Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ The.

Similar presentations


Presentation on theme: "Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ The."— Presentation transcript:

1 Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ The Impact of Media Resources

2 Communicate Monitor Report COMMUNICATION

3 Anti-virus software Filtering programs Monitoring software Parental supervision

4 Establish rules for your child’s online life

5

6 Golden Rules to Teach 1.Rules from “real” life apply: courtesy, kindness, modesty, dignity, respect for law and others, etc. 2.Don’t talk/txt / MMS strangers 3.Keep personal information private (No cell # on FB) 4.Anything posted on the internet is not private and lasts forever (including photos, videos, etc.) 5.Communicate if you encounter something uncomfortable

7 The Influence of Media (75%) have a handheld device that is online A breakdown of media consumption among types and age groups. Total media use time is lower than exposure due to a 30 percent average of "media multitasking.” Kaiser Family Foundation” Kaiser Family Foundation

8 The Influence of Media Teen Media Exposure Associated With Depression Symptoms in Young Adulthood exposure-associated-with-depression-symptoms/ exposure-associated-with-depression-symptoms/ Messages through media may reinforce aggression and other risky behaviors, interfere with identity development or inspire fear and anxiety Cheating becomes much easier kgbkgb Taken from "Association Between Media Use in Adolescence and Depression in Young Adulthood - A Longitudinal Study"

9 579 FriendsSee All 3 3

10 Friend Requests

11 Risky Online Behaviors Sending or posting provocative images Sharing passwords with friends Embarrassing or harassing people Posting personal information Clicking on pop-ups If it is on the Internet IT IS NOT PRIVATE

12 - My status, photos, and posts - Family and relationships - Photos and videos I’m tagged in - Birthday - Permission to comment on your posts - Contact information Share a tagged post with friends of the friend I tag Friends Only

13 Mobile Technologies

14 22 % girls/18 % boys have electronically sent or posted nude or semi-nude images 1/3 boys ¼ girls have had nude or semi-nude images shared with them 40 percent report posting sexually suggestive messages ½ receive sexually suggestive messages Sexting

15 August of 2010, Adam Savage, of “MythBusters,” took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase “off to work” Image contained metadata reveling the exact geographical location the photo Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work GEO Tagging Read the full story here:

16 A woman in Golden Gate Park toke a photo with a phone. Because embedded geodata into photos uploaded to Flickr or Picasa, shots can be automatically placed on a map Searched Flickr map, and score—a shot from today. User’s photostream and determined it was the woman I had seen earlier A cluster of images in one location revealed photos of an apartment interior—a bedroom, a kitchen, living room Location-Aware Lifestyle The following was published in Wired Magazine in 2009 Read the full story here:

17 Disable the geotagging function Most smartphones/Tablets & several cameras automatically display geographical information It’s important that users make efforts to turn off geotagging More Info Turn off GPS function on phones

18 Software Jpg and PNG metadata striper BatchPurifier LITE Doc Scrubber Websites Scrubbing Meta Data

19 Geo Tagg example from website Meta data lets see the original pre edited photo Can they get into your VM or fake the caller ID Geo Tagging and Metadata Hands on

20 Product Comparison 2010 Mobile Phones Parental Controls

21 Save the messages for evidence Block or ban the bully from contacting your child Set up a new account Sign Up Address: Password: Report to the website, school, bully’s parents, or law enforcement

22 Cell-phone locking Serious collision detection Real-time GPS tracking Unsafe driving alerts Geo-fences are boundaries on a map that generate alerts when crossed. any inbound call, text, or . Anything that comes into the child's phone would actually be routed to the parent's phone." Read more: 238.html#ixzz1Mn6tKT00http://news.cnet.com/ _ html#ixzz1Mn6tKT00 Protector™ by TASER

23 Call Log Each incoming and outgoing number is logged along with duration and time stamp. SMS (Text Messages) Log Every text message is logged even if the phone's logs are deleted. Includes full text. GPS Locations Log GPS postions are uploaded every thirty minutes with a link to a map. Contacts Every contact on the phone is logged. New contacts added are also recorded. Tasks All personal tasks that are created are logged and viewable. Memos Every memo input into the phone is logged and viewable. Phone Tracking mobilespytool.com Cell ID Locations ID information on all cell towers that the device enters into range of is recorded. Log All inbound & outbound activity from the primary account is recorded. Calendar Events Every calendar event is logged. Date, time, and locations are recorded. URL (Website) Log All URL website addresses visited using the phone's browser are logged. Photo & Video Log All photos & videos taken by the phone are recorded & are viewable.

24 Ghostery is a browser extension that is available for Internet Explorer, Firefox, Chrome and Safari Web Browsers Traces Eraser provides an easy way to clear your internet history, cookies, cached files and more. Adblock Plus for Chrome a Chrome add-on that makes ads disappear and offers more than 40 filters CyberGhost VPN 2011, all web traffic is routed through an anonymised web server –server iPhone Tracker is a simple Mac OS X application that maps the information that your iPhone is recording about your movements.application 5 Good Privacy Downloads

25 Top of the range spyphone Mobile Call Tapping, listen to actual phone calls Remote Listening (Room bugging) Read all incoming and outgoing SMS Read all Call logs Know the location, Location tracking SIM Change SMS Notification FlexiSpy

26 Features SMS Recording Call details Not voice recording GPS Location Log summaries Works on practically all smart phones Cost $49.97 for 3 months $69.97 for 6 months $99.97 for 12 months Mobile Spy

27 K9 Web Protection Browser Free Trusted company Blue Coat Systems, Inc. Rated 3.5 Stars on first release Updates follow quickly Safe Eyes Mobile $20.00 Trusted company InternetSafety.com Rated 3 stars Rarely Updated Options for iPhone

28 Features Works on multiple phones The features vary by make of phone SMS Logging Call recording GPS tracking Web Browser logging Pricing 12 months- Up to $200 6 months- Up to $150 3 months- Up to $100 MobiStealth

29 Protect Your Personal Info Avoid using discount cards to pay for anything that you want to keep private Don’t send messages on an unsecured Wi-Fi network Mask your identity when you search Use search tools that can disconnect your computer’s identifying machine number from the search Virual Machines Pick passwords carefully Chose different usernames Read more: are/#ixzz1GisN2LZYhttp://webupon.com/web-talk/digital-exposure-you-may-not-be-as-safe-as-you-think-you- are/#ixzz1GisN2LZY

30 Google Yourself / Your Kids What personal information is your child placing on blogs and personal WebPages?

31 Data Mining with Google Google search strings site:myspace.com “SSN” site:myspace.com “birthday” site:myspace.com “Hate my parents” 31,100 hits site:facebook.com "phone number“ Place name in quotation marks (use variations) “First (Jon) Last” Legal First (Jonathan) Last” “First MI Last” Use groups.google.com and google.com/alerts to look for your child's name in newsgroups (address, phone number and other personal information) Go to my website for a Google search tutorial

32 Good Resources Quality and current “nonprofit news service for “kid-tech news.” Based on the premise that informal, engaged parenting is essential to kids’ constructive use of technology and the Net.” Provides information on how media “can shape your child’s development and what you can do to create a media- literate household.” Provides a “guide to making the Internet and Technology fun, safe, and productive.” Advice and information about Internet safety for parents and teachers, plus opportunities to discuss problems and share solutions.

33 Good Resources GetNetWise is a public service created by Internet industry corporations and public interest groups with the goal of having “Internet users be only one click away from the resources they need to make informed decisions about their and their family's use of the Internet.” Created by the National Center for Missing & Exploited Children and Boys & Girls Clubs of America, “the NetSmartz Workshop is an interactive, educational safety resource to teach kids and teens how to stay safer on the Internet.” Kids.us is an Internet domain where “affiliated sites are regularly screened and monitored” so that “parents and children can trust the sites to provide educational and appropriate online fun.”

34 Good Resources Provides family-friendly reviews of media (TV, film, music, Web sites, games, and books) and parent tips on “healthy media diets” for families. Run by the author of Net-mom's Internet Kids & Family Yellow Pages, a family-friendly directory to 3,500 of the best children's resources the Internet has to offer, this site highlights good sites for kids and provides safety tips for parents

35 Common Chat Terms POS --Parents are looking over my shoulder POTS -- Parents over the shoulder (my parents are watching; I can't really talk) P My parents are in the room. P = Parents, and 911 = emergency; in other words, either drop the subject or watch the language WTGP-- Want to go private? (move to a private chat room) a/s/l or asl - - Age/Sex/Location -- (used to ask a chatter their personal information) GGOH --Gotta get outta here OLL --Online love GTR --Got to run TNT --'Til next time LMIRL -- Let's meet in real life

36 Software Recommendation Sites The Safe Side – Stranger Safety Video Darkness to Light – 7 Steps to Protecting Our Children Cyberbully Resources Google Alerts National Center for Missing and Exploited Children Son, Call Me Big Brother Download your fav apps all at once Family Watchdog – National Sex Offender Search

37 Software Recommendation Sites Search for your local FBI field office A Parent's Guide to Internet Safety Kidz Privacy CyberTip Line, National Center for Missing and Exploited Children Safe Surfing with your Family, Safe Surfing Checklist Safeguards, Computer safety tips for your home and child Tips for Parents to Protect Children from Internet Predators, Guidelines for Parents Kids Rules for Online Safety Rules in Cyberspace Cyberbullying Chat Slang NetLingo

38 Resources All resources and more at my website (bottom of page) Chat Abbreviation -PDF- Download Download Cleaning Your Windows Computer -PDF- Download Download Free Software for Home Users -PDF- Download Download How to Check Your Computers History -PDF- Download Download I-Educator -PDF- Download Download Internet Safety for Kids -PDF- Download Download Internet terms -PDF- Download Download Internet Safety Plan -PDF- Download Download Internet Safety Tips for Parents -PDF- Download Download Secure Mac step by Step -PDF- Download Download Tracking People around town -PDF- Download Download Internet Safety for Kids link list is very graphic has excellent resources for parents

39 Bibliography 1.Tapscott, The N’ Generation, 1998: World Youth Report The Henry J. Kaiser Family Foundation Study, 3/05 4.Kaiser Family Foundation 5.Numsum Myspace Stats 6.Media Central “The Buzz” The National Youth Agency 9.The Search Agency 10. Internet Addiction by Wendi Kannenberg 11. Internet Safety for Kids 12. US News and World Report – Special Report- September 18, 'Predator's Playground‘?‘ 14. Decoding MySpace


Download ppt "Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ The."

Similar presentations


Ads by Google