SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Setting the Context
• Make parents aware of cyber risks and their
affect on teenage children
• Outline commonly used practices for child
safety online
• Parents need to selectively adopt these
practices based on their child's personality
and environment
What is on
your mind
when your
child uses the
Internet?
The“4C’s” of Child Risk
Exposure to pornographic or violent
content while surfing , watching video’s
or playing games
Online threats, bullying, people saying
bad things and misuse of personal
information on social sites
Possibility of inappropriate contact when
meeting a stranger befriended online
Malware used to steal credentials, personal
information or to hack computers
Inappropriate Content
Cyber Bullying
Bullies use social networks, blogs , website,
warning buttons, pictures, email and Polling
sites to insult or hurt the victim.
Disclosure of Personal information
 PROFILE PAGES
 PICTURES
 POSTS AND CHATS
 USING WEBCAMS
 USING SMS, IM’S AND MMS
 VIDEO CHATS
 INFORMATION MAY BE VOLUNTARILY
POSTED OR SOUGHT OUT IN
CONVERSATION
Make you a victim of cybercrime
• Children download malicious
applications used by cyber hackers to
steal credentials and personal
information from your computer.
• Links to malicious applications may be
circulated by friends who are
themselves victims
Pedophiles, Perverts, Strangers
Online
1. Pedophiles are anonymous and may pose
and other children's (sex, age, location)
2. Teenagers who talk about sex to strangers
online are more likely to come in contact
with predators
3. Groom children with excessively friendly
behavior and with similar tastes
4. They diminish any inhibition a child may
have by gradually introducing sexual
content into the conversations
5. Vulnerable children who participate in
these conversations are exploited.
6. They make them share inappropriate snaps
or videos,try to Blackmail them and try to
make physical contact
When does cyber risks turn into
Cyber Harm?
Adapted Children felt a little
upset and quickly put it behind
them
Vulnerable Children had strong
negative feeling that lasted longer
High Risk
Cyber
Harm
Moderate
Risk
High Risk
How do Children Cope
Does my child have the skills to
cope?
STOP
BLOCK
TELL
6 Best Practices for Parents
Raise Situational Awareness
Topics For Discussion
1. Your child’s online experience, hobbies and
interests
2. Net etiquette and cyber bullying
3. The importance of letting parents know if
the child has come across foul language or
improper suggestions online
4. What sites are off limits and why
5. How to use, create and protect passwords
6. What information that should not be
posted online such as travel plans, assets
owned, who the family knows, family
pictures, parental squabbles, and so on.
Learn to Report?
Courtesy Facebook
Use Technical Controls
1. Use a PC without a webcam.
2. Ensure that a child cannot delete logs
and history.
3. Use filters for email, internet, privacy
setting on the browser, and child
protection software.
4. Keep the PC in an open area where
the child’s activity can be observed.
5. Use an antivirus and personal
firewall.
6. Ensure regular updates of security
software.
Safe use of Social Networks
1. Ensure that that the child’s online profile
information does not convey personal
details about the child. To the extent
possible keep gender neutral profiles, and
ensure the privacy settings on the social
networks are appropriately set.
2. Monitor your child’s use of social networks.
Parents can also create a profile and
become a friend on the child page to
observe unwanted activity.
3. Verify the friends of your children to
ensure that there are no unknown or
anonymous friends. Try and meet with
their friends in person at parties or other
functions.
4. Parents should understand how children
communicate on the Internet, the language
and acronyms.
Monitor
1. Monitor surfing activity for early signs of
inappropriate use.
2. Review browsing history, chat logs.
3. Search for pornographic and other
material on the computer.
4. Monitor phone bills as these provide clues
when an online relationship has progressed
into the real world, as it may if be a
pedophile has been trying to trap your
child.
Set Rules for Offline Meetings
Meeting in a covert manner is ill advised
Educate your child on “Stranger Danger”
Face to Face meetings have led to sexual
crimes, theft and kidnappings
Your child may not remain a child again if
sexually abused
4 Questions Parents Must Answer
Stay in Touch
Blog: Luciusonsecurity.blogspot.com
Twitter: luciuslobo
Download and Read my free ebook
“StaySafe CyberCitizen”. Available on my blog.

Weitere ähnliche Inhalte

Was ist angesagt?

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience Lisa McKenzie ★
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teensSearchLock
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetykirshee
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'tsAmit Pal Singh
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kidspeterhitch
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teensJill Celeste
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habitssharoncindrich
 

Was ist angesagt? (20)

Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Protecting Your Children's Online Experience
Protecting Your Children's Online Experience  Protecting Your Children's Online Experience
Protecting Your Children's Online Experience
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Internet Do's and Don'ts
Internet Do's and Don'tsInternet Do's and Don'ts
Internet Do's and Don'ts
 
Safe Surfing for your Kids
Safe Surfing for your KidsSafe Surfing for your Kids
Safe Surfing for your Kids
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Social media contract for parents and teens
Social media contract for parents and teensSocial media contract for parents and teens
Social media contract for parents and teens
 
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online HabitsE Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
E Parenting: How to Keep Kids Safe and Teach Your Family Healthy Online Habits
 

Andere mochten auch

I Want These * Bugs Off My * Internet
I Want These * Bugs Off My * InternetI Want These * Bugs Off My * Internet
I Want These * Bugs Off My * InternetDan Kaminsky
 
Accounting for Website Security in Higher Education
Accounting for Website Security in Higher EducationAccounting for Website Security in Higher Education
Accounting for Website Security in Higher EducationTony Perez
 
Digital Bank, May 2014
Digital Bank, May 2014Digital Bank, May 2014
Digital Bank, May 2014Chris Skinner
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquettedhabyahalk
 
Cyber Safety And Etiquette
Cyber Safety And EtiquetteCyber Safety And Etiquette
Cyber Safety And Etiquetteboybeast
 
Gezond Veilig Gezellig Slim met media
Gezond Veilig Gezellig Slim met mediaGezond Veilig Gezellig Slim met media
Gezond Veilig Gezellig Slim met mediaErno Mijland
 
Internet Safety and Digital Citizenship
Internet Safety and Digital CitizenshipInternet Safety and Digital Citizenship
Internet Safety and Digital CitizenshipWesley Fryer
 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revisedlibraryreeder
 
Floodplain presentation 2
Floodplain presentation 2Floodplain presentation 2
Floodplain presentation 2samirpinal
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Tech Etiquette for Teens Powerpoint
Tech Etiquette for Teens PowerpointTech Etiquette for Teens Powerpoint
Tech Etiquette for Teens PowerpointDiane Windingland
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionOfsted
 
How to hack stuff for cash
How to hack stuff for cashHow to hack stuff for cash
How to hack stuff for cashMarco Schuster
 

Andere mochten auch (20)

I Want These * Bugs Off My * Internet
I Want These * Bugs Off My * InternetI Want These * Bugs Off My * Internet
I Want These * Bugs Off My * Internet
 
Accounting for Website Security in Higher Education
Accounting for Website Security in Higher EducationAccounting for Website Security in Higher Education
Accounting for Website Security in Higher Education
 
Black ops 2012
Black ops 2012Black ops 2012
Black ops 2012
 
Digital Bank, May 2014
Digital Bank, May 2014Digital Bank, May 2014
Digital Bank, May 2014
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
Cyber Safety And Etiquette
Cyber Safety And EtiquetteCyber Safety And Etiquette
Cyber Safety And Etiquette
 
Gezond Veilig Gezellig Slim met media
Gezond Veilig Gezellig Slim met mediaGezond Veilig Gezellig Slim met media
Gezond Veilig Gezellig Slim met media
 
Internet Safety and Digital Citizenship
Internet Safety and Digital CitizenshipInternet Safety and Digital Citizenship
Internet Safety and Digital Citizenship
 
ILTA 2014: LexisNexis Software Company Update
ILTA 2014:  LexisNexis Software Company UpdateILTA 2014:  LexisNexis Software Company Update
ILTA 2014: LexisNexis Software Company Update
 
BYOD Security Scanning
BYOD Security ScanningBYOD Security Scanning
BYOD Security Scanning
 
Impact cyber safety revised
Impact cyber safety revisedImpact cyber safety revised
Impact cyber safety revised
 
Floodplain presentation 2
Floodplain presentation 2Floodplain presentation 2
Floodplain presentation 2
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Tech Etiquette for Teens Powerpoint
Tech Etiquette for Teens PowerpointTech Etiquette for Teens Powerpoint
Tech Etiquette for Teens Powerpoint
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
How to hack stuff for cash
How to hack stuff for cashHow to hack stuff for cash
How to hack stuff for cash
 

Ähnlich wie Keeping your child safe online

Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentationfkompar
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014- Mark - Fullbright
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxRahuljain40418
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Internet safety
Internet safetyInternet safety
Internet safetydsansford
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child SafeShaun Bent
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child SafeShaun Bent
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxajav252888
 

Ähnlich wie Keeping your child safe online (20)

Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014Net Cetera: Chatting with Kids About Being Online 2014
Net Cetera: Chatting with Kids About Being Online 2014
 
Parents must know about cyber bullying 2
Parents must know about cyber bullying  2Parents must know about cyber bullying  2
Parents must know about cyber bullying 2
 
Children-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptxChildren-safety-online-Presentation.pptx
Children-safety-online-Presentation.pptx
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Social networking leaflet
Social networking leafletSocial networking leaflet
Social networking leaflet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
 
Top ten-tips
Top ten-tipsTop ten-tips
Top ten-tips
 
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptxSafeguarding_Guidance to Keep Children Safe Online Eng.pptx
Safeguarding_Guidance to Keep Children Safe Online Eng.pptx
 

Kürzlich hochgeladen

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Kürzlich hochgeladen (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Keeping your child safe online

  • 1.
  • 2. Setting the Context • Make parents aware of cyber risks and their affect on teenage children • Outline commonly used practices for child safety online • Parents need to selectively adopt these practices based on their child's personality and environment
  • 3. What is on your mind when your child uses the Internet?
  • 4.
  • 5.
  • 6.
  • 7. The“4C’s” of Child Risk Exposure to pornographic or violent content while surfing , watching video’s or playing games Online threats, bullying, people saying bad things and misuse of personal information on social sites Possibility of inappropriate contact when meeting a stranger befriended online Malware used to steal credentials, personal information or to hack computers
  • 8.
  • 9.
  • 11. Cyber Bullying Bullies use social networks, blogs , website, warning buttons, pictures, email and Polling sites to insult or hurt the victim.
  • 12. Disclosure of Personal information  PROFILE PAGES  PICTURES  POSTS AND CHATS  USING WEBCAMS  USING SMS, IM’S AND MMS  VIDEO CHATS  INFORMATION MAY BE VOLUNTARILY POSTED OR SOUGHT OUT IN CONVERSATION
  • 13. Make you a victim of cybercrime • Children download malicious applications used by cyber hackers to steal credentials and personal information from your computer. • Links to malicious applications may be circulated by friends who are themselves victims
  • 14. Pedophiles, Perverts, Strangers Online 1. Pedophiles are anonymous and may pose and other children's (sex, age, location) 2. Teenagers who talk about sex to strangers online are more likely to come in contact with predators 3. Groom children with excessively friendly behavior and with similar tastes 4. They diminish any inhibition a child may have by gradually introducing sexual content into the conversations 5. Vulnerable children who participate in these conversations are exploited. 6. They make them share inappropriate snaps or videos,try to Blackmail them and try to make physical contact
  • 15. When does cyber risks turn into Cyber Harm? Adapted Children felt a little upset and quickly put it behind them Vulnerable Children had strong negative feeling that lasted longer High Risk Cyber Harm Moderate Risk High Risk
  • 17. Does my child have the skills to cope? STOP BLOCK TELL
  • 18. 6 Best Practices for Parents
  • 19. Raise Situational Awareness Topics For Discussion 1. Your child’s online experience, hobbies and interests 2. Net etiquette and cyber bullying 3. The importance of letting parents know if the child has come across foul language or improper suggestions online 4. What sites are off limits and why 5. How to use, create and protect passwords 6. What information that should not be posted online such as travel plans, assets owned, who the family knows, family pictures, parental squabbles, and so on.
  • 21. Use Technical Controls 1. Use a PC without a webcam. 2. Ensure that a child cannot delete logs and history. 3. Use filters for email, internet, privacy setting on the browser, and child protection software. 4. Keep the PC in an open area where the child’s activity can be observed. 5. Use an antivirus and personal firewall. 6. Ensure regular updates of security software.
  • 22. Safe use of Social Networks 1. Ensure that that the child’s online profile information does not convey personal details about the child. To the extent possible keep gender neutral profiles, and ensure the privacy settings on the social networks are appropriately set. 2. Monitor your child’s use of social networks. Parents can also create a profile and become a friend on the child page to observe unwanted activity. 3. Verify the friends of your children to ensure that there are no unknown or anonymous friends. Try and meet with their friends in person at parties or other functions. 4. Parents should understand how children communicate on the Internet, the language and acronyms.
  • 23. Monitor 1. Monitor surfing activity for early signs of inappropriate use. 2. Review browsing history, chat logs. 3. Search for pornographic and other material on the computer. 4. Monitor phone bills as these provide clues when an online relationship has progressed into the real world, as it may if be a pedophile has been trying to trap your child.
  • 24. Set Rules for Offline Meetings Meeting in a covert manner is ill advised Educate your child on “Stranger Danger” Face to Face meetings have led to sexual crimes, theft and kidnappings Your child may not remain a child again if sexually abused
  • 25. 4 Questions Parents Must Answer
  • 26. Stay in Touch Blog: Luciusonsecurity.blogspot.com Twitter: luciuslobo Download and Read my free ebook “StaySafe CyberCitizen”. Available on my blog.