This is a presentation on esafety issues I give to parents at the school I work at. It covers common issues teenagers face as well as solutions and support for parents.
3. ONLINE VERSION OF PRESENTATION
IN SCHOOL
This is an online version of a presentation I give in
school
The slide numbers therefore begin slightly higher in
order to synchronise with the presentation I give.
4. OUR DIGITAL WORLD
What is our digital
world?
Issues teenagers face
How do we respond to
those issues?
Further support
available
24. GOVERNMENT - CEOP
Centre for Exploitation and Online Protection
- Government cross agency department of SOCA
- Significant resources to combat online child abuse
- Many resources for schools and parents through
thinkuknow
LINKS ON PAGE
25. GOVERNMENT - DCMS
Maria Miller’s Internet summit
- 1 million pounds was pledged by big Internet
companies
- To give more power and resources to the IWF charity
LINKS ON PAGE
26. CHARITY – INTERNET WATCH
FOUNDATION
Internet Watch Foundation
- Charity in Cambridge
- Remit is to ‘minimise the availabilty of potentially
criminal content’
- Essentially supplies information on website URLs to
be used by CleanFeed
LINKS ON PAGE
27. CORPORATE - CLEANFEED
Cleanfeed
- Content filtering system used by ISPs such as BT to
prevent access to certain sites outside the UK
- Inside the UK sites are shut down
- Government mandated
- List content provided by IWF
LINKS ON PAGE
28. SCHOOL - SMOOTHWALL
Smoothwall
- A range of powerful and customisable tools to filter
Internet access at school
- Removes access to inappropriate content and control
access to sites which could be a distraction
LINKS ON PAGE
29. SCHOOL - ESAFETY
We also encourage pupils to report any issues to their
form tutors and also Mrs Neil
- Documented and dealt with quickly
- ICT and Computing lessons during the year look at
esafety issues
- Recently looked at Two-Factor Authentication with year 9s
31. SECURING YOUR COMPUTER AND
ONLINE LIFE
1. Passwords
2. Security Software
3. Home internet filtering
32. PASSWORDS
Having to remember Ty!89?ghjK for even one site is
hard enough
Use a few complex passwords
- Which are memorable but contain sufficient variation
- !WldWlk500Miles
Chain a few words together
-antelope50beach85south?
Wiki article on password strength
33. SECURITY SOFTWARE
Have decent well-reviewed security software installed
- Norton, McAfee and Kaspersky for PC or Sophos for
Mac
AVG free?
- Would you use a free car?
Pay the annual fee
Security software reviews
LINKS ON PAGE
34. HOME-BASED INTERNET FILTERING
USING OPENDNS
OpenDNS provides family home filtering using DNS
servers
DNS servers are the ‘address books’ of the Internet
At a basic level filter adult sites, proxy servers, phising
sites and some malware
LINKS ON PAGE
35. TWO-FACTOR AUTHENTICATION
One-factor authentication is the use of a password
(something you know)
2FA is the use of something you know and something
you have (a phone)
When logging in to certain services you are sent a one-
time only unique code to login
LINKS ON PAGE
36. TWO-FACTOR AUTHENTICATION
Benefit is added security
However don’t lose your phone!
Popular services using 2FA include:
- Google, Facebook, Twitter, Apple, Dropbox, Paypal
and a few more
37.
38. HOW TO USE 2FA EFFECTIVELY
Set it up on at least one major service such as Google
Mail
Use your Gmail account to setup other accounts such
as Facebook, Amazon etc
39. LOGIN NOTIFICATIONS
Sites like Facebook use these
They show you if someone attempts to login to your
account from another location
LINKS ON PAGE
40. 3RD-PARTY APPS AND SOCIAL
NETWORKS
In our connected world services like Facebook, Twitter
etc allow access to 3rd party apps which can use some
of their features
For example my Facebook account allows my tumblr
blog to create a link on Facebook everytime I post to
tumblr.
Certain apps can compromise your account if they post
messages to your followers or worse
41. MANAGING 3RD-PARTY APPS
Check your app settings on each of your social
networks
For example in Facebook use account settings to
manage which apps you have allowed
Remove ones you are unsure about
42. METADATA
Metadata is data about data
Eg if I take a photo (data) the data about it would
include
Timestamp
Camera type
Photo settings and depending on the type of device
Co-ordinates derived from GPS
LINKS ON PAGE
43. GEOTAGGING
Geotagging is the process of attaching a GPS location
to a piece of digital content
- Photo
- Tweet
- Foursquare checkin
It has benefits but also negatives – daughter posting a
picture of herself at home online with photo geotagged?
44. DEALING WITH GEOTAGGING
Check the settings on your child’s smartphone
- An iPhone for example can turn location settings off
Apps such as Twitter also have flags for turning on/off
geotagging
LINKS ON PAGE
45. SHORT LINKS ON TWITTER
Due to the length of twitter posts longer email
addresses are often shortened such as
http://community.computingatschool.org.uk/
Is shortened to …
http://bit.ly/Omnauf
Use http://longurl.org to extend the address if you are
unsure as to where it might lead you
LINKS ON PAGE
46. MANAGING SMARTPHONES AND
TABLETS
For very young children use ‘Guided Access’ for iPads
Use gift vouchers to manage the purchase of apps
Use the restrictions panel on an iPhone or iPad to
manage things like in-app purchases
Manage the iTunes password yourself – this will control
the apps downloaded
LINKS ON PAGE
47. LOSING AN EXPENSIVE DEVICE
For Apple devices use iCloud and Find my iPhone to
locate missing devices, ping them or lock them down
Similar services can be purchased for Android devices
LINKS ON PAGE
48. MESSAGING ON SMARTDEVICES
Parents can’t do surveillance like the NSA can!
Skype is reasonably popular
More popular are over-the-top messaging apps such as
Whats-app or iMessage – text message services
Recently popular is Snapchat
49. DEALING WITH INAPPROPRIATE
COMMUNICATIONS
Gather evidence!
If you are aware of the apps your children are using
familiarise yourself with how to collect evidence
Take that evidence to organisations like CEOP
50. SUMMARY OF SUGGESTIONS
Secure Passwords and multiple levels of logins
Use one security suite but a range of extra tools
Discuss with your children and show them you are
knowledgeable as well
Know what agencies can help if something does
happen
51. IN CONCLUSION
Esafety will always be evolving
Keep on top of developments yourself
Increase your trust in your children as they get older
54. Reading requires time and
attention. Reading is a cognitive,
mental, emotional action, and
today it is under pressure from all
this speed of the Internet and the
whole digital world. The biggest
principle of this world is speed,
everything has to do with speed,
that is how it is measured and
that is how it is lived. When you
read a book or a poem or listen to
music, there is a matter of
moderation, of time. This
technology is an assault on time.
Leon Wieseltier
June 2013
55. Image credits
• Minecraft image – screenshot from in-
game
• Image: 'Oklahoma tornado
reliefhttp://www.flickr.com/photos/3951350
8@N06/8867770414