INTERNET PARENTAL CONTROLS & SECURITY Parents who are afraid to put their foot down usually have children who step on their toes. Chinese Proverb.

Slides:



Advertisements
Similar presentations
RhodesAZ Consulting, LLC
Advertisements

Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Rana Radwan LTEC 4550 Configuring a laptop to access a Wireless Access Point.
How To Set Up A Wireless Network Using A D-Link Wireless Router
DSL-2730B, DSL-2740B, DSL-2750B.
Remote Viewing Setup DVR & IP Video Devices
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
David Abarca, Instructor Del Mar College Computer Corner Keeping Your Children Safe Online.
Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
DVG-N5402SP.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
BY: Jordan Ameerali. What is an Internet Service Provider? A Internet Service Provider or ISP is a company that provides access to the Internet. For a.
Technical Training: DIR-615
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
Wireless Networking 102.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Linksys LNKWET11 Setup b Ethernet Converter Step 1. Annotate your Computer’s ethernet IP address. Step 2. Change the Ethernet IP Address/subnet/router.
WhatsApp – Tweaking Security -The new face of Information Technology Services 1.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Doc.: IEEE /743r0 Submission November 2002 Godfrey, IntersilSlide 1 Pluto’s Home Page.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Computer Networks S3 Prepared by May Lau
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
Wireless Networks and the NetSentron By: Darren Critchley.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Year 10 – Chapter 4 – Computer Networks Lesson 2: Setting up a Network Starter Task – Can you think of reasons to set up a network? Why Use Networks? 1.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Getting Started. Searching The best way to find information on the web: googling What search engines are there?
Networks.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Setting Wireless Network At Home By: Parveen Sharma.
Internet Security and Your Computer Welcome to Boot Camp.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
E-safety Technical Advice for Parents Nick Hockin Information Manager, Priory School.
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Networking & Wireless Routers II Driver Installation
How To Set Up A Wireless Network
Are you worry with your D-link Router Just dial toll free number D-Link Router Customer Care Number D-Link Router Customer Care Number
CallPcExperts prides itself in providing not only the best but also effective solutions to your problems. Get in touch with D-Link Router Customer Care.
Networking Essentials
LAN Connection Image at TTEC Parkway
To connect to the Internet, you must record the computers’ MAC Address. Follow these instructions. Click on Start Then Run.
Presentation transcript:

INTERNET PARENTAL CONTROLS & SECURITY Parents who are afraid to put their foot down usually have children who step on their toes. Chinese Proverb

In 2007, studies show that the average age a child is first exposed to online pornography is 11 years old.* Approximately 90% of children ages 8-16 have seen pornography on the Internet.* In a 2007 report, 89% of youth who frequent chat rooms receive sexual solicitations.* *

A COUPLE OF THINGS YOU MAY NOT KNOW ABOUT… Commonly used to bypass school filters

Peer-to-Peer Them 1 P2P Server Them 2 YOU

Files can contain anything Opens a hole in your firewall Porn Violence Virus spyware Popular: Kazaa Limewire Shareazaa Morpheus

1.Secure your router (optional, but a good idea) 2.Get decent DNS service (your ISP probably isn’t decent) 3.Fine-tune individual computers 1.Secure your router (optional, but a good idea) 2.Get decent DNS service (your ISP probably isn’t decent) 3.Fine-tune individual computers

1. Secure Your Router – Part I (not required for parental controls) Find your manual, or look online. Google Linksys (home.cisco.com), Belkin (belkin.com), Netgear (netgear.com), etc. Your router model # should be on its body (front, bottom, back). Click the Support link to start the hunt for a manual. Log in, and find the SSID Broadcast option. Disable it (or not…) ???

1. Secure Your Router – Part II (not required for parental controls) Require a PASSWORD to access the Internet via your router. Choose WEP and a 10-digit password (make one up, or let the router do it). All wireless devices MUST have the password to access the Internet.

1. Secure Your Router – Part IIIa (not required for parental controls) Either prevent certain PCs from gaining access, or only allow certain PCs to gain access by using MAC (physical) addresses.

1. Secure Your Router – Part IIIb (not required for parental controls) 1.Start>Run…>cmd>OK 2.Type: ipconfig /all 3.Scroll to: Wireless LAN adapter Wireless Network Connection: 4.Write down: Physical Address 5.Type it into the MAC Address Filter List -or- Go to Windows help and search on MAC ADDRESS.

2. Get Decent DNS Service

2. Get Decent DNS Service (continued) OpenDNSOR

2. Get Decent DNS Service (continued)

3. Fine-tune Individual Computers