Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ The.

Similar presentations


Presentation on theme: "Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ The."— Presentation transcript:

1 Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ erstaats@gcasda.org The Impact of Media Resources available @ www.es-es.net/2.html

2 Communicate Monitor Report COMMUNICATION

3 Anti-virus software Filtering programs Monitoring software Parental supervision

4 Establish rules for your child’s online life

5

6 Golden Rules to Teach 1.Rules from “real” life apply: courtesy, kindness, modesty, dignity, respect for law and others, etc. 2.Don’t talk/txt / MMS strangers 3.Keep personal information private (No cell # on FB) 4.Anything posted on the internet is not private and lasts forever (including photos, videos, etc.) 5.Communicate if you encounter something uncomfortable

7 The Influence of Media (75%) have a handheld device that is online A breakdown of media consumption among types and age groups. Total media use time is lower than exposure due to a 30 percent average of "media multitasking.” Kaiser Family Foundation” Kaiser Family Foundation

8 The Influence of Media Teen Media Exposure Associated With Depression Symptoms in Young Adulthood http://www.health.am/psy/more/teen-media- exposure-associated-with-depression-symptoms/ http://www.health.am/psy/more/teen-media- exposure-associated-with-depression-symptoms/ Messages through media may reinforce aggression and other risky behaviors, interfere with identity development or inspire fear and anxiety Cheating becomes much easier www.chacha.com www.kgbanswers.com kgbkgb www.chacha.comwww.kgbanswers.com Taken from "Association Between Media Use in Adolescence and Depression in Young Adulthood - A Longitudinal Study"

9 579 FriendsSee All 3 3

10 Friend Requests http://latimesblogs.latimes.com/technology/2011/05/teenager-arrested-for-ranking-female-classmates-looks-in-facebook-list.html

11 Risky Online Behaviors Sending or posting provocative images Sharing passwords with friends Embarrassing or harassing people Posting personal information Clicking on pop-ups If it is on the Internet IT IS NOT PRIVATE

12 - My status, photos, and posts - Family and relationships - Photos and videos I’m tagged in - Birthday - Permission to comment on your posts - Contact information Share a tagged post with friends of the friend I tag Friends Only

13 Mobile Technologies

14 22 % girls/18 % boys have electronically sent or posted nude or semi-nude images 1/3 boys ¼ girls have had nude or semi-nude images shared with them 40 percent report posting sexually suggestive messages ½ receive sexually suggestive messages Sexting http://voices.washingtonpost.com/parenting/2008/12/sexting.html

15 August of 2010, Adam Savage, of “MythBusters,” took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase “off to work” Image contained metadata reveling the exact geographical location the photo Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work GEO Tagging Read the full story here: http://nyti.ms/917hRhhttp://nyti.ms/917hRh

16 A woman in Golden Gate Park toke a photo with a phone. Because embedded geodata into photos uploaded to Flickr or Picasa, shots can be automatically placed on a map Searched Flickr map, and score—a shot from today. User’s photostream and determined it was the woman I had seen earlier A cluster of images in one location revealed photos of an apartment interior—a bedroom, a kitchen, living room Location-Aware Lifestyle The following was published in Wired Magazine in 2009 Read the full story here: http://bit.ly/bJqYmm

17 Disable the geotagging function Most smartphones/Tablets & several cameras automatically display geographical information It’s important that users make efforts to turn off geotagging More Info http://es-es.net/2.htmlhttp://es-es.net/2.html Turn off GPS function on phones

18 Software Jpg and PNG metadata striper http://www.steelbytes.com/?mid=30http://www.steelbytes.com/?mid=30 BatchPurifier LITE http://www.digitalconfidence.com/downloads.html Doc Scrubber http://www.javacoolsoftware.com/dsdownload.html Websites http://regex.info/exif.cgi http://trial.3bview.com/3BTrial/pages/clean.jsp Scrubbing Meta Data

19 Geo Tagg example from website Meta data lets see the original pre edited photo Can they get into your VM or fake the caller ID http://www.telespoof.com/freecall/agi http://www.telespoof.com/freecall/agi http://www.spoofcard.com/ http://www.telespoof.com/freecall/agi www.spoofcard.com http://www.slydial.com/apps.php Geo Tagging and Metadata Hands on

20 Product Comparison 2010 Mobile Phones Parental Controls

21 Save the messages for evidence Block or ban the bully from contacting your child Set up a new account Sign Up Email Address: Password: Report to the website, school, bully’s parents, or law enforcement

22 Cell-phone locking Serious collision detection Real-time GPS tracking Unsafe driving alerts Geo-fences are boundaries on a map that generate alerts when crossed. any inbound call, text, or e-mail. Anything that comes into the child's phone would actually be routed to the parent's phone." Read more: http://news.cnet.com/8301-19518_3-10433539- 238.html#ixzz1Mn6tKT00http://news.cnet.com/8301-19518_3-10433539- 238.html#ixzz1Mn6tKT00 Protector™ by TASER

23 Call Log Each incoming and outgoing number is logged along with duration and time stamp. SMS (Text Messages) Log Every text message is logged even if the phone's logs are deleted. Includes full text. GPS Locations Log GPS postions are uploaded every thirty minutes with a link to a map. Contacts Every contact on the phone is logged. New contacts added are also recorded. Tasks All personal tasks that are created are logged and viewable. Memos Every memo input into the phone is logged and viewable. Phone Tracking mobilespytool.com Cell ID Locations ID information on all cell towers that the device enters into range of is recorded. E-Mail Log All inbound & outbound email activity from the primary email account is recorded. Calendar Events Every calendar event is logged. Date, time, and locations are recorded. URL (Website) Log All URL website addresses visited using the phone's browser are logged. Photo & Video Log All photos & videos taken by the phone are recorded & are viewable.

24 Ghostery is a browser extension that is available for Internet Explorer, Firefox, Chrome and Safari Web Browsers Traces Eraser provides an easy way to clear your internet history, cookies, cached files and more. Adblock Plus for Chrome a Chrome add-on that makes ads disappear and offers more than 40 filters CyberGhost VPN 2011, all web traffic is routed through an anonymised web server –server iPhone Tracker is a simple Mac OS X application that maps the information that your iPhone is recording about your movements.application 5 Good Privacy Downloads

25 Top of the range spyphone Mobile Call Tapping, listen to actual phone calls Remote Listening (Room bugging) Read all incoming and outgoing SMS Read all Call logs Know the location, Location tracking SIM Change SMS Notification FlexiSpy

26 Features SMS Recording Call details Not voice recording GPS Location Log summaries Works on practically all smart phones Cost $49.97 for 3 months $69.97 for 6 months $99.97 for 12 months Mobile Spy

27 K9 Web Protection Browser Free Trusted company Blue Coat Systems, Inc. Rated 3.5 Stars on first release Updates follow quickly Safe Eyes Mobile $20.00 Trusted company InternetSafety.com Rated 3 stars Rarely Updated Options for iPhone

28 Features Works on multiple phones The features vary by make of phone SMS Logging Call recording GPS tracking Web Browser logging Pricing 12 months- Up to $200 6 months- Up to $150 3 months- Up to $100 MobiStealth http://www.mobistealth.com/products.php

29 Protect Your Personal Info Avoid using discount cards to pay for anything that you want to keep private Don’t send messages on an unsecured Wi-Fi network Mask your identity when you search Use search tools that can disconnect your computer’s identifying machine number from the search http://www.scroogle.org/cgi-bin/scraper.htm Virual Machines http://www.scroogle.org/cgi-bin/scraper.htm Pick passwords carefully Chose different usernames Read more: http://webupon.com/web-talk/digital-exposure-you-may-not-be-as-safe-as-you-think-you- are/#ixzz1GisN2LZYhttp://webupon.com/web-talk/digital-exposure-you-may-not-be-as-safe-as-you-think-you- are/#ixzz1GisN2LZY

30 Google Yourself / Your Kids What personal information is your child placing on blogs and personal WebPages? http://www.pipl.com http://www.peekyou.com http://yoname.com www.google.comwww.google.com www.myfamily.comwww.myfamily.com www.zoominfo.com www.alltheweb.com www.zabasearch.comwww.alltheweb.comwww.zabasearch.com

31 Data Mining with Google Google search strings site:myspace.com “SSN” site:myspace.com “birthday” site:myspace.com “Hate my parents” 31,100 hits site:facebook.com "phone number“ Place name in quotation marks (use variations) “First (Jon) Last” Legal First (Jonathan) Last” “First MI Last” Use groups.google.com and google.com/alerts to look for your child's name in newsgroups (address, phone number and other personal information) Go to my website for a Google search tutorial http://www.es-es.net/2.html

32 Good Resources www.netfamilynews.org Quality and current “nonprofit news service for “kid-tech news.” Based on the premise that informal, engaged parenting is essential to kids’ constructive use of technology and the Net.” www.pbs.org/parents/growingwithmedia Provides information on how media “can shape your child’s development and what you can do to create a media- literate household.” www.safekids.com Provides a “guide to making the Internet and Technology fun, safe, and productive.” www.besafeonline.org Advice and information about Internet safety for parents and teachers, plus opportunities to discuss problems and share solutions.

33 Good Resources www.getnetwise.org GetNetWise is a public service created by Internet industry corporations and public interest groups with the goal of having “Internet users be only one click away from the resources they need to make informed decisions about their and their family's use of the Internet.” www.netsmartz.org Created by the National Center for Missing & Exploited Children and Boys & Girls Clubs of America, “the NetSmartz Workshop is an interactive, educational safety resource to teach kids and teens how to stay safer on the Internet.” www.kids.us Kids.us is an Internet domain where “affiliated sites are regularly screened and monitored” so that “parents and children can trust the sites to provide educational and appropriate online fun.”

34 Good Resources www.commonsensemedia.org Provides family-friendly reviews of media (TV, film, music, Web sites, games, and books) and parent tips on “healthy media diets” for families. www.netmom.org Run by the author of Net-mom's Internet Kids & Family Yellow Pages, a family-friendly directory to 3,500 of the best children's resources the Internet has to offer, this site highlights good sites for kids and provides safety tips for parents

35 Common Chat Terms POS --Parents are looking over my shoulder POTS -- Parents over the shoulder (my parents are watching; I can't really talk) P911 -- My parents are in the room. P = Parents, and 911 = emergency; in other words, either drop the subject or watch the language WTGP-- Want to go private? (move to a private chat room) a/s/l or asl - - Age/Sex/Location -- (used to ask a chatter their personal information) GGOH --Gotta get outta here OLL --Online love GTR --Got to run TNT --'Til next time LMIRL -- Let's meet in real life

36 Software Recommendation Sites The Safe Side – Stranger Safety Video http://www.thesafeside.com/ Darkness to Light – 7 Steps to Protecting Our Children http://www.darkness2light.org/ Cyberbully Resources http://www.teenangels.org/ http://www.stopcyberbullying.org/index2.html Google Alerts http://www.google.com/alerts National Center for Missing and Exploited Children http://www.ncmec.org/ Son, Call Me Big Brother http://wired.com/wired/archive/14.07/start.html?pg=8 Download your fav apps all at once http://ninite.com/ Family Watchdog – National Sex Offender Search http://www.familywatchdog.us

37 Software Recommendation Sites Search for your local FBI field office http://www.fbi.gov/contact/fo/fo.htm A Parent's Guide to Internet Safety http://www.fbi.gov/publications/pguide/pguidee.htm Kidz Privacy http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/adults.htm CyberTip Line, National Center for Missing and Exploited Children http://www.missingkids.com/cybertip/ Safe Surfing with your Family, Safe Surfing Checklist http://www.yahooligans.com/parents/checklist.html Safeguards, Computer safety tips for your home and child http://www.enough.org/safeguards.htm Tips for Parents to Protect Children from Internet Predators, Guidelines for Parents http://www.safekids.com/parent_guidelines.htm Kids Rules for Online Safety http://www.safekids.com/myrules.htm Rules in Cyberspace http://www.cybercrime.gov/rules/kidinternet.htm Cyberbullying http://cyberbully.org/ Chat Slang http://www.web-friend.com/help/lingo/chatslang.html NetLingo http://www.netlingo.com/

38 Resources All resources and more at my website (bottom of page) http://www.es-es.net/2.html Chat Abbreviation -PDF- Download Download Cleaning Your Windows Computer -PDF- Download Download Free Software for Home Users -PDF- Download Download How to Check Your Computers History -PDF- Download Download I-Educator -PDF- Download Download Internet Safety for Kids -PDF- Download Download Internet terms -PDF- Download Download Internet Safety Plan -PDF- Download Download Internet Safety Tips for Parents -PDF- Download Download Secure Mac step by Step -PDF- Download Download Tracking People around town -PDF- Download Download Internet Safety for Kids link list www.packet-level.com/Kids is very graphic www.packet-level.com/Kids www.webwisekids.com has excellent resources for parents www.webwisekids.com

39 Bibliography 1.Tapscott, The N’ Generation, 1998: 1-2. http://www.amazon.com/gp/product/0071347984/103-7584413-9423004?v=glance&n=283155 2.World Youth Report 2005 http://www.un.org/esa/socdev/unyin/wyr05.htm 3.The Henry J. Kaiser Family Foundation Study, 3/05 4.Kaiser Family Foundation http://www.kff.org/ 5.Numsum Myspace Stats www.numsum.com 6.Media Central “The Buzz” 7. http://www.pewinternet.org/pdfs/PIP_Teens_Report.pdf http://www.pewinternet.org/pdfs/PIP_Teens_Report.pdf 8.The National Youth Agency www.nya.org.uk 9.The Search Agency http://www.thesearchagency.com/ResourceLibrary/search_engine_stat.aspx?sCatId=2 10. Internet Addiction by Wendi Kannenberg http://gien.adventist.org/forum2006/presentations/kannenberg-online-addictions.pdfhttp://gien.adventist.org/forum2006/presentations/kannenberg-online-addictions.pdf 11. Internet Safety for Kids www.packet-level.com/kids 12. US News and World Report – Special Report- September 18,2006 www.usnes.com 13. 'Predator's Playground‘?‘ http://www.msnbc.msn.com/id/11065951/site/newsweek/ 14. Decoding MySpace http://www.usnews.com/usnews/news/articles/060910/18myspace_5.htm http://www.usnews.com/usnews/news/articles/060910/18myspace_5.htm


Download ppt "Ernest Staats Technology Director MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A+ The."

Similar presentations


Ads by Google