem With multiple PCs- “Internet gateway router” may include extra features: Firewall, Wireless
getting_connected.html
Broadband Modem
Do you control when the Internet is connected?
Page 6
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/
Explore Your Router’s Features…
• Schedule the Internet to “turn off” automatically for whole house or specific computers
• Block specific “problem” websites. (not a good solution for everything)
• Add a password to your router to protect these settings
• Make notes, so you know how to change settings
Page 7
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Personal Firewalls
• A firewall should monitor incoming and outgoing traffic (windows XP firewall is incoming only)
• All firewalls require administration (set-up configuration, updates, making holes for applications)
• Change the default administrative password included in the firewall
• Firewall can block chat programs, and catch any new programs your kids might download
firewall.html
Page 8
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/
Software: Enforcing Time Limits
• A time-limit program can control when, and for how long, each application can be used. (i.e. AOL Chat = 30 minutes /day from 6pm-8pm) (source:www.pcmonitor.com)
Page 9
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Explore Your Web Browser Settings
• Internet Explorer = Tools Internet Options
• Netscape = Edit Preferences
Settings for Active X, scripts, etc
Cookies Settings
privacy.html
Page 10
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Sneaking around your filters…
• Kids may use anonymizers to get around your filters.
• Now your filter must also include the anonymizer’s address
• The “kids” are sharing these techniques with each other.
Page 11
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Eliminate search result “accidents”
• Search results may contain offensive sites
• Most search engines have a preference you can set to eliminate such accidents
• Use specialty search tools (i.e. library)
Page 12
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Web Browser History
• Hit “ctrl-h” to display your web browser’s History
• Clicking on a “folder” will show a list of web pages visited from that Website
• For a search engine, the search terms will also be displayed
• Clicking on an individual page icon will load that page now.
• “smart kids” can clear entire history, or delete specific entries in the history.
Page 13
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Kid’s E-mail and SPAM
• Kids will receive the same kind of spam you receive
• Teach kids to avoid posting their email on public webpages where a spammer’s robot will harvest it
• Most webmail offers user-selected levels of spam filtering
• Younger kids may be best served by “exclusive” option
Page 14
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Your ISP labels your connection
Most Internet connections label you based on geography. A stranger emailing with your child can probably determine that you are in Northern Virginia
persona.html
Page 15
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/What about the other applications?
• Many applications you use are “internet enabled”
• These applications carry your connection persona, and may have their own set of privacy and security settings
Internet Access Internet
privacy_other_apps.html
Page 16
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/AOL Instant Messenger
• Chat Programs offer lots of options
• Decide what settings are “best” for your child, and then verify these settings occasionally
Who is on your child’s buddy list?
Page 17
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Look for the options / settings
• Homework: Examine every application on your PC which is “internet aware”, you need to explore through every preference / option menu
• Your firewall settings are WORTHLESS, if your 12-year old enables your entire Hard disk to be shared with everyone who also uses that chat program, music swapper, etc.
privacy_other_apps.html
Page 18
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Blog = online diary / guestbook
• Millions of kids now have their own blog
• A blog may include all of the following
– Journal entries from your child
– Postings from friends
– Links to friend’s blogs
– Photographs (especially cool or outrageous ones)
– Personality tests – can be quite detailed
• Whatever gets posted, may be read by parent, teacher, coach, college admissions officer, sexual predator, etc.
Page 19
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Can you see the computer screen?
• Move the entire computer into family room / kitchen desk (if space allows)
• Leave Computer in den, but add a second Keyboard, Video, Mouse (KVM), connected via long cables
Family Room Den
Network cable
• KVM Extender can transmit KVM signals via a single thin network cable
VGA Extension Cable
PS2 Extension Cables (2)
VGA Cable
USB MouseUSB Keyboard
(VGA Splitter)
DenFamily Room
Page 20
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Summary
• Do nothing…
• Require password for internet access
• Time constraints on when access is available
• Move computer screen to a visible location
• Know what applications are being installed and how they are configured (AOL IM, Kazaa, hotmail – email filter options, etc, etc)
• Install parent control software
– Blacklists, vs. logs
– Monitoring web vs monitoring everything (key logger)
– Time limit specific applications such as chat
• Talk/listen to child – let them understand how they can be tracked – email articles to them about online predator cases.
• Yes this takes time and effort (welcome to parenting)
• Next, What about the neighbor’s computer, where your child goes instead?
• What happens when the child moves out?
navigators.com/parentguide.html
Your Options:
Page 21
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/
• Extra topics that anyone who owns a computer needs to
know….
Page 22
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Identity theft
• Identity theft occurs when someone has collected enough personal information about you, that they can “impersonate” you.
• They can use your identification information to access your existing financial accounts, investment accounts, etc.
• They can use your identification information to establish new accounts (checking, credit card, loans) based on your name/credit history.
• They run up debt, write bad checks, and then move on. All debt incurred is now yours.
• They can collect your personal Information through traditional means – dumpster diving, scam solicitations, corrupt employee.
• Now add the risk from Internet/PC usage:
• Hacker gains access to your PC: bank account information, investment software, cookies, auto-complete password, auto web form fill-ins’ and family genealogy (birth date, mother’s maiden name)
• Hacker gains access to your relative’s PC which has a genealogy program.
Identity Theft is the fastest growing crime in America9.900,000 victims during 2003
privacy.html
Page 23
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Spyware Statistics
Total number of PC scans: 1,483,517 Total instances of spyware found: 40,846,089 Instances of spyware per PC: 27.5
System Monitors
To date: 245,432
April: 60,873
March: 35,915
Trojans
To date: 257,761
April: 72,842
March: 38,385
Adware
To date: 7,642,556
April: 2,298,201
March: 1,262,078
Adware Cookies
To date 32,700,340
April 8,873,555
March 5,750,392
Results from EarthLink’s Spy Audit programs (1/1/04-4/30/04)
Source: www.earthlink.net/spyaudit/press/
Page 24
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/
Piggy Back Applications(Spyware, Adware)
• Some Free program include piggy-back programs (they provide revenue to the free program)
• For example: a stealth p2p network application is bundled with Kazaa
– Buried in the user agreement:
– "You hereby grant “Brilliant” the right to access and use the unused computing power and storage space on your computer/s and/or Internet access or bandwidth for the aggregation of content and use in distributed computing,"
• “Brilliant” now has the keys to your computer.
• 150 million copies of Kazaa have been downloaded.
• How hard would it be for a hacker to also access these capabilities?
privacy_other_apps.html
• Programs such as ad-aware (by lavasoft) and “Spybot Search and destroy”, can be used to identify /remove such programs.
Page 25
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Anti-Virus Software
• Every machine should have updated anti-virus software installed, and running
• AV software will occasionally scan every file on your machine for viruses
• AV software should automatically examine every incoming file (via, floppy disk, email attachment, web download, peer-to peer download)
• The heart of most AV programs is a “dictionary” of pre-defined viruses which is compared to your files. The dictionary may have over 60,000 definitions.
• AV programs will also monitor certain sensitive system resources for any changes – You may need to disable AV software when installing certain kinds of programs.
Important: the virus definition dictionary must to be updated frequently (Over 3,000 new viruses were discovered during the first half of 2002)
virus.html
Page 26
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Keep your system up to date
• My New Laptop, pre-loaded with Windows XP Professional, required 8.2 MB of Critical Updates the very first time I launched Windows Update.
• “windows update” requires Internet Explorer Version 5.01 or higher
privacy.html
Page 27
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Third Party cookies
Web pages can include graphics (and therefore cookies) from “third parties”
[email protected] history
[email protected]_phoneViewing history
badplace.comFake [email protected] history
Jokes.com ID#_201loan.com ID#_4873
badplace.com ID#_539
3p.com
3p.com ID#_435349
Your Cookies
[email protected] viewing [email protected]_phoneYour viewing historybadplace.comFake [email protected] viewing history
Buys/sells your data with its “partners”
Copyright navigators.com
The “third party site” can compile an extensive profile on you, and sell this information to companies that are online and offline.
Page 28
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Managing Cookies
• Older Browsers offered limited tools for managing cookies
• Third-party Software tools were developed to meet user’s needs
• Newest Browsers contain many more cookie management tools
Netscape 4.79 – edit -> preferences ->advanced Explorer 6.0 – Tools -> Internet Options
Nice Feature: You can explicitly allow cookies from specific web sites (i.e. amazon.com ) while blocking all other sites.
cookies.html
Page 29
Russ Haynal/navigators.com/
Internet Instructor & Speaker
http:/Public Terminals
• Public terminals = Library, Kinkos, Hotel Lobby, Cyber Café, etc
• Is there any kind of consistent “administration” to guarantee the integrity of these computers?
For a public terminal, you should always assume that the machine has been compromised, and that a “keystroke logger” is quietly capturing all keystrokes. ( usernames, passwords, credit cards, etc)