Presentation is loading. Please wait.

Presentation is loading. Please wait.

Presented by: Ashwin Seegolam & Shailaja Oolun

Similar presentations

Presentation on theme: "Presented by: Ashwin Seegolam & Shailaja Oolun"— Presentation transcript:

1 Presented by: Ashwin Seegolam & Shailaja Oolun
Internet Safety for Young People Presented by: Ashwin Seegolam & Shailaja Oolun NCB

2 Introduction Online technologies are becoming a favourite way for young people to communicate but they need to be aware of the potential risks. Safer Internet Day takes place each year in February. The main objective of the Safer Internet Day is to raise awareness about safe and responsible use of new technologies among children and young people. Theme is "Think before you post!” ”, which focuses on how images are managed online and consequently, how privacy are dealt in digital environments. In Mauritius, the following Internet Safety activities are organised by the NCB, IT Security Unit of the Ministry of Information and Communication Technology and the Ministry of Education, Culture and Human Resources : 1: Awareness sessions for secondary schools. 2: Awareness sessions in rural areas through the Cyber caravans. 3: Brochures and Fact sheets on Internet Safety for Children. 4: Safer Internet Day website. (

3 Usage of the Internet News and Reference
Entertainment (movies, videos, clips) Commerce (online shopping, auctioning) File sharing (mp3) Social Networking (Hi5, Facebook) Instant Communication ( , chat) Accessing Internet on Mobile Phones

4 Internet Addiction Spend excessive amounts of time online at the expense of and to the detriment of other aspects of their lives. Might include the following:- 1: Relationships: spending excessive amounts of time starting and maintaining online friendships in chat rooms, which replace real-life friends and family. 2: Money: compulsively gambling online & trading online. 3: Information searching: compulsive web surfing . 4: Gaming: obsessive computer game playing, including multi-user games. 5: Sex: addiction to adult chat rooms, cyber sex or pornography on the Internet.

5 Impacts on Children Less investment in relationships with friends and interruption of social relationships Feeling depressed and irritable when not at the PCs. Suffering withdrawal symptoms when without access or when reducing Internet use – these symptoms include anxiety, restlessness, depression, even trembling hands Lack of sleep and excess fatigue Declining school results Withdrawal from school social activities and events

6 Dangers of Internet Personal Information
Profile or personal information could be disclosed during online conversations. Such information can lead to receiving unwanted contact from inappropriate people. Pictures Posting of comments or images of oneself or others online, which may compromise the person’s safety or be used as a means to bully others. Threats (Spyware, viruses) When connected online, your computer is at risk from spyware, viruses and other invasive programmes if you are sharing files on non-regulated sites.

7 Social Networking Sites
Examples are Face book and Research in US shows that out of all teenagers with an online profile: - 82% include their first name 29% include their last name 79% post photos of themselves 49% include the name of their schools. Children should be aware that placing pictures on the web leads to:- 1: Contact 2: Bullying 3: Distorting images

8 Social Networking Sites (Cont)

9 Online Predators The anonymity of the Internet means that trust and intimacy can develop quickly online. Predators take advantage of this anonymity to build online relationships with inexperienced young people. How Online Predators work? Find kids through social networking, blogs, chat rooms, instant messaging, , discussion boards, and other Web sites. Seduce their targets through attention, affection, kindness, and even gifts. Know the latest music and hobbies likely to interest kids. Listen to and sympathize with kids' problems. Try to ease young people's inhibitions by gradually introducing sexual content into their conversations or by showing them sexually explicit material.

10 Posting of Pictures on the Internet
Creation or posting inappropriate, offensive or even illegal content on the Internet could get you into trouble Think very carefully before including a personal photograph of yourselves or your friends in your Profile. Photos online can easily be copied, changed and used elsewhere, and can potentially stay online Forever. Examples of Pictures posted on the Internet

11 Cyberbullying The ‘sending or posting of harmful or cruel text or images using the internet or other digital communication devices’. Child Net International The Anti-Bullying Association - seven types of cyberbullying, 1. Text messages – unwelcome texts that are threatening. 2. Picture/video-clips via mobile phone cameras 3. Mobile phone calls – silent calls or abusive messages; or stealing the victim’s phone and using it to harass others 4. s – threatening or bullying s, 5. Chatroom bullying 6. Instant messaging – unpleasant messages sent as children conduct real-time conversations online. 7. Bullying via websites – use of defamatory blogs (web logs)

12 How technology used to bully others
Great For Examples of misuse Mobile Phones Keeping in touch by voice or text, taking and sending pictures and film. Useful in emergency situations & for allowing children a sense of independence. Sending nasty calls or messages, including threats, intimidation and harassment. Taking and sharing humiliating images. Filming others being harassed and sending them to other phones. Sending electronic letters, pictures, and other files quickly and cheaply anywhere in the world. Sending nasty or threatening messages. Forwarding unsuitable content including images and video clips, or sending computer viruses. Instant Messenger Text or voice chatting live with friends online. An effective way of keeping in touch even while doing other things on the PC. Sending nasty messages or content. Using someone else’s account to forward rude or mean messages via their contacts list.

13 How technology used to bully others (Cont)
Great For Examples of misuse Chat Rooms and Message Boards Groups of people around the world can text or voice chat live about common interest. For the young, this is an easy way to meet new people and explore issues which they are too shy to talk about in person. Sending nasty or threatening anonymous messages. Making friends under false pretenses – people pretending to be someone they’re not in order to get personal information that they can misuse in a range of ways – e.g. by spreading secrets or blackmailing. Social Networking Sites Socializing with friends and making new ones. Allowing the young to be creative online. Personalizing profile and homepages, creating and uploading content. Posting nasty comments and humiliating images. Accessing another person’s account details, deleting information or making private information public. Creating fake profiles to pretend to be someone else and get the person into trouble.

14 Examples of Cyberbullying
Bullying: My close friend (13) was chatting on the Internet one night and met this guy who she thought was fabulous. He claimed he was 16. My friend gave him her address. He started asking her really gross questions so she decided not to talk to him again. But because she gave him her address he started sending her rude and gross messages and pictures. She could not get rid of him. Her parents found out and disconnected the internet. Mobile Bullying: Met a boy at the park... He fancied me... I wasn’t sure so gave my friend’s mobile number instead... She keeps getting calls from him... She doesn’t want to make me look stupid, but is annoyed she has to lie. Instant Messenger: I am a 12 year old boy and I have been using IM to chat with my school friends. My close friend gave out my chat name and location to one of her contacts that she met online but does not know personally. This person started to contact me regularly, trying to set up a "date" with me. My friend then gave this person my real name and threatened to give out my telephone number and . This was really frightening, and I just stopped using IM altogether. I am so angry that I want to give out my friend’s information too. Do you think this person will try and find me? Source:

15 Examples of Cyberbullying (Cont)
Chat Bullying: In February 2000, a thirty-three-year-old man made contact with a twelve-year-old girl in a teenage Internet chatroom. This first contact in a chatroom led to s every day over a two-month period and then to regular conversations on a mobile phone. In this way the girl was groomed from this initial chatroom contact to the point where she actually met the man offline and to the point where she was sexually assaulted. Online Gaming: A 13-year old boy in the USA made online friends with an older man via an online gaming website. In July 2004 after playing and chatting for several months, the boy and his new friend arranged to meet. The boy thought he and his new friend were to spend 4 days playing role-play games. The boy’s mother put him on the plane to fly to meet this friend in another state. She didn’t know that the new friend was a convicted sex-offender. The first day of the visit the boy was invited to the Zoo and experienced an unusual amount of 'hugging' and 'back rubbing'. And then, luckily, the visit ended: some relatives to the sex-offender had alarmed the authorities and the boy was rescued by the police.

16 Why do Youngsters Cyberbully?
They have family problems. They are being bullied themselves. They are selfish or spoilt and want to get on their own way. They have no friends and being lonely. They feel bad themselves and want others to feel the same. They are taking out their frustrations on others. They feel insecure and unimportant – bullying gives them power. They want to look big in front of others. They don’t understand how bad victims feel. They have been bullied into joining a bully gang and thus have gone along with things just to keep on the bully’s good sides.

17 How is Cyber Bullying making you feel ?
Sad? Nervous? Terrified? Scared? Upset? Unsafe? Worried? Insecure?

18 Prevention tips on Cyberbullying
If you are being cyberbullied: ● You should not erase any bullying messages you receive; do a record instead. ● You should not reply to any bullying messages you receive. ● You MUST tell someone (your teacher, parents) about this. ● You need to look into how you can block these messages. ● You should never give out private information when online. ● You should not open from strangers or bullies, just delete them. ● You should not put anything online without consent of your parents. ● Never send messages when you're angry. ● Do not join in and bully other kids online. If you see it, show the bullying to an adult.

19 Using Email Ensure you are addressing the right person
prior to sending Beware of s from unknown parties (unsolicited s) Do not open unsolicited s Never respond to unsolicited s e.g. ‘You have won $1,000,000. Kindly send your bank details for crediting your account.’ These are scams also known as social engineering attacks

20 Suspicious

21 Suspicious

22 Using Emails Using Email
Accepting s, IM messages, or opening files, pictures or texts from people you don’t know or trust can lead to problems – they may contain viruses or nasty messages! Be suspicious of all files you receive, check with the sender if you are unsure, and don’t open anything sent by someone you don’t know and trust. Suspicious attachments must NOT be opened (files with extensions .exe, .com, .bat, .reg extensions) Always keep your passwords private – Identity theft

23 Spyware/Adware Carefully crafted programs written by attackers
Downloaded from Internet – often silently Designed to: (a) Gather private, personal information (b) Create system instability (c) Damage or interfere with legitimate applications operation (d) Open a backdoor on infected systems (e) Allow a spyware operator to take over an infected system

24 Spyware/Adware Refrain from downloading unnecessary games,
screensavers & other software from the Internet – they may have embedded spyware or viruses. Use a regularly updated anti-spyware software Protect your computer and personal files by visiting reputable sites and by installing a firewall and antivirus software. Practice safe internet surfing

25 Child Safety Online Action Plan
Endorsed by Cabinet in January 2009 Was elaborated in the context of the National Information and Communication Technology Strategic Plan 2007 – 2011 Recommendations The setting up of a Child Safety Online Website The conduct of sensitization campaigns on Child Safety Online Enactment of legislation to child safety online The elaboration of Safety Measures and best practices

26 Computer Emergency Response Team of Mauritius (CERT-MU)
Aegis of National Computer Board National CERT operational since May 2008 Central coordination of information security incidents Handle security incidents and monitor security problems occuring within public/private sectors Warn and educate systems administrators and users about latest information security threats and suggest countermeasures by means of inofrmation dissemintation CERT-MU Mission To enhance the security of Mauritius; information and communications infrastructure through effective collaboration and communication with all stakeholders Sputnik I: 1955 – Eisenhouwer & Kremlin 4 October 1957 70 kgs bleeping sphere ARPA: Apply state-of-the-art technology to US defence

27 CERT-MU : Contacts Incident Reporting
Vulnerability Reporting Subscription to Mailing List Website:

28 Conclusions Thank You

Download ppt "Presented by: Ashwin Seegolam & Shailaja Oolun"

Similar presentations

Ads by Google