1Presented by: Ashwin Seegolam & Shailaja Oolun Internet Safetyfor Young PeoplePresented by: Ashwin Seegolam & Shailaja OolunNCB
2IntroductionOnline technologies are becoming a favourite way for young people to communicate but they need to be aware of the potential risks.Safer Internet Day takes place each year in February.The main objective of the Safer Internet Day is to raise awareness about safe and responsible use of new technologies among children and young people.Theme is "Think before you post!” ”, which focuses on how images are managed online and consequently, how privacy are dealt in digital environments.In Mauritius, the following Internet Safety activities are organised by the NCB, IT Security Unit of the Ministry of Information and Communication Technology and the Ministry of Education, Culture and Human Resources :1: Awareness sessions for secondary schools.2: Awareness sessions in rural areas through the Cyber caravans.3: Brochures and Fact sheets on Internet Safety for Children.4: Safer Internet Day website. (http://www.ncb.mu/isd)
3Usage of the Internet News and Reference Entertainment (movies, videos, clips)Commerce (online shopping, auctioning)File sharing (mp3)Social Networking (Hi5, Facebook)Instant Communication ( , chat)Accessing Internet on Mobile Phones
4Internet AddictionSpend excessive amounts of time online at the expense of and to the detriment of other aspects of their lives.Might include the following:-1: Relationships: spending excessive amounts of time starting and maintaining online friendships in chat rooms, which replace real-life friends and family.2: Money: compulsively gambling online & trading online.3: Information searching: compulsive web surfing .4: Gaming: obsessive computer game playing, including multi-user games.5: Sex: addiction to adult chat rooms, cyber sex or pornography on the Internet.
5Impacts on ChildrenLess investment in relationships with friends and interruption of social relationshipsFeeling depressed and irritable when not at the PCs.Suffering withdrawal symptoms when without access or when reducing Internet use – these symptoms include anxiety, restlessness, depression, even trembling handsLack of sleep and excess fatigueDeclining school resultsWithdrawal from school social activities and events
6Dangers of Internet Personal Information Profile or personal information could be disclosed during online conversations. Such information can lead to receiving unwanted contact from inappropriate people.PicturesPosting of comments or images of oneself or others online, which may compromise the person’s safety or be used as a means to bully others.Threats (Spyware, viruses)When connected online, your computer is at risk from spyware, viruses and other invasive programmes if you are sharing files on non-regulated sites.
7Social Networking Sites Examples are Face book and MySpace.comResearch in US shows that out of all teenagers with an online profile: -82% include their first name29% include their last name79% post photos of themselves49% include the name of their schools.Children should be aware that placing pictures on the web leads to:-1: Contact2: Bullying3: Distorting images
9Online PredatorsThe anonymity of the Internet means that trust and intimacy can develop quickly online. Predators take advantage of this anonymity to build online relationships with inexperienced young people.How Online Predators work?Find kids through social networking, blogs, chat rooms, instant messaging, , discussion boards, and other Web sites.Seduce their targets through attention, affection, kindness, and even gifts.Know the latest music and hobbies likely to interest kids.Listen to and sympathize with kids' problems.Try to ease young people's inhibitions by gradually introducing sexual content into their conversations or by showing them sexually explicit material.
10Posting of Pictures on the Internet Creation or posting inappropriate, offensive or even illegal content on the Internet could get you into troubleThink very carefully before including a personal photograph of yourselves or your friends in your Profile.Photos online can easily be copied, changed and used elsewhere, and can potentially stay online Forever.Examples of Pictures posted on the Internet
11CyberbullyingThe ‘sending or posting of harmful or cruel text or images using the internet or other digital communication devices’. Child Net InternationalThe Anti-Bullying Association - seven types of cyberbullying,1. Text messages – unwelcome texts that are threatening. 2. Picture/video-clips via mobile phone cameras3. Mobile phone calls – silent calls or abusive messages; or stealing the victim’s phone and using it to harass others4. s – threatening or bullying s,5. Chatroom bullying6. Instant messaging – unpleasant messages sent as children conduct real-time conversations online. 7. Bullying via websites – use of defamatory blogs (web logs)
12How technology used to bully others Great ForExamples of misuseMobile PhonesKeeping in touch by voice or text, taking and sending pictures and film. Useful in emergency situations & for allowing children a sense of independence.Sending nasty calls or messages, including threats, intimidation and harassment. Taking and sharing humiliating images. Filming others being harassed and sending them to other phones.Sending electronic letters, pictures, and other files quickly and cheaply anywhere in the world.Sending nasty or threatening messages. Forwarding unsuitable content including images and video clips, or sending computer viruses.Instant MessengerText or voice chatting live with friends online. An effective way of keeping in touch even while doing other things on the PC.Sending nasty messages or content. Using someone else’s account to forward rude or mean messages via their contacts list.
13How technology used to bully others (Cont) Great ForExamples of misuseChat Rooms and Message BoardsGroups of people around the world can text or voice chat live about common interest. For the young, this is an easy way to meet new people and explore issues which they are too shy to talk about in person.Sending nasty or threatening anonymous messages. Making friends under false pretenses – people pretending to be someone they’re not in order to get personal information that they can misuse in a range of ways – e.g. by spreading secrets or blackmailing.Social Networking SitesSocializing with friends and making new ones. Allowing the young to be creative online. Personalizing profile and homepages, creating and uploading content.Posting nasty comments and humiliating images. Accessing another person’s account details, deleting information or making private information public. Creating fake profiles to pretend to be someone else and get the person into trouble.
14Examples of Cyberbullying Bullying: My close friend (13) was chatting on the Internet one night and met this guy who she thought was fabulous. He claimed he was 16. My friend gave him her address. He started asking her really gross questions so she decided not to talk to him again. But because she gave him her address he started sending her rude and gross messages and pictures. She could not get rid of him. Her parents found out and disconnected the internet.Mobile Bullying: Met a boy at the park... He fancied me... I wasn’t sure so gave my friend’s mobile number instead... She keeps getting calls from him... She doesn’t want to make me look stupid, but is annoyed she has to lie.Instant Messenger: I am a 12 year old boy and I have been using IM to chat with my school friends. My close friend gave out my chat name and location to one of her contacts that she met online but does not know personally. This person started to contact me regularly, trying to set up a "date" with me. My friend then gave this person my real name and threatened to give out my telephone number and . This was really frightening, and I just stopped using IM altogether. I am so angry that I want to give out my friend’s information too. Do you think this person will try and find me?Source:
15Examples of Cyberbullying (Cont) Chat Bullying: In February 2000, a thirty-three-year-old man made contact with a twelve-year-old girl in a teenage Internet chatroom. This first contact in a chatroom led to s every day over a two-month period and then to regular conversations on a mobile phone. In this way the girl was groomed from this initial chatroom contact to the point where she actually met the man offline and to the point where she was sexually assaulted.Online Gaming: A 13-year old boy in the USA made online friends with an older man via an online gaming website. In July 2004 after playing and chatting for several months, the boy and his new friend arranged to meet. The boy thought he and his new friend were to spend 4 days playing role-play games. The boy’s mother put him on the plane to fly to meet this friend in another state. She didn’t know that the new friend was a convicted sex-offender. The first day of the visit the boy was invited to the Zoo and experienced an unusual amount of 'hugging' and 'back rubbing'. And then, luckily, the visit ended: some relatives to the sex-offender had alarmed the authorities and the boy was rescued by the police.
16Why do Youngsters Cyberbully? They have family problems.They are being bullied themselves.They are selfish or spoilt and want to get on their own way.They have no friends and being lonely.They feel bad themselves and want others to feel the same.They are taking out their frustrations on others.They feel insecure and unimportant – bullying gives them power.They want to look big in front of others.They don’t understand how bad victims feel.They have been bullied into joining a bully gang and thus have gone along with things just to keep on the bully’s good sides.
17How is Cyber Bullying making you feel ? Sad? Nervous?Terrified?Scared? Upset?Unsafe?Worried? Insecure?
18Prevention tips on Cyberbullying If you are being cyberbullied:● You should not erase any bullying messages you receive; do a record instead.● You should not reply to any bullying messages you receive.● You MUST tell someone (your teacher, parents) about this.● You need to look into how you can block these messages.● You should never give out private information when online.● You should not open from strangers or bullies, just delete them.● You should not put anything online without consent of your parents.● Never send messages when you're angry.● Do not join in and bully other kids online. If you see it, show the bullying to an adult.
19Using Email Ensure you are addressing the right person prior to sendingBeware of s from unknown parties(unsolicited s)Do not open unsolicited sNever respond to unsolicited s e.g.‘You have won $1,000,000. Kindly send yourbank details for crediting your account.’These are scams also known as socialengineering attacks
22Using Emails Using Email Accepting s, IM messages, or opening files, pictures or texts from people you don’t know or trust can lead to problems – they may contain viruses or nasty messages!Be suspicious of all files you receive, check with the sender if you are unsure, and don’t open anything sent by someone you don’t know and trust.Suspicious attachments must NOT be opened (files withextensions .exe, .com, .bat, .reg extensions)Always keep your passwords private – Identity theft
23Spyware/Adware Carefully crafted programs written by attackers Downloaded from Internet – often silentlyDesigned to:(a) Gather private, personal information(b) Create system instability(c) Damage or interfere with legitimate applications operation(d) Open a backdoor on infected systems(e) Allow a spyware operator to take over an infected system
24Spyware/Adware Refrain from downloading unnecessary games, screensavers & other software from the Internet –they may have embedded spyware or viruses.Use a regularly updated anti-spyware softwareProtect your computer and personal files by visiting reputable sites and by installing a firewall and antivirus software.Practice safe internet surfing
25Child Safety Online Action Plan Endorsed by Cabinet in January 2009Was elaborated in the context of the National Information andCommunication Technology Strategic Plan 2007 – 2011RecommendationsThe setting up of a Child Safety Online WebsiteThe conduct of sensitization campaigns on Child Safety OnlineEnactment of legislation to child safety onlineThe elaboration of Safety Measures and best practices
26Computer Emergency Response Team of Mauritius (CERT-MU) Aegis of National Computer BoardNational CERT operational since May 2008Central coordination of information security incidentsHandle security incidents and monitor security problems occuring within public/private sectorsWarn and educate systems administrators and users about latest information security threats and suggest countermeasures by means of inofrmation dissemintationCERT-MU MissionTo enhance the security of Mauritius; information and communications infrastructure through effective collaboration and communication with all stakeholdersSputnik I:1955 – Eisenhouwer & Kremlin4 October 195770 kgs bleeping sphereARPA:Apply state-of-the-art technology to US defence
27CERT-MU : Contacts Incident Reporting Vulnerability ReportingSubscription to Mailing ListWebsite: