2. Setting the Context
• Make parents aware of cyber risks and their
affect on teenage children
• Outline commonly used practices for child
safety online
• Parents need to selectively adopt these
practices based on their child's personality
and environment
7. The“4C’s” of Child Risk
Exposure to pornographic or violent
content while surfing , watching video’s
or playing games
Online threats, bullying, people saying
bad things and misuse of personal
information on social sites
Possibility of inappropriate contact when
meeting a stranger befriended online
Malware used to steal credentials, personal
information or to hack computers
11. Cyber Bullying
Bullies use social networks, blogs , website,
warning buttons, pictures, email and Polling
sites to insult or hurt the victim.
12. Disclosure of Personal information
PROFILE PAGES
PICTURES
POSTS AND CHATS
USING WEBCAMS
USING SMS, IM’S AND MMS
VIDEO CHATS
INFORMATION MAY BE VOLUNTARILY
POSTED OR SOUGHT OUT IN
CONVERSATION
13. Make you a victim of cybercrime
• Children download malicious
applications used by cyber hackers to
steal credentials and personal
information from your computer.
• Links to malicious applications may be
circulated by friends who are
themselves victims
14. Pedophiles, Perverts, Strangers
Online
1. Pedophiles are anonymous and may pose
and other children's (sex, age, location)
2. Teenagers who talk about sex to strangers
online are more likely to come in contact
with predators
3. Groom children with excessively friendly
behavior and with similar tastes
4. They diminish any inhibition a child may
have by gradually introducing sexual
content into the conversations
5. Vulnerable children who participate in
these conversations are exploited.
6. They make them share inappropriate snaps
or videos,try to Blackmail them and try to
make physical contact
15. When does cyber risks turn into
Cyber Harm?
Adapted Children felt a little
upset and quickly put it behind
them
Vulnerable Children had strong
negative feeling that lasted longer
High Risk
Cyber
Harm
Moderate
Risk
High Risk
19. Raise Situational Awareness
Topics For Discussion
1. Your child’s online experience, hobbies and
interests
2. Net etiquette and cyber bullying
3. The importance of letting parents know if
the child has come across foul language or
improper suggestions online
4. What sites are off limits and why
5. How to use, create and protect passwords
6. What information that should not be
posted online such as travel plans, assets
owned, who the family knows, family
pictures, parental squabbles, and so on.
21. Use Technical Controls
1. Use a PC without a webcam.
2. Ensure that a child cannot delete logs
and history.
3. Use filters for email, internet, privacy
setting on the browser, and child
protection software.
4. Keep the PC in an open area where
the child’s activity can be observed.
5. Use an antivirus and personal
firewall.
6. Ensure regular updates of security
software.
22. Safe use of Social Networks
1. Ensure that that the child’s online profile
information does not convey personal
details about the child. To the extent
possible keep gender neutral profiles, and
ensure the privacy settings on the social
networks are appropriately set.
2. Monitor your child’s use of social networks.
Parents can also create a profile and
become a friend on the child page to
observe unwanted activity.
3. Verify the friends of your children to
ensure that there are no unknown or
anonymous friends. Try and meet with
their friends in person at parties or other
functions.
4. Parents should understand how children
communicate on the Internet, the language
and acronyms.
23. Monitor
1. Monitor surfing activity for early signs of
inappropriate use.
2. Review browsing history, chat logs.
3. Search for pornographic and other
material on the computer.
4. Monitor phone bills as these provide clues
when an online relationship has progressed
into the real world, as it may if be a
pedophile has been trying to trap your
child.
24. Set Rules for Offline Meetings
Meeting in a covert manner is ill advised
Educate your child on “Stranger Danger”
Face to Face meetings have led to sexual
crimes, theft and kidnappings
Your child may not remain a child again if
sexually abused
26. Stay in Touch
Blog: Luciusonsecurity.blogspot.com
Twitter: luciuslobo
Download and Read my free ebook
“StaySafe CyberCitizen”. Available on my blog.