Net Safety

Preview:

DESCRIPTION

it is useful for parents and school teacher.

Citation preview

Net SafetyNet Safety

S.G.IsaveS.G.IsaveLecturerLecturer

Tilak College of EducationTilak College of EducationPunePune

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 22

Refresher course in EducationRefresher course in Education

This is the presentation for seminar .This is the presentation for seminar . Topic – Net safetyTopic – Net safety

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 33

@ Background @ Background

@ Meaning @ Meaning

@ Need @ Need

@ Threats @ Threats

@ Solution @ Solution

@ Conclusion @ Conclusion

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 44

BackgroundBackground

Since there is Since there is nono one single one single controllercontroller of this huge huge network it of this huge huge network it becomes becomes vulnerablevulnerable..

Adults can take appropriate net Adults can take appropriate net safety precautions, but safety precautions, but childrenchildren are are easy targeteasy target for cyber criminals. for cyber criminals.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 55

Meaning Meaning

‘ ‘Net-Safety’ contains two terms- net Net-Safety’ contains two terms- net means mainly internet. It is safety of means mainly internet. It is safety of user who takes the advantage of user who takes the advantage of internet.internet.

““An application of knowledge of An application of knowledge of internet threats, it’s prevention, internet threats, it’s prevention, treatment and all kinds of treatment and all kinds of management is called management is called Net-safetyNet-safety.” .”

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 66

Need

Data and user, no one is safe on the Data and user, no one is safe on the internet. If we lost data we may internet. If we lost data we may retrieve/regenerate it ; but if we lost retrieve/regenerate it ; but if we lost our small user very difficult to our small user very difficult to recover him/her. recover him/her.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 77

ThreatsThreats

There are economical, psychological, There are economical, psychological, physical, technological and legal physical, technological and legal threats ruled on the net. threats ruled on the net.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 88

1.Economical Threat1.Economical Threat

E-shopping, e-governance, e-E-shopping, e-governance, e-payment, etc. Each of these facility payment, etc. Each of these facility needs username, password, e-cards. needs username, password, e-cards.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 99

If children know about passwords, If children know about passwords, they may disclose in knowingly / they may disclose in knowingly / unknowingly… unknowingly…

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1010

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1111

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1212

2. Psychological Threat2. Psychological Threat

Sex, drugs, crimes, violence, Sex, drugs, crimes, violence, terrorism.terrorism.

Criminal minds are finding soft Criminal minds are finding soft targets for their use via e-mail, targets for their use via e-mail, chatting, advertise, gifts, cartoons, chatting, advertise, gifts, cartoons, clip arts etc. clip arts etc.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1313

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1414

Children can involve in these kind of Children can involve in these kind of criminal activity for the sake of criminal activity for the sake of money, thrill, fun, gift, prestige, self money, thrill, fun, gift, prestige, self recognition. recognition.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1515

Teenagers wants to grow faster. Teenagers wants to grow faster. They want to live like the young one. They want to live like the young one. Dating is very easy online. So many Dating is very easy online. So many sites are there providing such sites are there providing such ‘‘facilityfacility’. ’.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1616

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1717

When the excitement When the excitement is over then child is over then child comes to know what comes to know what mistake he/she has mistake he/she has done; then the done; then the psychological crises psychological crises arises. He/she feel arises. He/she feel guilty, isolated, guilty, isolated, helpless; it changes helpless; it changes innocence of their life.innocence of their life.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1818

Children involves in Children involves in virtual world, than the virtual world, than the real world. They feel real world. They feel impatience, unsecured impatience, unsecured and unmatched in the and unmatched in the real people. Because real people. Because real people do not real people do not work on his/her work on his/her ‘mouse-click’, not ‘mouse-click’, not respond 100% respond 100% according to the according to the command given, as command given, as his/her computer his/her computer does. does.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 1919

3.Physical Threat3.Physical Threat

Overuse of computer ,less exercise, Overuse of computer ,less exercise, seating in problematic posture, seating in problematic posture, proportion of chair-table, screen proportion of chair-table, screen brightness, contrast, resolution, size brightness, contrast, resolution, size of screen etc.of screen etc.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2020

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2121

4.Technological4.Technological ThreatThreat

Due to lack of proper knowledge Due to lack of proper knowledge children open your computer for children open your computer for Virus, Trojan horse, Worm.Virus, Trojan horse, Worm.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2222

5.Legal5.Legal ThreatThreat

The information may be disclosed by The information may be disclosed by user child. Cyber criminal may use user child. Cyber criminal may use this information for terrorist activities this information for terrorist activities and the illegal uses.and the illegal uses.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2323

Sometime your child may place e- Sometime your child may place e- purchasing order or download some purchasing order or download some software that is restricted under software that is restricted under copyright act.copyright act.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2424

Safety SolutionsSafety Solutions

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2525

EconomicalEconomical

Give and Give and changechange the the passwordpassword frequently. frequently. Password - to start computer, to start Password - to start computer, to start computer account, to connect the internet, computer account, to connect the internet, to login all types of accounts. to login all types of accounts.

Do Do notnot on on savesave user name and password. user name and password. Keep records of Keep records of offlineoffline transaction and transaction and

check it .check it .

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2626

Do not show credit cards like important Do not show credit cards like important documents information to children.documents information to children.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2727

PsychologicalPsychological

Keep computer from where you can Keep computer from where you can observe child using internet..observe child using internet..

Check history of computer regularly. Check history of computer regularly. Check safety settings in search Check safety settings in search

engineengine

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2828

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 2929

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3030

Discuss with your child friendly about Discuss with your child friendly about his/her e-friends.his/her e-friends.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3131

PsychologicalPsychological

Have ‘child lock’ software Have ‘child lock’ software Observe the use of pen drive, Observe the use of pen drive,

CD/DVD.CD/DVD. Don’t have the web camera always Don’t have the web camera always

on. Don’t allow children to use it in on. Don’t allow children to use it in privacy.privacy.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3232

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3333

PsychologicalPsychological

Continuously observe children Continuously observe children behavior. behavior.

Enjoy free time with family.Enjoy free time with family. Social development, Art and Craft Social development, Art and Craft

work. work. Be in touch with teachers. Be in touch with teachers.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3434

PhysicalPhysical

Give Give time boundtime bound access on internet. access on internet. Insist on Insist on play, exercisesplay, exercises by setting by setting

example.example. Show them Show them webs related to healthwebs related to health

and hygiene.and hygiene. Have the Have the proper postureproper posture of seating in of seating in

front of computer.front of computer. Surfing/gaming and eating should not Surfing/gaming and eating should not

go simultaneously.go simultaneously.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3535

TechnologicalTechnological

Have computer antivirus suit and Have computer antivirus suit and update it.update it.

Prevention, detection and eradication Prevention, detection and eradication of Mal-wares. of Mal-wares.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3636

LegalLegal

Give guidelines for downloading and Give guidelines for downloading and making on line friends. making on line friends.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3737

ConclusionConclusion

It doesn’t mean that we should not It doesn’t mean that we should not use the internet or we should use the internet or we should discourage our children to use discourage our children to use internet. internet.

They should become , wise net-savy. They should become , wise net-savy.

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3838

““We should train them to drive safely We should train them to drive safely on information highway…. !”on information highway…. !”

Apr 13, 2023Apr 13, 2023 S.G.ISAVES.G.ISAVE 3939

References References

http://news.bbc.co.uk/2/hi/technology/6332619.stmhttp://news.bbc.co.uk/2/hi/technology/6332619.stm http://news.bbc.co.uk/2/hi/uk_news/education/5363678.stmhttp://news.bbc.co.uk/2/hi/uk_news/education/5363678.stm http://www.colonialhts.net/internet_safety/pledges/http://www.colonialhts.net/internet_safety/pledges/

pledgemshs.pdfpledgemshs.pdf http://www.fbi.gov/publications/pguide/pguidee.htmhttp://www.fbi.gov/publications/pguide/pguidee.htm http://www.getnetwise.org/http://www.getnetwise.org/ http://kids.getnetwise.org/safetyguide/http://kids.getnetwise.org/safetyguide/ http://kids.getnetwise.org/safetyguide/http://kids.getnetwise.org/safetyguide/ http://www.kidshield.com/steps/index.htmhttp://www.kidshield.com/steps/index.htm http://www.learnthenet.com/english/html/10kids.htmhttp://www.learnthenet.com/english/html/10kids.htm http://netsafety.nic.in/tips.htmhttp://netsafety.nic.in/tips.htm http://www.safer-internet.net/http://www.safer-internet.net/

““I am safe in my parent’s hand !”I am safe in my parent’s hand !”

Thank you very much !Thank you very much !

Recommended