Lack of information security awareness amongst children Dr MZ Ramorola 24 November 2010.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
How to protect yourself, your computer, and others on the internet
Northside I.S.D. Acceptable Use Policy
Developed by Technology Services 1:1 Laptop Initiative
Hart District Acceptable Use Policy Acceptable Use Policy.
Keeping Your Child Safe on the Internet
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
$100 $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $200 $300 $400 $500.
How to keep your kids safe online
Using internet and cell phones safely
Boyertown Area School District Acceptable Use Policy.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Teenagers and The Internet Ms Julie Clune Saint Ignatius’ College.
Internet Safety for You and Your Students A presentation for the North Woods Partnership By Edie Miles February 7, 2007 The quote below is adapted from.
INTERNET SAFETY FOR STUDENTS
Grade 5 Student Assistants
Raising a 21 st Century Learner; Shining a Light on the Technology Native Presented by Leslie Watnik MA/MST, PD/SDA, Parent.
INTERNET SAFETY Lynn W Zimmerman, PhD.  Hacking  Identity theft  Stolen passwords  Invasion of privacy POTENTIAL PROBLEMS  Stalking  Cyber-bullying.
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Welcome… Parent Awareness Session. Media Story 21 year old media student from Surrey who…… –Arranged to meet a 14-year-old at a railway station –Had.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Are you a digital citizen? Zeborah Ware 1. Table of Contents Definition of Digital Citizenship Page 3 Classroom Rules for Cell Phones Page 4 Social Networking.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Security and Ethics Safeguards and Codes of Conduct.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
Laws and Rules That Govern Internet Safety Ashley Martin.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Computer-Based Technology in the Classroom EDX 1201X National University October 20,2012.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
E-safety Helping your children stay safe on-line A presentation for Parents.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
E-Safety Parent Talk Helping to keep your children safe online.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
A Parent’s Guide to Child Safety on the Internet.
Internet Safety. Online Concerns: Contact Content Conduct.
Danielle Hildebrant  Acceptable Use Policies ◦ document stating the use and limits of the network or internet  Cyberbullying ◦ Bullying that takes.
Safety.
E-Safety Briefing
Working to Keep our Children Safe in a World Filled with Technology
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Warrior Wednesday DIGITAL CITIZENSHIP.
The Issues with Technology in education
What is Information Security?
Student User Agreement and Policy 2022
Presentation transcript:

Lack of information security awareness amongst children Dr MZ Ramorola 24 November 2010

Introduction Information security – the protection of information and information systems against unauthorised access of information (Luzwick, 2000; Bar, 2008). Information security management standards are among the most widely used methods of security management. These standards focus on ensuring that certain information security processes or activities exist. they are unconcerned about and fail to give advice on how these security processes can be accomplished in practice. It is however, not important that something is done, but what really matters here is how well it is done. We all know that users, including children should follow information security procedures. The real problem here is how we actually ensure children do in fact follow these security procedures.

Users are not well informed about security issues, they are often told as little as possible because security department see them as “inherently insecure” (Adams & Sasse, 1999). One of the best practice of information security is to promote awareness to all individuals who have access to the information systems. Furthermore, children should be educated and trained in various aspects of information security to help inform how systems are run and how to develop and apply information security controls. they should be provided with guidance to help them understand the meaning of information security; the importance of complying with the information security policy; and their personal responsibilities for information security.

Children (digital kids, N-gene, 21 st century generation, YouTube) Today’s children has grown up in a new digital landscape. For most of them, there’s never been a time in their lives when computers, digital video, cell phones, video games, the Internet and all the other digital wonders that increasingly define their world haven't surrounded them. Constant exposure to digital media has changed the way they process, interact and use information (Jukes, 2008).

Risks children encounter online The majority of children have access to the Internet and related communication technologies such as cell phones, facebook, mixit, twitter, etc. While the internet is fundamentally a great place for children, there are some areas of cyberspace that are not appropriate. It is important to inform children about the types of risks that they may encounter on the Internet. These can include a heterogeneous set of intended and unintended experiences which increase the likelihood of harm to the internet user: content risks, contact risks and conduct risks (Jukes, 2008). Risks can be accepted, mitigated or transferred, but they should never be ignored.

Information theft The right of individuals and organizations to deny or restrict the collection and use of information about them (Shelly et al, 2008). Children may unknowingly or deliberately share personal information without realising they may be subject to identify theft, or that they are leaving behind content that might not reflect well on them in future. There are many ways children can lose their privacy on the Internet, e.g. disclosing the address, telephone numbers, or even names to a stranger. If children are in Facebook, they think that it is a closed room, so they exchange information. Children need to be aware that it is not private. They should not give their personal information such as IDs, family member information to strangers. This can be dangerous as financial information (Gerson, 2010). To protect their information on the Net they may implement the user ID or encryption codes (Shelly et al, 2008).

False information from advertisers, informal web sites, newsgroups and chat areas The most dangerous places on the Internet are chat rooms, newsgroups and programs where kids can disclose information about themselves. Kids need to understand that not everything they see on the Net is true, just as with print, TV and other media, it is important to consider the source and think for themselves (Magid, 1999:1). Not all of the information on the web is placed there by reliable sources (Shelly et al, 2008).

Fundraising and marketing Sometimes companies and organisations collect information about children for use in marketing, fundraising, and other activities. Children should be instructed not to give out personal information to web sites of companies and organisations, even if they have heard of them or have good feelings about them. They have to check first with their parents before revealing their information.

Pornography Child pornography consists of photographs, videotapes, magazines, books, and films that depict children in sex acts, all of which are illegal. These include some child nudity, simulated sex involving children and material that is computer-doctored to look like child porn (National Coalition for the Protection of Children and Families, 1999). Child pornography is frequently exchanged via the Internet, and sexual predators can use the site to try to reach out to children for sexual purposes. To avoid this, teachers and parents must make a priority to supervise children on the Internet. Filtering programs can also be employed to keep children out of the inappropriate site.

Software theft Software theft takes many forms – from a child physically stealing a CD to intentional piracy of software (the unauthorised and illegal duplication of copyrighted software). Software piracy is by far the most common form of software theft. A lot of material posted on the Internet is copyrighted, which means that it might be illegal to reprint or post the material without permission.

Software theft cont. Kids need to understand that they do not have the right to re-post or distribute copyrighted graphics, music, videos, and text from web sites without permission. This includes giving copies of the material to friends.

What children should be aware of When you purchase a software, you actually do not own the software, instead you have purchased the right to use the software as outlined in the software license. A software license is an agreement that provides specific conditions for use of the software, which users must accept before using the software. The most common type of license agreement included with software packages purchased by individual users is a single user license agreement (EULA).

EULA - Conditions Users may install the software on only one computer. Some licenses allow the user to install on one desktop and one notebook computers. Users may not install the software on a network, such as a school computer lab network. Users may make one copy for backup purposes. Users may not give copies to friends and colleagues. Unless otherwise specified by a software license, users do not have the right to loan, rent, or in any way distribute software purchased. Doing so is not only a violation of copyright law, but also a federal crime (Shelly et al, 2008).

Software piracy and software market It increases the chance of viruses Reduces users ability to receive technical support Significantly drives up the price of software for all users.

File sharing risks Just like you shouldn’t open attachments from people you don’t trust, you should be wary about downloaded files from them as well. Using file-sharing networks creates a risk that viruses or other malignant code (spyware) could be spread to your computer over the network. Viruses may damage your computer or interfere with your files, spyware may track your online activities and send that information to third parties. Children should be informed about the installation and updating of reliable antivirus software.

Conclusion Information security awareness, our children’s future! Thank You