SlideShare a Scribd company logo
1 of 17
Download to read offline
Common internet threats 
bristolitcompany.com/netgenie 
● Trolls 
● Wargs 
● Goblins 
● Orcs 
● Bad wizards 
● Necromancers 
● Gollumzesses
“But they were trolls. Obviously trolls... 
“... not to mention their language, which was 
not drawing-room fashion at all, at all.” 
J. R. R. Tolkien 
bristolitcompany.com/netgenie
Classifying internet threats usefully 
bristolitcompany.com/netgenie 
● External, direct attacks 
– often technical in nature 
– we don’t initiate them 
– we can block them when they do but not stop them 
happening altogether 
● Behaviours that can hurt us 
– The internet equivalents of going out wearing expensive jewellery or 
accepting lifts from strangers, or simply not bothering to lock the back 
door...
External, direct attacks 
1. “I’m going to shoot you; it’s nothing personal.” 
bristolitcompany.com/netgenie 
● Fraudsters and thieves: 
– Want your personal details and thence your money 
– Want to get other people’s personal details and thence their money 
– Want your personal details to defraud banks and on-line retailers 
– Attacks may not always be directly over the internet 
– Medium level of technical competence - the skill is in the deception 
– It’s a numbers game - 
low success percentage, but HUGE volume of attacks 
– It’s modern, organised, international crime, 
– Data and techniques are valuable, and traded on the “dark” net
External, direct attacks 
2. “You’re nothing, I own you!” 
bristolitcompany.com/netgenie 
● Hijackers: 
– Want to take over your equipment 
– Will to use your home as a base to attack others 
– Are VERY technically competent 
– NO TYPES OF DEVICE ARE SAFE. 
– Mistakenly thought of as just ‘viruses’ 
– Degree of penetration can be staggering (Stuxnet, web cams etc.) 
– Attacks usually automated (initially) 
– If they succeed, other types of attack follow, 
both towards you, and from your devices towards others
External, direct attacks: 
3. ”You fascinate me, but not in a good way.” 
● Stalkers, paedophiles, bullies and trolls: 
– It’s always personal 
– Will gain (or already have) personal details, to attack with 
– Can be obsessive loners, sociopaths or psychopaths... 
... but can also be part of your social group! 
– Are often technically competent, may hunt in packs or be part of a 
cooperative (information or skills sharing) 
– Incidents may straddle the boundaries between cyber- and real space 
– Organised crime will be involved, if it sees “commercial” opportunities 
bristolitcompany.com/netgenie
How bad are the external risks? 
What should I pay attention to? 
Radicalization 
bristolitcompany.com/netgenie 
ignore 
be 
vigilant 
Damage 
Likelihood 
Fraud 
+ theft 
Stalkers 
Paedophiles 
Bullies 
Trolls 
Hijacking 
Caution: all this varies with age, interests, social group, and personal notoriety!
Dangerous Liaisons 
Behaviours that can hurt us 
● Disclosing personal information 
– Where you live, 
– What you do, 
– What you like, 
– Your birthday(!) 
– Your family details and images (“curse you, Facebook!”) 
● Disclosing information to suppliers 
– You are rarely forced to transact on-line 
– Do you have full supplier details & do they check out? 
– Why are you making this transaction on-line? 
– What reputation do they have? Don’t trust eBay or app store feedback! 
bristolitcompany.com/netgenie
Dangerous Liaisons 
Behaviours that can hurt us 
● Making "friends" across the internet 
– Who are they, really? 
– What’s the context in which you know them? 
– Why do you think you can trust them (be brutal!) 
● Being too inquisitive (children and young adults): 
– Temptations: hacking, pornography, radical philosophies 
● Expecting something for nothing 
bristolitcompany.com/netgenie 
● Being repetitive: 
– Passwords and user names, mixing social and commercial identities
Special issues for young families 
● managing children’s time on-line 
● parental supervision versus children’s self-discipline 
● naivete and innocence versus life experience 
● mobile devices and 3G/4G internet 
bristolitcompany.com/netgenie 
● intense peer pressure 
● intense commercial pressures
“It does not do to leave a live dragon out 
of your calculations, if you live near him.” 
“In talking to dragons it is wise not to reveal 
your real name... nor anything about you.” 
bristolitcompany.com/netgenie 
Wisdom from J. R. R. Tolkien:
NetGenie: A tale of two boxes 
bristolitcompany.com/netgenie 
● British-owned company 
● Identity-based security 
● Very fast 
● Very secure 
● Very expensive 
● Similar technology 
● Plastic box 
● £89* 
*via the NetGenie purchase scheme
NetGenie: What’s special about it 
● Very easy to use (lots of alternatives aren’t) 
bristolitcompany.com/netgenie 
● Very secure 
– Comprehensive protection 
– Threat information updated automatically 
– Covers all internet devices in the home 
● Very flexible: manage access 
– by child, 
– by age, 
– by activity 
– by time of day 
● Hated by teenagers!
NetGenie: Why are we selling it? 
● Good home security helps everyone 
● It actually does what it should and what’s needed 
● It boosts our reputation 
● We think it’s the right thing to do 
● Cyberoam presently doesn’t have a retail channel in 
the UK. 
bristolitcompany.com/netgenie
NetGenie: 
Our Purchase Scheme 
● Schools or PTAs (or other organisations) take individual orders 
from familes and group them together. 
● We accept orders from schools in ‘bulk’ (5 units or more). 
● Parents get a discount, 
Schools/PTAs get ‘cashback’ based on quantity sold. 
● Cashback as a fundraiser, or used for more discount to parents. 
● UK helpline, support site and three years’ free security updates. 
● Costs roughly the same as a Penguin in a lunchbox! 
bristolitcompany.com/netgenie
NetGenie: 
What we need now 
bristolitcompany.com/netgenie 
● To talk to the right people! 
– Parent-Teacher Association committee members 
– School staff who own safeguarding responsibility 
– Other organisations who might adopt the scheme: 
● NHW groups 
● Nursery schools, Kindergartens & playgroups 
● Churches, Mosques, etc. 
● Community groups - Scouts & Guide Troops 
● Ideas from you!
A couple of resources 
● https://www.getsafeonline.org/ 
– Masses of very good on-line safety advice 
– Densely-packed, lots of technical detail 
● http://bristolitcompany.com/netgenie 
– NetGenie and Purchase Scheme details, 
and this presentation (in Downloads) 
bristolitcompany.com/netgenie

More Related Content

What's hot

Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationtdsparks3
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyYash Jain
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquetteklknight79
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of NetiquetteLeelet1121
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Katie Sunstrom
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Censorship essay
Censorship essayCensorship essay
Censorship essayOliviaBolt
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 

What's hot (17)

Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Rules of netiquette
Rules of netiquetteRules of netiquette
Rules of netiquette
 
Online privacy
Online privacyOnline privacy
Online privacy
 
CYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESHCYBER SAFETY BY YOGESH
CYBER SAFETY BY YOGESH
 
Rules of Netiquette
Rules of NetiquetteRules of Netiquette
Rules of Netiquette
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.Bloggers and the law: What to know before you publish.
Bloggers and the law: What to know before you publish.
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Censorship essay
Censorship essayCensorship essay
Censorship essay
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Question aire hackcing.bullly,
Question aire hackcing.bullly, Question aire hackcing.bullly,
Question aire hackcing.bullly,
 

Viewers also liked

Marketing Internationally - UKTI - Guerrilla E-Marketing
Marketing Internationally - UKTI - Guerrilla E-MarketingMarketing Internationally - UKTI - Guerrilla E-Marketing
Marketing Internationally - UKTI - Guerrilla E-MarketingAndrew Poulton
 
SEO Briefing/Overview for Business Scene
SEO Briefing/Overview for Business SceneSEO Briefing/Overview for Business Scene
SEO Briefing/Overview for Business SceneAndrew Poulton
 
A short guide to using Linkedin effectivly
A short guide to using Linkedin effectivlyA short guide to using Linkedin effectivly
A short guide to using Linkedin effectivlyAndrew Poulton
 
Linkedin - Online networking to Professionals
Linkedin - Online networking to ProfessionalsLinkedin - Online networking to Professionals
Linkedin - Online networking to ProfessionalsAndrew Poulton
 
Guerrilla E-Marketing for Staple Hill Chamber of Trade
Guerrilla E-Marketing for Staple Hill Chamber of TradeGuerrilla E-Marketing for Staple Hill Chamber of Trade
Guerrilla E-Marketing for Staple Hill Chamber of TradeAndrew Poulton
 
Google Analytics and Google Webmaster Overview for Superfast Business - 24 Ju...
Google Analytics and Google Webmaster Overview for Superfast Business - 24 Ju...Google Analytics and Google Webmaster Overview for Superfast Business - 24 Ju...
Google Analytics and Google Webmaster Overview for Superfast Business - 24 Ju...Andrew Poulton
 
Guerrilla Marketing 2010 V1 0
Guerrilla Marketing 2010 V1 0Guerrilla Marketing 2010 V1 0
Guerrilla Marketing 2010 V1 0Andrew Poulton
 

Viewers also liked (8)

Marketing Internationally - UKTI - Guerrilla E-Marketing
Marketing Internationally - UKTI - Guerrilla E-MarketingMarketing Internationally - UKTI - Guerrilla E-Marketing
Marketing Internationally - UKTI - Guerrilla E-Marketing
 
SEO Briefing/Overview for Business Scene
SEO Briefing/Overview for Business SceneSEO Briefing/Overview for Business Scene
SEO Briefing/Overview for Business Scene
 
Facebook for Business
Facebook for BusinessFacebook for Business
Facebook for Business
 
A short guide to using Linkedin effectivly
A short guide to using Linkedin effectivlyA short guide to using Linkedin effectivly
A short guide to using Linkedin effectivly
 
Linkedin - Online networking to Professionals
Linkedin - Online networking to ProfessionalsLinkedin - Online networking to Professionals
Linkedin - Online networking to Professionals
 
Guerrilla E-Marketing for Staple Hill Chamber of Trade
Guerrilla E-Marketing for Staple Hill Chamber of TradeGuerrilla E-Marketing for Staple Hill Chamber of Trade
Guerrilla E-Marketing for Staple Hill Chamber of Trade
 
Google Analytics and Google Webmaster Overview for Superfast Business - 24 Ju...
Google Analytics and Google Webmaster Overview for Superfast Business - 24 Ju...Google Analytics and Google Webmaster Overview for Superfast Business - 24 Ju...
Google Analytics and Google Webmaster Overview for Superfast Business - 24 Ju...
 
Guerrilla Marketing 2010 V1 0
Guerrilla Marketing 2010 V1 0Guerrilla Marketing 2010 V1 0
Guerrilla Marketing 2010 V1 0
 

Similar to Bitc risks and remedies in the home-download

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 ParentsIwith.org
 
Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013Robert Schuetz
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentationspringvillegi
 
Playing safe
Playing safePlaying safe
Playing safehutchison
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying jun ijan
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingDamon Taylor
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safelytimryan7
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital CitizenshipKermit Agbas
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintMike Fisher
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 

Similar to Bitc risks and remedies in the home-download (20)

Internet 4 Parents
Internet 4 ParentsInternet 4 Parents
Internet 4 Parents
 
Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
Playing safe
Playing safePlaying safe
Playing safe
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Family Internet Safety - Cyber Bullying
Family Internet Safety - Cyber BullyingFamily Internet Safety - Cyber Bullying
Family Internet Safety - Cyber Bullying
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Can You ‘Cyber’ Safely
Can You ‘Cyber’ SafelyCan You ‘Cyber’ Safely
Can You ‘Cyber’ Safely
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internetsecurity
InternetsecurityInternetsecurity
Internetsecurity
 

More from Andrew Poulton

Finding and posting content on social media
Finding and posting content on social mediaFinding and posting content on social media
Finding and posting content on social mediaAndrew Poulton
 
Six simple steps to social media satisfaction
Six simple steps to social media satisfactionSix simple steps to social media satisfaction
Six simple steps to social media satisfactionAndrew Poulton
 
Why your business needs to use Social Media
Why your business needs to use Social MediaWhy your business needs to use Social Media
Why your business needs to use Social MediaAndrew Poulton
 
Video Marketing through YouTube
Video Marketing through YouTubeVideo Marketing through YouTube
Video Marketing through YouTubeAndrew Poulton
 
Social Media overview for Superfast Business - 24 June 2014
Social Media overview for Superfast Business - 24 June 2014Social Media overview for Superfast Business - 24 June 2014
Social Media overview for Superfast Business - 24 June 2014Andrew Poulton
 
What makes a great website?
What makes a great website?What makes a great website?
What makes a great website?Andrew Poulton
 
Search Engine Optimisation
Search Engine OptimisationSearch Engine Optimisation
Search Engine OptimisationAndrew Poulton
 
Cloud Computing, an introduction for beginners
Cloud Computing, an introduction for beginnersCloud Computing, an introduction for beginners
Cloud Computing, an introduction for beginnersAndrew Poulton
 
Effective Website Design
Effective Website DesignEffective Website Design
Effective Website DesignAndrew Poulton
 
Search Engine Optimisation
Search Engine OptimisationSearch Engine Optimisation
Search Engine OptimisationAndrew Poulton
 
Social Media for Architects
Social Media for ArchitectsSocial Media for Architects
Social Media for ArchitectsAndrew Poulton
 
Linkedin, Networking for professionals
Linkedin, Networking for professionalsLinkedin, Networking for professionals
Linkedin, Networking for professionalsAndrew Poulton
 
Wiltshire Business Expo 2013
Wiltshire Business Expo 2013Wiltshire Business Expo 2013
Wiltshire Business Expo 2013Andrew Poulton
 
Effective blogging-2013
Effective blogging-2013Effective blogging-2013
Effective blogging-2013Andrew Poulton
 
The magic of web marketing
The magic of web marketingThe magic of web marketing
The magic of web marketingAndrew Poulton
 
Google Adwords, AKA PPC and Pay per Click
Google Adwords, AKA PPC and Pay per ClickGoogle Adwords, AKA PPC and Pay per Click
Google Adwords, AKA PPC and Pay per ClickAndrew Poulton
 
Ignore social media at your peril
Ignore social media at your perilIgnore social media at your peril
Ignore social media at your perilAndrew Poulton
 

More from Andrew Poulton (20)

Digital leadership
Digital leadershipDigital leadership
Digital leadership
 
SEO Masterclass 2016
SEO Masterclass 2016SEO Masterclass 2016
SEO Masterclass 2016
 
Finding and posting content on social media
Finding and posting content on social mediaFinding and posting content on social media
Finding and posting content on social media
 
Six simple steps to social media satisfaction
Six simple steps to social media satisfactionSix simple steps to social media satisfaction
Six simple steps to social media satisfaction
 
Why your business needs to use Social Media
Why your business needs to use Social MediaWhy your business needs to use Social Media
Why your business needs to use Social Media
 
Video Marketing through YouTube
Video Marketing through YouTubeVideo Marketing through YouTube
Video Marketing through YouTube
 
Social Media overview for Superfast Business - 24 June 2014
Social Media overview for Superfast Business - 24 June 2014Social Media overview for Superfast Business - 24 June 2014
Social Media overview for Superfast Business - 24 June 2014
 
What makes a great website?
What makes a great website?What makes a great website?
What makes a great website?
 
Search Engine Optimisation
Search Engine OptimisationSearch Engine Optimisation
Search Engine Optimisation
 
Evolving Social Media
Evolving Social MediaEvolving Social Media
Evolving Social Media
 
Cloud Computing, an introduction for beginners
Cloud Computing, an introduction for beginnersCloud Computing, an introduction for beginners
Cloud Computing, an introduction for beginners
 
Effective Website Design
Effective Website DesignEffective Website Design
Effective Website Design
 
Search Engine Optimisation
Search Engine OptimisationSearch Engine Optimisation
Search Engine Optimisation
 
Social Media for Architects
Social Media for ArchitectsSocial Media for Architects
Social Media for Architects
 
Linkedin, Networking for professionals
Linkedin, Networking for professionalsLinkedin, Networking for professionals
Linkedin, Networking for professionals
 
Wiltshire Business Expo 2013
Wiltshire Business Expo 2013Wiltshire Business Expo 2013
Wiltshire Business Expo 2013
 
Effective blogging-2013
Effective blogging-2013Effective blogging-2013
Effective blogging-2013
 
The magic of web marketing
The magic of web marketingThe magic of web marketing
The magic of web marketing
 
Google Adwords, AKA PPC and Pay per Click
Google Adwords, AKA PPC and Pay per ClickGoogle Adwords, AKA PPC and Pay per Click
Google Adwords, AKA PPC and Pay per Click
 
Ignore social media at your peril
Ignore social media at your perilIgnore social media at your peril
Ignore social media at your peril
 

Recently uploaded

Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 

Recently uploaded (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 

Bitc risks and remedies in the home-download

  • 1. Common internet threats bristolitcompany.com/netgenie ● Trolls ● Wargs ● Goblins ● Orcs ● Bad wizards ● Necromancers ● Gollumzesses
  • 2. “But they were trolls. Obviously trolls... “... not to mention their language, which was not drawing-room fashion at all, at all.” J. R. R. Tolkien bristolitcompany.com/netgenie
  • 3. Classifying internet threats usefully bristolitcompany.com/netgenie ● External, direct attacks – often technical in nature – we don’t initiate them – we can block them when they do but not stop them happening altogether ● Behaviours that can hurt us – The internet equivalents of going out wearing expensive jewellery or accepting lifts from strangers, or simply not bothering to lock the back door...
  • 4. External, direct attacks 1. “I’m going to shoot you; it’s nothing personal.” bristolitcompany.com/netgenie ● Fraudsters and thieves: – Want your personal details and thence your money – Want to get other people’s personal details and thence their money – Want your personal details to defraud banks and on-line retailers – Attacks may not always be directly over the internet – Medium level of technical competence - the skill is in the deception – It’s a numbers game - low success percentage, but HUGE volume of attacks – It’s modern, organised, international crime, – Data and techniques are valuable, and traded on the “dark” net
  • 5. External, direct attacks 2. “You’re nothing, I own you!” bristolitcompany.com/netgenie ● Hijackers: – Want to take over your equipment – Will to use your home as a base to attack others – Are VERY technically competent – NO TYPES OF DEVICE ARE SAFE. – Mistakenly thought of as just ‘viruses’ – Degree of penetration can be staggering (Stuxnet, web cams etc.) – Attacks usually automated (initially) – If they succeed, other types of attack follow, both towards you, and from your devices towards others
  • 6. External, direct attacks: 3. ”You fascinate me, but not in a good way.” ● Stalkers, paedophiles, bullies and trolls: – It’s always personal – Will gain (or already have) personal details, to attack with – Can be obsessive loners, sociopaths or psychopaths... ... but can also be part of your social group! – Are often technically competent, may hunt in packs or be part of a cooperative (information or skills sharing) – Incidents may straddle the boundaries between cyber- and real space – Organised crime will be involved, if it sees “commercial” opportunities bristolitcompany.com/netgenie
  • 7. How bad are the external risks? What should I pay attention to? Radicalization bristolitcompany.com/netgenie ignore be vigilant Damage Likelihood Fraud + theft Stalkers Paedophiles Bullies Trolls Hijacking Caution: all this varies with age, interests, social group, and personal notoriety!
  • 8. Dangerous Liaisons Behaviours that can hurt us ● Disclosing personal information – Where you live, – What you do, – What you like, – Your birthday(!) – Your family details and images (“curse you, Facebook!”) ● Disclosing information to suppliers – You are rarely forced to transact on-line – Do you have full supplier details & do they check out? – Why are you making this transaction on-line? – What reputation do they have? Don’t trust eBay or app store feedback! bristolitcompany.com/netgenie
  • 9. Dangerous Liaisons Behaviours that can hurt us ● Making "friends" across the internet – Who are they, really? – What’s the context in which you know them? – Why do you think you can trust them (be brutal!) ● Being too inquisitive (children and young adults): – Temptations: hacking, pornography, radical philosophies ● Expecting something for nothing bristolitcompany.com/netgenie ● Being repetitive: – Passwords and user names, mixing social and commercial identities
  • 10. Special issues for young families ● managing children’s time on-line ● parental supervision versus children’s self-discipline ● naivete and innocence versus life experience ● mobile devices and 3G/4G internet bristolitcompany.com/netgenie ● intense peer pressure ● intense commercial pressures
  • 11. “It does not do to leave a live dragon out of your calculations, if you live near him.” “In talking to dragons it is wise not to reveal your real name... nor anything about you.” bristolitcompany.com/netgenie Wisdom from J. R. R. Tolkien:
  • 12. NetGenie: A tale of two boxes bristolitcompany.com/netgenie ● British-owned company ● Identity-based security ● Very fast ● Very secure ● Very expensive ● Similar technology ● Plastic box ● £89* *via the NetGenie purchase scheme
  • 13. NetGenie: What’s special about it ● Very easy to use (lots of alternatives aren’t) bristolitcompany.com/netgenie ● Very secure – Comprehensive protection – Threat information updated automatically – Covers all internet devices in the home ● Very flexible: manage access – by child, – by age, – by activity – by time of day ● Hated by teenagers!
  • 14. NetGenie: Why are we selling it? ● Good home security helps everyone ● It actually does what it should and what’s needed ● It boosts our reputation ● We think it’s the right thing to do ● Cyberoam presently doesn’t have a retail channel in the UK. bristolitcompany.com/netgenie
  • 15. NetGenie: Our Purchase Scheme ● Schools or PTAs (or other organisations) take individual orders from familes and group them together. ● We accept orders from schools in ‘bulk’ (5 units or more). ● Parents get a discount, Schools/PTAs get ‘cashback’ based on quantity sold. ● Cashback as a fundraiser, or used for more discount to parents. ● UK helpline, support site and three years’ free security updates. ● Costs roughly the same as a Penguin in a lunchbox! bristolitcompany.com/netgenie
  • 16. NetGenie: What we need now bristolitcompany.com/netgenie ● To talk to the right people! – Parent-Teacher Association committee members – School staff who own safeguarding responsibility – Other organisations who might adopt the scheme: ● NHW groups ● Nursery schools, Kindergartens & playgroups ● Churches, Mosques, etc. ● Community groups - Scouts & Guide Troops ● Ideas from you!
  • 17. A couple of resources ● https://www.getsafeonline.org/ – Masses of very good on-line safety advice – Densely-packed, lots of technical detail ● http://bristolitcompany.com/netgenie – NetGenie and Purchase Scheme details, and this presentation (in Downloads) bristolitcompany.com/netgenie