0% found this document useful (0 votes)
92 views4 pages

Cyber Safety Tips for Kids and Parents

The document discusses internet safety and privacy concerns regarding social media and professional networking sites. It provides tips on adjusting privacy settings and lists several resources for internet safety education.

Uploaded by

api-149261428
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views4 pages

Cyber Safety Tips for Kids and Parents

The document discusses internet safety and privacy concerns regarding social media and professional networking sites. It provides tips on adjusting privacy settings and lists several resources for internet safety education.

Uploaded by

api-149261428
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Karen Bybee, Jennifer Corbett, & Adam Vinson AIL 690 Internet Safety SEPARATE PERSONAL AND PROFESSIONAL

L CONNECTIONS Social networking sites If you are going to use Facebook, learn the privacy settings o [Link]

Choose Your Privacy Settings Connecting on Facebook o Who do you want to be able to find you? o How much information do you want people to see? Sharing on Facebook o Who do you want to be able to read your information? Read your friends information? Lock everything down to friends only. o You may want to turn off friends of friends views. o Places I check in to I customized to only me since Im not sure what this is for. o Customized settings Things I Share Things Others Share Photos and videos Im tagged in customize change to ONLY ME if you dont want your friends to see it My cousin thought it was funny to tag me OR you can custom select friends you want to see it. in this face framing. I dont celebrate Friends can check me into places - DISABLE Halloween, and was Contact Information horrified that my friends could see this! Applications and Websites o Apps for hugs, hearts, retro gifts, flair, and even surveys are outside the Facebook platform and take you outside the Facebook wall. Any of your information can then be accessed by that application and made available publicly on the Internet, regardless of your privacy settings. o Uncheck everything under Info accessible to friends o Game and application activity, set to friends only o Instant personalization DISABLE o Public search do you want your Facebook profile visible from any search engine? Block Lists o You can block specific people from finding you by Facebook name or email address Controlling How You Share o This is a tutorial on sharing information on what your options are for privacy concerns.

Page

Other issues: If you register multiple email address on your profile, Facebook can ghost another account with those other email addresses, access your friends, and send friend requests to everyone to link to the duplicated site. New features are added regularly and automatically checked everyone, so check the default settings on your privacy settings regularly to make sure everything is locked down to friends only. You cannot control being tagged in a photo. Anyone can tag you in a photo, whether its a picture of you or not, and anyone you are connected to can see it. (If there is a way to control this, I havent found it.) Change your password every 60 to 90 days to help prevent the possibility of your account being hacked. Professional Networks LinkedIn Account settings Profile settings Email notifications Home page settings RSS settings Groups Personal information Privacy settings o Connections browse do you want others to see your connections? o Profile views you can see who has looked at your profile, and others can see when you look at their profile. You can turn this off and be completely invisible to profiles you view. My network

Why do you want to be so cautious over social and professional networking sites? [Link] Go to this site and type in your name. See what comes up. This site can show what youre a fan of on Facebook. Pulls information from Linked In, Facebook, etc. Go to Google and in the search line, type in your name in quotation marks and see what you get. Then, at the end of the quotations marks, and + and your state, or +2010 and see what you get. You can type in an email address in Google and track a persons Internet activity. Go to Google Images and type in your name. See what comes up. A picture of my sister on Facebook and/or LinkedIn, which she had locked down to friends only, shows up on Google Images. Same goes for Yahoo. If you have your personal information stored on your Yahoo account, the Yahoo database can be search by your name.

Page

Cyber Sources Social lessons and internet use resources for kids, parents, teachers, and other professionals. [Link] Their tag line is Wisdom begins with you. This is an excellent site that uses interactive computer game-style simulations (based on real-life criminal cases) to tackle current issues like cell phone dangers, online romances, cyber stalking, online predators, and more. It is for children of all ages, parents, teachers, and professionals. Parts of it are free, others you have to purchase. [Link] - FBI SOS Safe online surfing Internet challenge. Its free and geared for 3rd 8th grade. Their mission is to promote cyber citizenship. [Link] - Yahooligans, Google, & Facebook all have information about controlling how you share information. [Link] and [Link] Heres a great game where kids make decisions about interacting safely. [Link] is an excellent free site for kids, parents, professionals, and teachers. It is sponsored by the National Center for Missing and Exploited Children. Its hands down the best site out there with more than enough resources for everyone. Includes videos, games, lesson plans, etc. [Link] part of [Link]. [Link] This is a large portal that consists of links to other specific sites. It has valuable information, but needs an update in graphics, flash, and interaction. Software resources for protecting your computer. McAfee [Link] Microsoft Defender [Link] Bit Defender [Link] Kaspersky [Link] Webroot [Link] Norton [Link] [Link] [Link]

Page

THE THREE CS OF INTERNET SAFETY: CYBERSECURITY, CYBERSAFETY, AND CYBERSOURCES Malware Malware is a general term used to describe Adware, Spyware, Viruses, Trojans, etc. An excellent malware removal program is Malwarebytes. This will often remove spyware and malware that other programs wont touch. Viruses, Worms, and Trojans A virus is an unwanted software program that may damage your computer. Worms reside in the active memory of the computer and duplicate themselves; they may send copies to others through email. A Trojan is a malicious program that pretends to be an application, but does unexpected things to the computer; it is different from a virus because it is non-replicating. Adware Adware is software that is downloaded without the users permission when they visit certain websites. Spyware Spyware is software that can collect your keystrokes, including your login ID, password, credit card numbers and bank account numbers if you enter those online. Spyware sometimes sends your personal information to someone else who may use it to steal your identity as well as your money or assets. Spyware might also search your computer for private information and send it to someone else. E-mail Issues Spam is junk/unwanted e-mail, usually sent in bulk. Phishing is an e-mail or a website that steals the name of a reputable company such as a bank or well-known online service to fool you into giving the thief your personal information. Symptoms of Infections Computer stops responding or locks up often Computer runs more slowly than normal Computer crashes and restarts every few minutes Applications do not work correctly Disks or disk drives are inaccessible How to Protect Your Computer Keep antivirus software updated. Keep your operating system updated. Be cautious about opening attachments. Do not respond to phishing e-mails. Be cautious about what you download from the Internet. Use a standard user account rather than an administrator account when surfing the Internet.

Page

Common questions

Powered by AI

User education is crucial in mitigating risks associated with online predators and cyberstalking by empowering children and teenagers with knowledge about the dangers and how to avoid them. Resources like Webwise Kids and FBI-SOS educate users through interactive simulations and lessons on recognizing risky situations, maintaining privacy online, and encouraging safe communication practices . These resources foster critical thinking and awareness, reducing vulnerability to online threats.

To protect personal information on Facebook, users should configure key privacy features such as setting 'Friends Only' on shared content, disabling 'Friends of Friends' views, and customizing settings for 'Things I Share' and 'Things Others Share' . These configurations are vital because they control who can access personal information and prevent unauthorized viewing or sharing by third parties, thereby enhancing personal safety online by minimizing exposure to potential data breaches or identity theft .

Educational games and resources, such as those offered by NetSmartz and PBSKids, engage users through interactive, age-appropriate content that teaches internet safety principles, decision-making processes, and critical thinking skills necessary for navigating online environments securely . By tailoring content to different age groups, these tools effectively deliver lessons about online privacy, safe communication, and threat identification in an engaging format that resonates with both children and adults .

Social diligence tools, like SocialDiligence.com, aggregate information from platforms such as LinkedIn and Facebook, and provide insights into an individual's online presence, including what they are 'fans' of and the visibility of their images . Regular monitoring is necessary to quickly identify and mitigate unwanted disclosures, manage one's digital footprint, and ensure that personal and professional information aligns with one's desired online reputation .

To protect against phishing, users should avoid clicking on links in unexpected emails, verify website URLs before submission of credentials, and refrain from providing personal information without confirmation of the request's legitimacy . Awareness is critical; understanding evolving phishing tactics enables individuals to recognize suspicious activity and respond accordingly, thereby preventing potential identity theft and data breaches .

Managing email addresses is crucial because Facebook can generate a 'ghost' account using multiple registered email addresses, posing a security risk. Users should regularly check for any unknown accounts linked to their email and ensure that associated email addresses are secure by using strong, unique passwords and enabling two-factor authentication to prevent unauthorized access or impersonation .

Viruses are unwanted software programs that may cause damage by attaching themselves to files, whereas worms operate in the computer's active memory, self-replicating and spreading through networks. Trojans disguise themselves as legitimate programs but perform harmful actions without replicating. Given these differences, comprehensive protection strategies must include not only antivirus measures but also network monitoring to detect and block worms, alongside application scrutiny to prevent Trojan execution .

Disabling 'Instant Personalization' prevents third-party websites from accessing and using personal data shared on Facebook, while disabling 'Friends can check me into places' restricts location sharing, enhancing user control over their private information . These actions reduce the risk of unintended data exposure to strangers and potential tracking or profiling by advertisers and other entities, thus reinforcing user privacy .

LinkedIn privacy settings differ from Facebook in their professional context, focusing on control over visibility of connections and profile views . Users should consider what network-related information they wish to share, weigh the benefits of visibility for job opportunities against privacy concerns, and customize settings to limit exposure, such as setting connection visibility and managing who views their profiles, to maintain professional boundaries while expanding their network .

Software solutions like Malwarebytes are particularly effective for spyware and resilient malware removal, while traditional antivirus programs like Norton or Bitdefender provide broad protection against viruses and worms . A combination of real-time antivirus software, regular malware scans using specialized tools, and firewall protection offers the best comprehensive security by addressing distinct threats holistically and updating in response to new cybersecurity challenges .

You might also like