Internet safety v 4 slides and notes

Preview:

DESCRIPTION

 

Citation preview

INTERNET SAFETYOctober 2011

Household Internet Access

The 2009 Queensland household survey of computer and internet usage revealed that:

• 83% of adult Queenslanders now have access to the internet at home

The Internet

Positive

• A place to learn

• Connect with others

• Improve skills

Negative

• Numerous risks

Today’s Session

• Internet activities • Internet safety issues• Protection – Equipment and

you• Scams, Phishing and Online

Fraud

Today’s Session

• Privacy and Identity Theft • Social Networking• Cyber Bullying• Families and Young People• Smart phones

Today’s Session

• Is a guide• Conduct your own

investigation• Ask for advice• Review Government sites

relating to internet safety

INTERNET ACTIVITIES

WWW Activities

• Email

• Chatting

• IM

• Gaming

• Social Networking

• Blogging

• ‘Surfing’

Emailing

Social Networking

Chatting

IM

Gaming

Blogging

Web Surfing

INTERNET SAFETY ISSUES

Internet Safety Issues

Malicious computer programs

• Worms

• Trojans

• Adware

• Spyware

• Keystroke loggers

• Viruses

Internet Safety Issues

• Hackers

• Exposure to inappropriate material

• Physical danger

• Financial risks

Internet Safety Issues

• Harassment and bullying

• Privacy

• Unreliable information

• Spam

• Identity theft

Internet Safety Issues

Don’t fear you can do two simple things to reduce your risk

• Educate yourself

• Protect your computer

Internet Safety Issues

For children and young people

• Empower through education

• Provide supervision

PROTECTION

Computer Protection

Ensure the best possible protection

Ask a range of people for advice

• Internet service provider (isp)

• Computer stores

• Friends and family

• Work colleagues

Computer Protection

Government website with useful information for computer protection

www.staysmartonline.gov.au

Government website with useful information for computer protection

www.staysmartonline.gov.au

Computer Protection

• Anti-virus software

• Anti spyware software

• Firewall

• Pop up stoppers

• Reduce spam

• Content filters

Computer Protection

Anti-virus software

• Assists to protect your computer from malicious computer programs

• Viruses have the potential

to destroy files and prevent

access to your computer

Computer Protection

Anti spyware software

Used to protect your computer from

spyware which takes

information from your

computer without

consent and passes

onto a third party

Computer Protection

Firewall

Monitors what goes

in and out of your computer.

Blocks websites

you may not wish to view

Computer Protection

Pop Up Blockers

Easily activated in

your internet browser

(mozilla firefox,

internet explorer)

Computer Protection

Reduce Spam

Activate spam filters

Report spam

Content Filters

Used to manage access to the internet

• Adjustable settings

• Individual user profiles

• Can be restrictive

Content Filters

Contact your internet service provider

Content Filters

The Australian Internet Industry Association (IIA) maintains a list of Family Friendly internet content filters (www.iia.net.au)

Wireless Internet Connection

Information relating to the protection

of your wireless internet

can be found at

www.staysmartonline.gov.au

Protecting Wireless Internet Connection

• Select a strong password

• Turn off feature that constantly broadcasts your network name

• Reduce power of transmission

• Turn encryption on

• Turn administrator access off

• Turn off wireless connection whilst not in use

SCAMS, PHISHING AND ONLINE FRAUD

Person Fraud and Scams

• 5% of Australians over 15 were victims of personal fraud in 2007.

• Most common fraud was ID fraud.

• 20% of these frauds occurred through internet or email

Person Fraud and Scams

Scams

• Target all types of people

• Examples include the well known Nigerian Bank scam, fake lotteries, employment and dating scams

• If it appears too good

to be true

it probably is!!!!

Email Scam Hello my new friend!

My name is Natalya! How are you? I hope you fine! I have found yours profile and e-mail on website I want to find the love. If you is real are interested, answer to me and we can begin our acquaintance.A little about me. I was born 15 OCT 1979. I want find someone man that can love me,and i can love him! i went through your profile and read information about you and what you want to see in a man of your choice. And i believe, i can have all part of what you want in soulmate, out of thousands of people that is on here, I find you to be my true choice and i hope that you should feel the same way too. It's really a wonderful moment as am writing this missive to youand i pray that i should hear a good and sweat reply from you.You may be in long distance to me, but i belief that there's nothing love can not do. I belief love can move mountain and love turn around man life to precious life and sweet one.Ok, i wish that you should write me in e-mail and lets meet to have more discussions and get to know more about each other.My new friend I ask you to write to me on e-mail:nata_single_lovely@yahoo.combecause the Internet here is very bad, but on e-mail I can check mymail easily.I will be great to read a marvellous missive from you.Hoping in God of love and in power of love to hear from you.Thanks for the reading.Natalya.

Email Scam I wish to inform you that your payment is being processed and will be released to you as soon as

you respond to this letter. Also note that from my record in my file your outstanding contract payment is US$25,500,000.00 (Twenty Five Million Five hundred Thousand United States Dollars).

 Kindly re-confirm to me the followings:

1) Your full name.2) Phone, fax and mobile number3) Company name, position and address.4) Profession, age and marital status.5) Banking Information/address account number/ swift code

As soon as this information is received, your payment will be made to you in a certified bank draft or wired to your nominated bank account directly from Central Bank of Nigeria.

 You can call me on my direct number 234-802-715-1173 as soon as you receive this letter for

further discussion: centpayment11@yahoo.it

REGARDS Prof. Charles Soludo.

Executive Governor, Central Bank of Nigeria [CBN]DIRCT LINE -234-802-715-1173

 

Phishing

• Watch Video: Phishing in Plain English• Luring people to fake website by using

emails that seem to come from a legitimate business

• Impersonate the ATO, EBay, Banks, Pay Pal and email providers

• Try and get personal data, usernames and passwords.

• Steal identity, money or sell identity

Phishing

Email Scams and Phishing

Email

Email – protecting yourself

• Don’t give out personal information

• Don’t click on links

• Check for poor grammar and spelling

• Change your email

password regularly

• Have a strong password

Email – protecting yourself

• Report junk email to your service provider

• Report unauthorised access to your email provider

• Don’t sign up for emails you don’t

want to receive

• Be wary of worst virus

emails

PRIVACY AND IDENTITY THEFT

Privacy and Identity Theft

Take care to protect your privacy and reduce the risk of your identity being stolen

Privacy and Identity Theft

SOCIAL NETWORKING

Social Networking

Social networking sites enable people to connect with others on the site through chat, sharing of photos and videos, blogging and discussion.

Social Networking

Social Networking

The Risks• You can be whoever you want with no

verification• Divulging of personal information• Time Wasting• Cyber Bullying

However it is great fun and

an excellent way to stay in touch with friends

Social Networking

• Take care to protect yourself• Find out as much as you can about the

site before you join• Read privacy statements• Never display your full date of birth• Think before you post• Educate young people• Supervise young people

CYBER BULLYING

Cyber Bullying

• Cyber bullying is bullying carried out through an internet service.

• 16% of young people bullied on line

• You should not say on line what you would not say in person

• Serious cases should be reported

Cyber Bullying

If cyber bullying occurs

• Keep a record

• Tell someone

• Report to internet provider

• Contact police

Cyber Bullying

If cyber bullying occurs

• Don’t reply to messages

• If possible change your contact details

• Keep your username and password secret

Cyber bullying can be a criminal activity

INFORMATION FOR FAMILIES AND YOUNG PEOPLE

Families and Young People

• Young people and children will encounter the internet at home, school, friends’ places and libraries.

What young people do on the internet

• Browsing• Social networking• Emailing• Downloading• IMing• Studying

Risks for young people

• Inappropriate content• Unwanted advertising• Financial risks• Harassment and

bullying

Risks for young people

• Exploitation• Spam• Unreliable information• Viruses• Un-moderated chat

rooms

Protecting Yourself and Your Family

Protecting Yourself and Your Family

Consider and internet

safety contract

Protecting Yourself and Your Family

• Educate

• Have computer in public area

• Consider filters and security software

• Use family friendly search engine

• Encourage reporting of problems

• Supervise young children

Protecting Yourself and Your Family

• Encourage good decisions

• Increase responsibility with age

• Teach children what is advertising and what is not

Families and Young People

Free resources for parents, libraries, schools and young people can be downloaded from

www.cybersmart.gov.au

Families and Young People

Hector’s world is designed for young children starting out on the internet.

Families and Young People

The Australian Government CyberSmart website has some interesting information for schools which will also be useful for patents

www.cybersmart.gov.au/Schools.aspx

Families and Young People

• Cyberquoll is an internet safety interactive educational program for primary school children ages 8 to 12

www.cybersmart.gov.au/cyberquoll/index.html

SMART PHONES

Securing Your Smart Phone

Secure your smart phone by:

• Setting and maintaining strong passwords.

• Keep Bluetooth hidden.

• Use and encrypted WiFi network that requires a password.

Securing Your Smart Phone

• Install security software from a reputable provider.

• Be careful when downloading applications from the Web.

• Back up your data regularly.

• Encrypting your data.

Securing Your Smart Phone

• Don't open multimedia messages (MMS) or attachments in emails, or click on links in emails and SMS messages unless you are expecting them.

• Check for updates to your phones operating system regularly.

CONCLUSION

Conclusion

• Learn

• Improve skills

• Meet new friends

• Connect with old ones

Conclusion

• Educate yourself and your family

Conclusion

If it appears too good to be true it probably is