Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015.

Similar presentations


Presentation on theme: "Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015."— Presentation transcript:

1 Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015

2 Cyber Security Program Cyberbullying Internet Security NSHA Cyber Seecurity25/2/2015

3 Cyberbullying The repeated use of information technology, including e-mail, instant message, blogs, chat rooms, pagers, cell phones, and gaming systems, to deliberately harass, threaten or intimidate others.” Cyberbullying, unlike physical bullying, does not provide an option for its victims to walk away NSHA Cyber Seecurity35/2/2015 Anonymity

4 Cyberbullying Data Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide (18 cases in 2012) NSHA Cyber Seecurity4 Cyberbullying Research Center 5/2/2015

5 Cyberbullying Tactics The National Crime Prevention Association lists tactics often used by teen cyberbullies. Pretend they are other people online to trick others Spread lies and rumors about victims Trick people into revealing personal information Send or forward mean text messages Post pictures of victims without their consent NSHA Cyber Seecurity5 http://www.ncpc.org/cyberbullying 1 1 5/2/2015

6 Cyberbullying Methods Flaming is a type of online fight. It is an act of sending or posting electronic messages that are deliberately hostile, insulting, mean, angry, vulgar or insulting, to one person or several, either privately or publicly to an online group. Denigration also known as "dissing,” occurs when a person sends or publishes cruel rumors, gossip or untrue statements about a person to intentionally damage the victim's reputation or friendships. Bash boards are online bulletin boards where people post anything they choose. Generally, the postings are mean, hateful and malicious. Impersonation can be particularly harmful and occurs when someone pretends to be or poses as another person. This is usually accomplished by breaking into someone’s account, by stealing a password and perhaps changing it, or by maliciously using that information provided by a friend (one reason to never give a password to anyone but a trusted adult). Once the impersonator has access to the victim's information, considerable damage can occur. By sending out emails supposedly from the victim or by posting material online, the victim’s reputation or friendships can be irreparably harmed. Outing occurs when someone sends or publishes confidential, private, or embarrassing information, online. Private email messages or images meant for private viewing, is then forwarded to others. NSHA Cyber Seecurity65/2/2015

7 Cyberbullying Methods cont. Trickery is when a person purposely tricks another person into divulging secrets, private information or embarrassing information, and publishes that information online. Exclusion is an indirect method of online bullying, intentionally excluding someone from an online group or community. Harassment is when the electronic bully repeatedly sends insulting, hurtful, rude, insulting messages. Images and videos are a rapidly growing concern. Due to the prevalence and accessibility of camera cell phones, photographs and videos of unsuspecting victims, taken in bathrooms, locker rooms or other compromising situations, are being distributed electronically. Some images are emailed to other people, while others are published on video sites such as YouTube. Griefing involves chronically causing grief to other members of an online community, or rather, intentionally disrupting the immersion of another player in their game play. NSHA Cyber Seecurity7 http://criminaljustice.state.ny.us/missing/i_safety/cyberbullying.htm 5/2/2015

8 Bullying NYS Legislation "Harassment" AND "BULLYING" shall mean: the creation of a hostile environment by conduct or by [verbal] threats, intimidation or abuse interfering with a student's educational performance, opportunities or benefits, or mental, emotional or physical well-being; or conduct, verbal threats, intimidation or abuse that] Reasonably causes or would reasonably be expected to cause a student to fear for his or her physical safety Reasonably causes or would reason ably be expected to cause physical injury or emotional harm to a student; or )occurs off school property and creates or would foresee ably create a risk of substantial disruption within the school environment, where it is foreseeable that the conduct, threats, intimidation or abuse might reach school property NSHA Cyber Seecurity85/2/2015

9 Next Steps Create parent committee Adopt Cyber security program Cyber security policy's and procedures Cyberbulling policy Code of conduct Whistle blower policy 5/2/2015NSHA Cyber Seecurity9

10 Teacher information Review the school’s Computer and Internet AUP with students and don’t let students get away with violations. Supervise students as closely as possible when they are online, especially if your school allows instant messaging, blogs and chats. Help children understand the consequences of cyber bullying; harassment and threats can be become the basis for civil litigation and criminal action. This can include parents being sued if their children violate civil statutes relating to invasion of privacy, defamation and so on.. Instruct children on what to do it they encounter cyber bullying. Emphasize that those who are being cyber bullied are not responsible for what is happening, they are victims. Encourage students to stand up for others who are being bullied. Look for signs that students are being bullied. Continually promote positive use of technology. NSHA Cyber Seecurity10 http://criminaljustice.state.ny.us/missing/i_safety/cyberbullying.htm 5/2/2015

11 NSHA Cyber Seecurity115/2/2015

12 NSHA Cyber Seecurity125/2/2015

13 Internet Security Threats 5/2/2015NSHA Cyber Seecurity13 Criminals Child predators Cyberbullies Inappropriate content Fanatical religious groups

14 Types Social networking – Facebook – Twitter – Instagram – Google + Chat rooms Message boards Emails Texts 5/2/2015NSHA Cyber Seecurity14

15 5/2/2015NSHA Cyber Seecurity15 Would you leave your child alone in a playground ???

16 Risks Privacy leakage Age-inappropriate content Online grooming Child predators Identity theft Home theft Physical assault Emotional implications Financial loss 5/2/2015NSHA Cyber Seecurity16

17 5/2/2015NSHA Cyber Seecurity17 Law enforcement officials estimate that more than 50,000 sexual predators are online at any given moment. According to the FBI, Chat rooms offer the advantage of immediate communication around the world and provide the pedophile/predator with an anonymous means of recruiting children into sexually illicit relationships. Only 1/3 of households with Internet access are protecting their children with filtering or blocking software. 70% of children 7 to 18 years old have accidentally encountered online pornography, often through a web search while doing homework. There is a fifty percent chance that if your child is in a chat room designated for under aged children, the stranger he or she is talking to is a sexual predator logged in under a false identity. 86% of girls claimed to be able to conduct online chats without their parents knowing, 57% could read their parents’ e-mail, and 54% could conduct a cyber relationship. Cyber Statistics

18 Next Steps Acceptable usage policy Content filtering Educate parents and students 5/2/2015NSHA Cyber Seecurity18


Download ppt "Cyber Security NSHA Kickoff 2013 NSHA Cyber Seecurity15/2/2015."

Similar presentations


Ads by Google