3. A Note About Good And Evil
Nothing in this world is purely good or purely evil –
to include the Internet and those who use it.
-Daniel Owens
4. With That Said… A Note About Me
Currently
Working as a NASA contractor in IT Security
Formerly
Worked for/with the…
Department of Defense (DoD) to include the NSA
FBI MySpace
Justice Department IBM
Microsoft Xerox
Oracle Booz Allen Hamilton
Cisco SystemSecurities
And many more…
6. Protecting Your Computer
Apply updates and patches
This includes for the Operating System, your web
browser, any plug-ins and add-ons for the web
browser, any games, and any other software
Use Anti-Malware Software
This includes antivirus, antispyware, and anti-
adware software
Examples Include (all free for home use):
AVG and Avast!
Spybot Search & Destroy
Adaware
7. Protecting Your Privacy
Don’t fill out online surveys or enter contests
without permission
Many of these are simply there to get information
about you and some can be harmful
Never give out sensitive information about
yourself, your family, or others
This includes addresses, school names, your full
name, phone numbers, and your
schedule/vacation data in advance
Don’t open or respond to SPAM
And don’t give your email address to just anyone
8. Doubt Everything
If you can’t verify someone’s identity, you
can’t trust them with your information
Anyone can post just about anything on the
Internet… pretending to be just about anyone
Just like any other medium
11. Cyberbullying
Often either a source of or voice for rumors
Common places are MySpace and Facebook
Often successful only AFTER the victim starts
to respond to the bully(ing)
While it may be difficult, ignoring posts and simply
blocking instant messages from people you don’t
know is the best way to stop cyberbullying
Can also include compromising a victim’s
account and using it
Again, MySpace and Facebook are common
vectors, but so are Instant Messengers
12. Cyberpredators
Few cyberpredators give out their real age,
name, and other information
And anyone can find a picture online
Unsolicited instant messages, posts, and
emails from strangers should never be
responded to
40% of females have been solicited on the
Internet at least once before graduating high
school
Males are vulnerable too
Should be treated the same as bullying
13. If All Else Fails
Change your account name and password
Most bullies and predators won’t be able to track
you if you change your information… unless you
give it to them
Don’t go there…
Just don’t visit the site
The Internet isn’t anonymous
Well-trained professionals (and criminals) can
track down almost anyone on the Internet
If you’re a victim, talk to your parents and/or a
trusted adult
15. Be Suspicious Of The Unknown
Warez and Torrents
Many of the software and videos on these sites
are bugged in one way or another
Free Games and Software
Many of the freeware and shareware software
gathers personal information
Often the company owning the software then sells the
data
Unknown Websites
Some sites are designed to install malware onto
visitor computers
17. Online Gaming
Protect your privacy
Give out as little information as possible
And don’t have your screenname be your real name
Find a ‘room’ where you feel both safe and
comfortable and stay there
If things start to go downhill, leave and don’t come
back
Avoid games with monthly fees
These often require you to give credit card
information and other data that an attacker can
steal from the server
19. For More Information
Media Awareness Network (MNet)
http://www.media-
awareness.ca/english/index.cfm
Cyberbullying Research Center
http://www.cyberbullying.us/
NetAlert
http://www.netalert.gov.au/
OnGuard Online
http://www.onguardonline.gov/
20. For More Information (cont.)
Safe Internet Alliance
http://www.safeinternet.org/
GRC IT Security Office
http://itsecurity.grc.nasa.gov
STOP Cyberbullying
http://www.stopcyberbullying.org/
21. Acknowledgements
I stole the background from Microsoft
I stole a lot from my experiences and
previous writings