staying safe in cyberspace

59
Staying Safe Staying Safe In In Cyberspace Cyberspace By Chris Sweet By Chris Sweet Decatur Public Decatur Public Library Library Updated by Lesley Farmer Updated by Lesley Farmer

Upload: qiana

Post on 05-Jan-2016

28 views

Category:

Documents


0 download

DESCRIPTION

Staying Safe In Cyberspace. By Chris Sweet Decatur Public Library Updated by Lesley Farmer. Did You Know?. There are 240 million Internet users in the US (77% of the population) Online sales totaled over $100 billion in 2008 - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Staying Safe In Cyberspace

Staying Safe In Staying Safe In CyberspaceCyberspace

By Chris SweetBy Chris Sweet

Decatur Public LibraryDecatur Public LibraryUpdated by Lesley FarmerUpdated by Lesley Farmer

Page 2: Staying Safe In Cyberspace

Did You Know?Did You Know?

There are 240 million Internet users in the US There are 240 million Internet users in the US (77% of the population)(77% of the population)

Online sales totaled over $100 billion in 2008Online sales totaled over $100 billion in 2008

1 in 4 households have been victims of ID theft 1 in 4 households have been victims of ID theft in the past 5 years.in the past 5 years.

33% of 13- to- 17-year-olds reported that their 33% of 13- to- 17-year-olds reported that their parents or guardians know “very little” or parents or guardians know “very little” or “nothing” about what they do on the Internet. “nothing” about what they do on the Internet.

Page 3: Staying Safe In Cyberspace

DO NOT FEAR THE INTERNET!

Page 4: Staying Safe In Cyberspace

The Internet has tremendous potential for learning and entertainment.

It also has the potential to be a dangerous place.

On the Internet, the good far outweighs the bad.

We’re here to learn some of the ways you can protect yourself on the Internet.

Page 5: Staying Safe In Cyberspace

Internet Safety is cumulative. There is NO single thing you can do to completely protect yourself on the Internet. There are multiple components to staying safe. We will look at all the major categories including:

Passwords and IDsPasswords and IDs

E-mail and PhishingE-mail and Phishing

Cookies, Spyware, Viruses and FirewallsCookies, Spyware, Viruses and Firewalls

Online Shopping and BankingOnline Shopping and Banking

Children and Teens on the NetChildren and Teens on the Net

Filtering and MonitoringFiltering and Monitoring

Page 6: Staying Safe In Cyberspace

PASSWORDSPASSWORDS

Writing STRONG passwords for all of your accounts is the first step in internet safety.

What is a “strong” password?

A strong password is one that cannot be easily guessed or broken by hackers.

Page 7: Staying Safe In Cyberspace

PasswordsPasswordsDO NOTDO NOT use the same password for every use the same password for every site. Each site that has access to your site. Each site that has access to your financial information should have its own financial information should have its own unique password. unique password.

Change all your passwords at least once a Change all your passwords at least once a year.year.

Never, ever give out your passwords to Never, ever give out your passwords to anyone. anyone.

Page 8: Staying Safe In Cyberspace

PasswordsPasswordsIf you think someone has learned your If you think someone has learned your passwords, change them immediately. passwords, change them immediately. Writing down your list of passwords is ok Writing down your list of passwords is ok as long as you keep that list safe (you can as long as you keep that list safe (you can write more complex passwords this way).write more complex passwords this way). Avoid letting people observe you typing Avoid letting people observe you typing your password. your password. Be sure to log out from any site that Be sure to log out from any site that requires a password to log in. requires a password to log in.

Page 9: Staying Safe In Cyberspace

How to write a weak password!

Page 10: Staying Safe In Cyberspace

How to write a strong passwordHow to write a strong password

DO NOT USE:DO NOT USE:

Any part of your name - first, last, or Any part of your name - first, last, or middle middle

Your initials Your initials

Your social security number Your social security number

Birthdays Birthdays

Phone numbers or addresses Phone numbers or addresses

Words from the English dictionary Words from the English dictionary

Your username or login name Your username or login name

Page 11: Staying Safe In Cyberspace

How to write a strong passwordHow to write a strong password

DO USE: DO USE:

Special characters (*!$+) mixed with both Special characters (*!$+) mixed with both letters and numbers letters and numbers

Mixed upper- and lower-case letters Mixed upper- and lower-case letters

Nonsense words that are easy to Nonsense words that are easy to pronounce but aren't in any dictionary pronounce but aren't in any dictionary

At least eight or more characters At least eight or more characters

Page 12: Staying Safe In Cyberspace

Usernames and ID namesUsernames and ID names

As long as you have a strong password, As long as you have a strong password, the username is not quite as important. the username is not quite as important.

You can use real words for your You can use real words for your username, but it is still a good idea to username, but it is still a good idea to avoid using any part of your real name.avoid using any part of your real name.

For the greatest security you can follow all For the greatest security you can follow all the rules for creating a strong password.the rules for creating a strong password.

Page 13: Staying Safe In Cyberspace

E-MAIL AND PHISHINGE-MAIL AND PHISHING

Did You Know?Did You Know?

One of the most common ways to get a virus is One of the most common ways to get a virus is through an e-mail that you open? through an e-mail that you open?

Or that victims of identity theft often send their Or that victims of identity theft often send their personal information straight to the criminals?personal information straight to the criminals?

How do you prevent this?How do you prevent this?

Page 14: Staying Safe In Cyberspace

E-mail SafetyE-mail Safety

NEVERNEVER open attachments from senders open attachments from senders you do not know! Contrary to popular you do not know! Contrary to popular belief, it is ok to read all of your e-mails, belief, it is ok to read all of your e-mails, just beware of those attachments from just beware of those attachments from unknown senders! unknown senders!

Avoid sending personal information (social Avoid sending personal information (social security number, bank account numbers, security number, bank account numbers, credit card information, etc.) in any e-credit card information, etc.) in any e-mails.mails.

Page 15: Staying Safe In Cyberspace

E-mail SafetyE-mail Safety

Set up spam filters so that only messages Set up spam filters so that only messages from people you know get into your inbox from people you know get into your inbox (different with each e-mail service).(different with each e-mail service).

If you use a public computer, do not select If you use a public computer, do not select the feature that allows you to log on the feature that allows you to log on automatically. People who use that automatically. People who use that computer after you may be able to see computer after you may be able to see and use your screen name to log on.and use your screen name to log on.

Page 16: Staying Safe In Cyberspace

PhishingPhishingPhishing is an attempt to get you to disclose Phishing is an attempt to get you to disclose personal sensitive information by fooling you personal sensitive information by fooling you with fake e-mails. Phishers target consumers by with fake e-mails. Phishers target consumers by sending them e-mail messages from well-known sending them e-mail messages from well-known companies such as PayPal, eBay, Citibank, and companies such as PayPal, eBay, Citibank, and AOL that AOL that appearappear legitimate. These scam e- legitimate. These scam e-mails often tell you that you need to update your mails often tell you that you need to update your account information, PIN number or password. account information, PIN number or password. If you click on the links in the e-mail it will take If you click on the links in the e-mail it will take you to a site that is an exact replica of the you to a site that is an exact replica of the legitimate site legitimate site EXCEPTEXCEPT that the web address is that the web address is slightly different.slightly different.

Page 17: Staying Safe In Cyberspace

PhishingPhishingIt is very easy to avoid phishing scams. If you It is very easy to avoid phishing scams. If you get an e-mail telling you to update your account get an e-mail telling you to update your account information simply information simply DO NOTDO NOT use the links use the links provided in the e-mail! Type the address of the provided in the e-mail! Type the address of the real site into your browser’s address bar, login, real site into your browser’s address bar, login, and then determine if your information really and then determine if your information really needs updating.needs updating.

Learn to identify fake websites. The web Learn to identify fake websites. The web address will always be slightly different than the address will always be slightly different than the correct one: for example correct one: for example www.001ebay.comwww.001ebay.com instead of instead of www.ebay.com www.ebay.com

Example: Example: www.hotmail.comwww.hotmail.com

Page 18: Staying Safe In Cyberspace

Cookies, Spyware, Virsuses And Cookies, Spyware, Virsuses And FirewallsFirewalls

What are cookies?What are cookies? Cookies are small bits of Cookies are small bits of data used by web servers data used by web servers to help identify individual to help identify individual web users. To simplify web users. To simplify things, a cookie can help things, a cookie can help a website “remember” a website “remember” you and show you a you and show you a customized page the next customized page the next time you visit it. time you visit it.

Page 19: Staying Safe In Cyberspace

CookiesCookies

How do you get rid of cookies? Go to the “Tools” How do you get rid of cookies? Go to the “Tools” menu in Internet Explorer. Click on “Internet menu in Internet Explorer. Click on “Internet Options.” In the middle of the box that pops up Options.” In the middle of the box that pops up click on “Delete Cookies”. click on “Delete Cookies”.

While you are on this screen it is also worthwhile While you are on this screen it is also worthwhile to click on the “Delete Files” button and put a to click on the “Delete Files” button and put a checkmark next to “Delete All Offline Content.” checkmark next to “Delete All Offline Content.” This will remove additional This will remove additional temporarytemporary internet internet files that you do not need. files that you do not need.

(Demonstrate: (Demonstrate: www.google.comwww.google.com ) )

Page 20: Staying Safe In Cyberspace

SpywareSpyware

Spyware is any technology that aids in Spyware is any technology that aids in gathering information about a person without gathering information about a person without their knowledge. Spyware is programming that their knowledge. Spyware is programming that is put in someone's computer to secretly is put in someone's computer to secretly gather information about the user and relay it gather information about the user and relay it to advertisers or other interested parties. to advertisers or other interested parties. Spyware can get in a computer as a software Spyware can get in a computer as a software virus or as the result of installing a new virus or as the result of installing a new program. Serious spyware programs can lead program. Serious spyware programs can lead to identity theft. to identity theft.

Page 21: Staying Safe In Cyberspace

SpywareSpyware

Avoid installing spyware by:Avoid installing spyware by:

1) Never clicking on a pop-up (these often lead 1) Never clicking on a pop-up (these often lead to sites that install spyware)to sites that install spyware)

2) Don’t click on pop-ups that tell you that your 2) Don’t click on pop-ups that tell you that your computer is infected with spyware (this is a computer is infected with spyware (this is a common scam to get you to install spyware)common scam to get you to install spyware)

3) Set your Internet Explorer security setting to 3) Set your Internet Explorer security setting to medium or higher. To do this click on “Tools” medium or higher. To do this click on “Tools” then “Internet Options” then “Security”. The then “Internet Options” then “Security”. The slider on the left should be at medium or higher.slider on the left should be at medium or higher.

Page 22: Staying Safe In Cyberspace

SpywareSpyware

There are a number of good free spyware There are a number of good free spyware removal programs available: removal programs available:

The free Yahoo toolbar has a good The free Yahoo toolbar has a good Spyware removal program and pop-up Spyware removal program and pop-up blocker (in addition to other features). blocker (in addition to other features). Download here: Download here: http://toolbar.yahoo.comhttp://toolbar.yahoo.com

Another good, free program is Spybot: Another good, free program is Spybot: http://www.spybot.info/en/index.htmlhttp://www.spybot.info/en/index.html

Page 23: Staying Safe In Cyberspace

SpywareSpywareNotes: Notes:

1) You must update these programs on a 1) You must update these programs on a regular basis to be protected from new regular basis to be protected from new forms of spyware.forms of spyware.

2) If you buy a software package from 2) If you buy a software package from McAfee, Norton, etc. you may also get McAfee, Norton, etc. you may also get additional spyware protection.additional spyware protection.

Page 24: Staying Safe In Cyberspace

VIRUSESVIRUSES

Page 25: Staying Safe In Cyberspace

VirusesViruses

What is a virus?What is a virus?

Computer viruses are self-replicating programs Computer viruses are self-replicating programs which cannot exist without a host. A computer which cannot exist without a host. A computer virus passes from computer to computer like a virus passes from computer to computer like a biological virus passes from person to person. A biological virus passes from person to person. A computer virus must piggyback on top of some computer virus must piggyback on top of some other program or document in order to get other program or document in order to get executed. Once it is running, it is then able to executed. Once it is running, it is then able to infect other programs or documents. These infect other programs or documents. These programs can be relatively harmless, or they can programs can be relatively harmless, or they can completely crash your computer.completely crash your computer.

Page 26: Staying Safe In Cyberspace

VirusesViruses

How do you protect yourself from viruses? How do you protect yourself from viruses?

As mentioned above, not opening e-mail As mentioned above, not opening e-mail attachments from unknown senders is attachments from unknown senders is your first line of defense. your first line of defense.

There are three additional steps you There are three additional steps you should take to avoid viruses: 1) Keep your should take to avoid viruses: 1) Keep your computer updated, 2) Use antivirus computer updated, 2) Use antivirus software, 3) Use a firewall.software, 3) Use a firewall.

Page 27: Staying Safe In Cyberspace

UpdatesUpdates

Viruses usually work by exploiting security Viruses usually work by exploiting security flaws in the software that you are running. flaws in the software that you are running. Software companies issue “patches” to fix Software companies issue “patches” to fix these flaws, but you must update your these flaws, but you must update your system regularly to keep your computer system regularly to keep your computer secure.secure.Updates video from Microsoft: Updates video from Microsoft: http://www.microsoft.com/athome/security/updathttp://www.microsoft.com/athome/security/update/video_update.mspxe/video_update.mspx

Page 28: Staying Safe In Cyberspace

UpdatesUpdatesKeeping your operating system (Windows Keeping your operating system (Windows XP, 2000, etc.) updated is essential. Go XP, 2000, etc.) updated is essential. Go to to http://windowsupdate.microsoft.comhttp://windowsupdate.microsoft.com to to download updates or turn on automatic download updates or turn on automatic updates. updates.

You should also keep your Microsoft You should also keep your Microsoft Office products up-to-date by going here: Office products up-to-date by going here: http://office.microsoft.com/http://office.microsoft.com/ and clicking on and clicking on “Check For Updates.”“Check For Updates.”

Update other software as required.Update other software as required.

Page 29: Staying Safe In Cyberspace

Antivirus SoftwareAntivirus Software

Antivirus software is your first line of protection Antivirus software is your first line of protection against viruses that you can get over the against viruses that you can get over the internet. Antivirus software is a class of program internet. Antivirus software is a class of program that searches your hard drive and floppy disks that searches your hard drive and floppy disks for any known or potential viruses.for any known or potential viruses.

There are quite a few antivirus companies out There are quite a few antivirus companies out there. Norton, McAfee, Panda, Trend Micro. there. Norton, McAfee, Panda, Trend Micro. Norton and McAfee are the largest. Norton and McAfee are the largest.

There is a free anti-virus called AVG and it is There is a free anti-virus called AVG and it is available at available at http://free.grisoft.com/http://free.grisoft.com/

Page 30: Staying Safe In Cyberspace

Antivirus SoftwareAntivirus Software

Major antivirus software companies offer Major antivirus software companies offer frequent updates to keep your computer frequent updates to keep your computer safe against the most recent viruses. safe against the most recent viruses. You You MUSTMUST pay a yearly subscription fee pay a yearly subscription fee and keep your antivirus software up-to-and keep your antivirus software up-to-date.date.If you don’t, you are only protected against If you don’t, you are only protected against old viruses and vulnerable to all new old viruses and vulnerable to all new viruses!viruses!

Page 31: Staying Safe In Cyberspace

FirewallFirewallA A FIREWALLFIREWALL is a program that serves as a sort is a program that serves as a sort of filter between your home computer and the of filter between your home computer and the internet. If you have a fast connection (cable or internet. If you have a fast connection (cable or DSL) you probably want some sort of firewall. A DSL) you probably want some sort of firewall. A firewall can prevent hackers from gaining access firewall can prevent hackers from gaining access to your computer and files. A firewall generally to your computer and files. A firewall generally provides additional virus protection. provides additional virus protection. There is a free firewall called Zone Alarm There is a free firewall called Zone Alarm available from available from http://http://www.zonelabs.comwww.zonelabs.com Other Other makers of firewalls include Norton and McAfee. makers of firewalls include Norton and McAfee. There is also a firewall included with Windows There is also a firewall included with Windows XP.XP.

Page 32: Staying Safe In Cyberspace

Remember!Remember!

Getting a virus or finding spyware on your Getting a virus or finding spyware on your computer is a common occurrence. The computer is a common occurrence. The majority of viruses and spyware are majority of viruses and spyware are relatively harmless. There are very few relatively harmless. There are very few viruses that can crash your entire system viruses that can crash your entire system and very few spyware programs that can and very few spyware programs that can steal your personal information.steal your personal information.

Page 33: Staying Safe In Cyberspace

For More Info:For More Info:

The June 2010 issue of Consumer The June 2010 issue of Consumer Reports has great information and Reports has great information and ratings on cyber security.ratings on cyber security.

Page 34: Staying Safe In Cyberspace

ONLINE SHOPPING & ONLINE SHOPPING & ONLINE BANKINGONLINE BANKING

Online shopping is a huge, growing Online shopping is a huge, growing industry ($100 billion in 2005).industry ($100 billion in 2005).Why shop online?Why shop online?24 hour convenience24 hour convenienceVery easy to comparison shopVery easy to comparison shopBetter deals than retail storesBetter deals than retail storesLarger selection than retail storesLarger selection than retail storesOften no sales taxOften no sales tax

Page 35: Staying Safe In Cyberspace

Online BankingOnline Banking

All major banks and most smaller ones All major banks and most smaller ones offer online bankingoffer online banking

Why bank online?Why bank online?

24 hour convenience24 hour convenience

Up-to-date statementsUp-to-date statements

Easy transfers Easy transfers

Pure online banks are often cheaperPure online banks are often cheaper

Page 36: Staying Safe In Cyberspace

Online Shopping & BankingOnline Shopping & Banking

The easiest way to protect yourself when The easiest way to protect yourself when shopping online is to only enter confidential shopping online is to only enter confidential information (credit card numbers) on a secure information (credit card numbers) on a secure server. You know you are on a secure site server. You know you are on a secure site when this padlock symbol: appears in the when this padlock symbol: appears in the lower right-hand corner of the screen. The lower right-hand corner of the screen. The web address will also change from http to web address will also change from http to httphttpSS. (the “s” stands for secure). (. (the “s” stands for secure). (www.sears.comwww.sears.com))

Page 37: Staying Safe In Cyberspace

Online Shopping & BankingOnline Shopping & Banking

As mentioned above, keep your browser As mentioned above, keep your browser (Internet Explorer, Firefox, etc.) up-to-date. (Internet Explorer, Firefox, etc.) up-to-date. Browsers use encryption to keep sensitive Browsers use encryption to keep sensitive information safe over the internet. Newer information safe over the internet. Newer versions often offer increased security. versions often offer increased security. Be wary of “sounds too good to be true” Be wary of “sounds too good to be true” offers on the internet. They probably are!offers on the internet. They probably are!If you are required to give a credit card If you are required to give a credit card number for a “free” prize, it probably isn’t.number for a “free” prize, it probably isn’t.

Page 38: Staying Safe In Cyberspace

Online Shopping & BankingOnline Shopping & Banking

Read the fine print. You can often get Read the fine print. You can often get limited time free access to great sites, but limited time free access to great sites, but then get hit with a hefty monthly then get hit with a hefty monthly subscription fee thereafter.subscription fee thereafter.Always, always log out of your account Always, always log out of your account when finished.when finished.If there is an option, don’t let the company If there is an option, don’t let the company store your credit card information for next store your credit card information for next time.time.

Page 39: Staying Safe In Cyberspace

Online Shopping & BankingOnline Shopping & Banking

Big name companies and banks (target.com, Big name companies and banks (target.com, walmart.com, amazon.com, citibank.com etc.) walmart.com, amazon.com, citibank.com etc.) are safe to do business with. Be more cautious are safe to do business with. Be more cautious with smaller companies.with smaller companies.

For smaller or unknown companies, check with For smaller or unknown companies, check with the Better Business Bureau Online: the Better Business Bureau Online: http://www.bbbonline.org/http://www.bbbonline.org/

Use your credit card: under federal law (and Use your credit card: under federal law (and your credit card agreement) your liability for an your credit card agreement) your liability for an unauthorized charge is limited to $50.unauthorized charge is limited to $50.

Page 40: Staying Safe In Cyberspace

YOUTH ON THE NETYOUTH ON THE NET

““The Internet isn’t optional anymore- it’s The Internet isn’t optional anymore- it’s essential essential to our children’s futures. to our children’s futures. Unplugging them is like throwing the baby Unplugging them is like throwing the baby out with the bathwater. Our children need out with the bathwater. Our children need to become Internet literate in order to hold to become Internet literate in order to hold jobs, succeed in school, or attend college. jobs, succeed in school, or attend college. Denying them access is denying them the Denying them access is denying them the tools they need to succeed.”tools they need to succeed.”

(Aftab, Parry. (Aftab, Parry. The Parent’s Guide to Protecting Your Children in CyberspaceThe Parent’s Guide to Protecting Your Children in Cyberspace . p.1). p.1)

Page 41: Staying Safe In Cyberspace

Rules for Kids on NetRules for Kids on NetNever give out identifying information: Never give out identifying information: phone number, address, school name, phone number, address, school name, social security number, passwords, etc.social security number, passwords, etc.

Use a false name or nicknameUse a false name or nickname

Never respond to messages that are Never respond to messages that are suggestive, obscene, belligerent, or suggestive, obscene, belligerent, or threatening. Just ignore them!!threatening. Just ignore them!!

Remember that people online may not be Remember that people online may not be who they seem!who they seem!

Page 42: Staying Safe In Cyberspace

Rules for Kids on NetRules for Kids on Net

Tell an adult if you find anything on the Tell an adult if you find anything on the Internet that makes you uncomfortable.Internet that makes you uncomfortable.

Never agree to meet someone you meet Never agree to meet someone you meet online unless a parent agrees to come online unless a parent agrees to come with you.with you.

Use safe websites and safe search Use safe websites and safe search engines (see handout).engines (see handout).

Page 43: Staying Safe In Cyberspace

Rules for ParentsRules for Parents

Keep the computer in an open, visible area- not a Keep the computer in an open, visible area- not a bedroom or officebedroom or officeSet daily Internet time limits. You may want to only allow Set daily Internet time limits. You may want to only allow Internet use when a parent is at home.Internet use when a parent is at home.Sign an Internet safety pledge: Sign an Internet safety pledge: http://http://www.netsmartz.org/resources/pledge.htmwww.netsmartz.org/resources/pledge.htm or or

http://http://www.safekids.com/contract_kid.htmwww.safekids.com/contract_kid.htm (a very good idea to do this!).(a very good idea to do this!).Let children know that they will not be punished for Let children know that they will not be punished for accidentally accessing inappropriate sites. Strongly accidentally accessing inappropriate sites. Strongly encourage them to always come to you if they find encourage them to always come to you if they find something on the Internet that makes them something on the Internet that makes them uncomfortable. Along these lines, don’t be too quick to uncomfortable. Along these lines, don’t be too quick to blame or threaten privileges. Kids can easily come blame or threaten privileges. Kids can easily come across inappropriate content by accident.across inappropriate content by accident.

Page 44: Staying Safe In Cyberspace

Rules for ParentsRules for ParentsDon’t use the Internet as an electronic Don’t use the Internet as an electronic babysitter!babysitter!Teach children not to accept anything for free Teach children not to accept anything for free over the Internet: whether it is from a contest, over the Internet: whether it is from a contest, pop-up, e-mail or a “friend” they met online.pop-up, e-mail or a “friend” they met online.Use the Internet with your children. Learn about Use the Internet with your children. Learn about the sites they like to use.the sites they like to use.Depending on their age, you may want to require Depending on their age, you may want to require children to give you their username and children to give you their username and password for their e-mail accountpassword for their e-mail accountIf your child knows more about the Internet than If your child knows more about the Internet than you do, encourage them to teach you how to use you do, encourage them to teach you how to use the sites they like.the sites they like.

Page 45: Staying Safe In Cyberspace

FILTERING AND MONITORINGFILTERING AND MONITORING

What is a filter?What is a filter?

An Internet filter is a software or An Internet filter is a software or hardware product designed to prevent hardware product designed to prevent access to inappropriate websites on the access to inappropriate websites on the internet. It does this by using lists of internet. It does this by using lists of unacceptable URLs, or by examining unacceptable URLs, or by examining individual websites for specific individual websites for specific keywords or unwanted content.keywords or unwanted content.

Page 46: Staying Safe In Cyberspace

FiltersFiltersFilters are unreliable at best. Filters are unreliable at best. NONO filter will filter will block block ALLALL inappropriate content on the inappropriate content on the Internet. Also, Internet. Also, ALLALL filters accidentally filters accidentally block block LEGITIMATE LEGITIMATE content. content. If you really want to restrict access, the If you really want to restrict access, the best method is to use software that only best method is to use software that only allows access to particular sites. You can allows access to particular sites. You can then add additional legitimate sites to the then add additional legitimate sites to the list after you check them out approve list after you check them out approve them.them.

Page 47: Staying Safe In Cyberspace

MonitoringMonitoringSome filtering software also includes the ability Some filtering software also includes the ability to monitor and review children’s Internet to monitor and review children’s Internet activities as well as impose daily time limits.activities as well as impose daily time limits.A very basic monitor is included with the Internet A very basic monitor is included with the Internet Explorer browser. If you click on the history icon Explorer browser. If you click on the history icon you can see a list of all the websites visited on you can see a list of all the websites visited on your computer in the last 20 days (default your computer in the last 20 days (default setting). You can increase or decrease the setting). You can increase or decrease the number of days if you prefer. number of days if you prefer. Note: Internet savvy users will know how to Note: Internet savvy users will know how to delete the sites they’ve visited.delete the sites they’ve visited.Demonstrate: Demonstrate: www.google.comwww.google.com

Page 48: Staying Safe In Cyberspace

Filtering and MonitoringFiltering and MonitoringConsumer Reports recently ran a good Consumer Reports recently ran a good article comparing internet filtering software article comparing internet filtering software (June 2010)(June 2010)

Also check out these websites for Also check out these websites for additional reviews and information:additional reviews and information:

http://internet-filter-review.toptenreviews.com/http://internet-filter-review.toptenreviews.com/

http://www.internet-filters.net/http://www.internet-filters.net/

Page 49: Staying Safe In Cyberspace

CHATROOMS and CHATROOMS and INSTANT MESSAGINGINSTANT MESSAGING

Did You Know?:Did You Know?: In a survey of 1,000 In a survey of 1,000 U.S. girls aged 13 to 18 thirty percent said U.S. girls aged 13 to 18 thirty percent said they've been sexually harassed in a they've been sexually harassed in a chatroom? Only 7% told their parents. chatroom? Only 7% told their parents. (Whitney Roban, Ph.D.(Whitney Roban, Ph.D. The Net Effect: Girls and New Media The Net Effect: Girls and New Media))

Page 50: Staying Safe In Cyberspace

Chatrooms & Instant MessagingChatrooms & Instant Messaging

What is Chatting?What is Chatting?Internet Chat is a way for people to Internet Chat is a way for people to communicate live with each other by communicate live with each other by typing text messages which are seen typing text messages which are seen immediately by everyone present in the immediately by everyone present in the online chat "room". It is a sociable activity, online chat "room". It is a sociable activity, and very popular with young people as a and very popular with young people as a way of meeting and talking to friends and way of meeting and talking to friends and establishing relationships.establishing relationships.

Page 51: Staying Safe In Cyberspace

Chatrooms & Instant MessagingChatrooms & Instant Messaging

What is Instant Messaging?What is Instant Messaging?Instant Messaging (I.M.) software lets people Instant Messaging (I.M.) software lets people have live text conversations DIRECT between have live text conversations DIRECT between individuals, rather than in a public Internet chat individuals, rather than in a public Internet chat room with lots of onlookers. The software also room with lots of onlookers. The software also allows you to transfer files between the allows you to transfer files between the computers of online friends. It is a very popular computers of online friends. It is a very popular way to keep in touch with friends or workmates, way to keep in touch with friends or workmates, exchange news and gossip, etc. You can build exchange news and gossip, etc. You can build up a “buddy” list to make it easier to IM friends up a “buddy” list to make it easier to IM friends who use the same software.who use the same software.

Page 52: Staying Safe In Cyberspace

Chatrooms & Instant MessagingChatrooms & Instant Messaging

Like e-mail, don’t respond to belligerent or Like e-mail, don’t respond to belligerent or obscene messages.obscene messages.Don’t add just anyone to your contacts Don’t add just anyone to your contacts lists. Also, know how to block someone lists. Also, know how to block someone whom you don’t want to receive messages whom you don’t want to receive messages from.from.Remember that viruses and spyware can Remember that viruses and spyware can be transferred through IM. Be careful be transferred through IM. Be careful opening files from people you don’t know.opening files from people you don’t know.

Page 53: Staying Safe In Cyberspace

Chatrooms & Instant MessagingChatrooms & Instant Messaging

Learn the Lingo! Here are a few examples of Learn the Lingo! Here are a few examples of commonly used abbreviations:commonly used abbreviations:

LMK- Let Me KnowLMK- Let Me KnowPIR- Parent in RoomPIR- Parent in RoomP911- Parent AlertP911- Parent AlertPAW- Parents are WatchingPAW- Parents are WatchingLMIRL- Let’s Meet in Real LifeLMIRL- Let’s Meet in Real LifeWYCM- Will You Call Me?WYCM- Will You Call Me?Find many, many, more at: : Find many, many, more at: : http://http://

www.netlingo.comwww.netlingo.com//

Page 54: Staying Safe In Cyberspace

VideoVideo

Tracking Someone online:Tracking Someone online:

http://www.netsmartz.org/resources/reallifehttp://www.netsmartz.org/resources/reallife.htm.htm

Page 55: Staying Safe In Cyberspace

DID YOU KNOW?DID YOU KNOW?

61% of 13 to 17 year olds have a personal 61% of 13 to 17 year olds have a personal profile on sites such as Myspace, profile on sites such as Myspace, Facebook, or Xanga; 14% have actually Facebook, or Xanga; 14% have actually met face-to-face with a person they had met face-to-face with a person they had known only though the Internet. known only though the Internet. ((Teen Internet Teen Internet Safety SurveySafety Survey. NCMEC and Cox Communications, 2006). NCMEC and Cox Communications, 2006)

Almost all youth use social media at least monthlyAlmost all youth use social media at least monthly (Computer World, 2009)(Computer World, 2009)

Page 56: Staying Safe In Cyberspace

What is www.facebook.com?What is www.facebook.com? Myspace.com, Friendster, Facebook, etc, are Myspace.com, Friendster, Facebook, etc, are all “social networking” websites. Essentially all “social networking” websites. Essentially they are places to meet new people and they are places to meet new people and express your personal identity. They are express your personal identity. They are hugely popular with teens and college hugely popular with teens and college students. Www.facebook.com has over students. Www.facebook.com has over 500 500 millionmillion members and ranks as the most members and ranks as the most popular site on the web! popular site on the web!

Page 57: Staying Safe In Cyberspace

Be very careful about the information you put into your Be very careful about the information you put into your profile and the information in bulletins and comments profile and the information in bulletins and comments from friends. It all adds up!from friends. It all adds up!Meeting someone you have only met online is very Meeting someone you have only met online is very dangerous! If you are set on meeting an online friend be dangerous! If you are set on meeting an online friend be certain to bring one or more friends with you and set the certain to bring one or more friends with you and set the meeting in a public place.meeting in a public place.Be wary of adding everyone who asks to your “Friends” Be wary of adding everyone who asks to your “Friends” list. Remember that everyone who is on your friends list list. Remember that everyone who is on your friends list can see more of your personal information.can see more of your personal information.Your safety depends on the sum total of all information Your safety depends on the sum total of all information available about you on the Internet. Try Googling available about you on the Internet. Try Googling yourself to see how much personal information you can yourself to see how much personal information you can find.find.

Staying Safe on FacebookStaying Safe on Facebook

Page 58: Staying Safe In Cyberspace

Staying Safe on FacebookStaying Safe on Facebook

Don’t lie about your age (You must be 13 or older to Don’t lie about your age (You must be 13 or older to have a Facebok profile)have a Facebok profile)Don’t post anything that you would be embarrassed Don’t post anything that you would be embarrassed about later (bulletins, blogs, photos, etc.)about later (bulletins, blogs, photos, etc.)Add additional security and privacy to your MySpace Add additional security and privacy to your MySpace account by clicking on “Account Settings” and then on account by clicking on “Account Settings” and then on “Privacy Settings.” You can make your profile available “Privacy Settings.” You can make your profile available only to friends and change other privacy settings.only to friends and change other privacy settings.Remember, you can get in trouble at school for things Remember, you can get in trouble at school for things you post on the Internetyou post on the InternetCompanies and colleges are now also searching Companies and colleges are now also searching Facebook pages as part of the application process! Be Facebook pages as part of the application process! Be careful!careful!

Page 59: Staying Safe In Cyberspace

ConclusionConclusion

The Internet is and extremely valuable The Internet is and extremely valuable resource and it is far safer than most resource and it is far safer than most people believe. Don’t avoid the Internet people believe. Don’t avoid the Internet (or keep your kids off) just because of (or keep your kids off) just because of fears about safety. There are many real fears about safety. There are many real dangers, but the steps needed to stay safe dangers, but the steps needed to stay safe online are fairly simple. online are fairly simple.