IMinistry: Website and Internet Security Issues Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-Net+,

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

D Internet Usage How digitalis Generation D? Ernest Staats MS Information Assurance, MCSE, CNA, CWNA, CCNA, Security+, I-Net+, Network+,
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Internet / Technology Safety Class Internet usage awareness for children, youth and adults.
How to protect yourself, your computer, and others on the internet
Internet Safety and Cyber Bullying All info came from
Developed by Technology Services 1:1 Laptop Initiative
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Hart District Acceptable Use Policy Acceptable Use Policy.
Services Course Windows Live SkyDrive Participant Guide.
Keeping digital advertising within the law EFCCE Conference May, Paris LHC Building Blocks - Media Law Training.
Services Course Windows Live SkyDrive Participant Guide.
Keeping Your Child Safe on the Internet
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
PRIVACY CONSIDERATIONS Privacy for Children Under 13 1 February 2013.
 For museums online social media has the potential to be more than traditional marketing  Social media is about creating a community with our visitors.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
4.01 How Web Pages Work.
How to keep your kids safe online
FARMINGTON AREA PUBLIC SCHOOLS SUMMER TECHNOLOGY ACADEMY AUGUST 18TH, 2010 Web 2.0 Tools.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Microsoft Passport Waldemar Swiercz.
Internet Safety Christopher M. Sattele PLS: SP10 ENGOL P. Hutton.
What Every Parent Needs to Know! Internet Safety Information for Parents Purpose: Provide practical information parents can use at home Present safety.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Risk Management Guidelines for Youth Websites
© 2009 SCHOOL FAMILY MEDIA Keeping Your Child Safe on the Internet © 2009 SCHOOL FAMILY MEDIA.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
INTERNET SAFETY Tips for becoming a “surfer” dude!
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
The Teacher Is In Charge There are dozens of free services, but Gaggle.Net is the only service designed specifically for classroom use. The biggest.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
Internet Law and Safety By Gerry Chudleigh. Office of General Counsel 1. Statement of Ownership –Two Samples 2. COPPA Statement 3. Image Release Form.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Acceptable Use Policy By: Ashley Crehan Jessica Harmon Emily Edwards.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
Internet Safety Safely Navigating Uncharted Waters.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Internet Safety. Online Concerns: Contact Content Conduct.
Safety.
Facebook privacy policy
Internet Identity, Safety, & Security
Information Security.
TECHNOLOGY GUIDE THREE
Teaching Internet Safety
Columbus State University
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
21st Century Learning Spaces
Unit# 5: Internet and Worldwide Web
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Presentation transcript:

iMinistry: Website and Internet Security Issues Ernest Staats Technology Director MS Information Assurance, CISSP, MCSE, CNA, CWNA, CCNA, Security+, I-Net+, Network+, Server+, A+ Resources

Outline iMinistry Why? Safety Considerations COPPA –Does it apply? (so what) –COPPA Requirements –Report all Data Collected (opinion) Privacy Policies Reality of Web 2.0 Information Mining with Google Keeping Data Secure -- Web 2.0 AV not stopping everything… Test with Redseal, Security Space, Spi Dynamics WebInspect, and others WebInspect Online Design Tips Information

iMinistry: Why? The Consumer Electronics Association of America says that the average American home now has 26 different electronic devices for communication and media. The Consumer Electronics Association of America also tracks sales and consumer references for 53 separate gadgets. 1 30% of online Americans jack into the Internet wirelessly 45% of Internet users go online from someplace other than work or home 73% of American adults use the Internet 94% of American teens use the Internet 42% of American homes have high-speed broadband connections

Safety Considerations Be careful what your online name means or could mean Choose your words and photos wisely Never use full names of anyone under the age of 18 Have a media release for everyone who is going to be in your photos/videos Everything put online stays online forever… Never give out or store personal information on your website

COPPA Does it Apply? Children's Online Privacy Protection Act The rule applies to the following: –Operators of commercial websites or online services directed to children under 13 that collect personal information from children –Operators of general audience sites that knowingly collect personal information from children under 13 –Operators of general audience sites that have a separate children's area and that collect personal information from children

COPPA Requirements A site must obtain parental consent before collecting, using, or disclosing personal information about a child A site must post a privacy policy on the homepage of the website and provide a link to the privacy policy everywhere personal information is collected A site must allow parents to revoke their consent and delete information collected from their children A site must maintain the confidentiality, security, and integrity of the personal information collected from children

Privacy Policy Must Include Types of personal information they collect from kidsname, home address, address, or hobbies How the site will use the informationfor example, to market to the child who supplied the information, to notify contest winners, or to make the information available through a childs participation in a chat room Whether personal information is forwarded to advertisers or other third parties A contact person at the website Including Phone number, Snail Mail, and

Report all Forms of Data Collected Network Traffic Logs –In addition to the personal information described above, our system collects server log data (also called clickstream data) that may include an IP address, the type of browser and operating system used, the time of day visited, the pages viewed and the information requested through searches. We aggregate this data and use it for statistical purposes, helping us to understand, for example, the amount of interest in portions of our Web site and ways to improve the navigation and content of our Web site.clickstream

IMAGE RELEASE FORM Sample For value received, I hereby consent and authorize the [INSERT ORGANIZATION NAME] (____), or its assigns, to use my name and/or the names of my family members who are minors, as listed below, as well as my likeness, photos, videos and other information (or that of family members who are minors) for the purpose of news releases, advertising, publicity, publication or distribution in any manner whatsoever. I further consent to such use in their present form and to any changes, alterations, or additions thereto. I hereby release [INSERT NAME OF ORGANIZATION] from all liability in connection with all such uses. Dated this day of, 20.

General Guidelines Make sure you have a written privacy policy Make sure you have a media release form as a part of your privacy policy Collect as little information as possible and make sure it is stored safely Be careful of what you post online and of what you say to youth online You are responsible for everything you POST or collect online

Young people are being targeted and information collected about them is used to locate them. We must be careful what information we post about young people online MySpace the worry Easily tracked the reality The Reality of Web2.0 World

Why We Care: Some Statistics …A child goes missing every 40 seconds in the U.S, over 2,100 per day (OJJDP) In ,196 children were reported lost, runaway, or kidnapped (ncmec) 2/3 of all missing children reports were for youths aged (ncmec) 2/5 missing children ages are abducted due to Internet activity (ICAC) Do the math--over 2 million teens age are abducted due to Internet activity

Information Mining with Google Google search string –site:myspace.com birthday –site:myspace.com "phone number –Place name in quotation marks (use variations) First (Jon) Last -- Legal First (Jonathan) Last Information that the Google Hacking Database identifies: –Advisories and server vulnerabilities –Error messages that contain too much information –Files containing passwords –Sensitive directories –Pages containing logon portals –Pages containing network or vulnerability data such as firewall logs.

Keeping Data Secure in Web 2.0 world Continued Education of Computer Users –Dont click on strange links (avoid tempt-to- click attacks) –Do not release personal information online –Use caution with IM and SMS (short message service) –Avoid social networking sites –Dont sensitive information –Dont hit reply to a received - containing sensitive information –Require mandatory VPN (virtual private network) use over wireless networks

Keeping Data Secure in Web 2.0 World Host-Based Technology –Require hard drive encryption on all laptops –Control the use of portable storage media by managing desktops –Require the use of personal/desktop firewall software –Require the use of personal/desktop anti-malware software –Consider implementing document management systems

Keeping Data Secure in Web 2.0 World Network-Based Technology –Deploy network intrusion prevention (IPS) –Consider network admission control (NAC) –Implement information leakage detection and prevention –Consider IP reputation-based pre-filtering solutions –Run vulnerability scans on your network

AV test Results on

Results 2 on

Program# DetectedDetection % WebWasher605, % AVK , % AntiVir603, % F-Secure594, % Symantec593, % Kaspersky592, % Fortinet589, % Avast!584, % AVG583, % Rising582, % PC Mag posted the results from May 22, 2007AV-Test. In it, 29 antimalware products were tested against 606,901 sets of malware. Products were tuned to their most aggressive detection options Results 3

Online Design Strategies 1.Define and articulate your PURPOSE 2.Build flexible, extensible gathering PLACES 3.Create meaningful and evolving member PROFILES 4.Design for a range of ROLES 5.Develop a strong LEADERSHIP program 6. Promote cyclic EVENTS 7.Integrate the RITUALS of community life 8.Facilitate member-run SUBGROUPS 9.Build site for quick SCANNING 10. Write text in short chunks CHUNKING

How People Scan Online

iMinistry: Example Let every worker in the Master's vineyard, study, plan, devise methods, to reach the people where they are. --Ev 122, 123. GCA Church