Teaching Internet Security, Safety in Our Classrooms Feature
Total Page:16
File Type:pdf, Size:1020Kb
By Joanna F. DeFranco Teaching Internet Security, Safety in Our Classrooms FEATURE “HERE IS THE WAKEUP HERE IS A MISCONCEP- The problem is best described with TION: “KIDS KNOW MORE terms coined by Marc Prensky (2001). He CALL: THE FBI HAS T than We Do About the Internet.” referred to people who did not grow up MADE CYBERCRIME Do teens know more than their parents with the Internet as the Internet Immigrants and teachers about how to use the Inter- (over 30 years of age), and the Internet ITS NUMBER THREE net? Teens may be more familiar with Natives are those who grew up with the the latest blog or social networking site; Internet (under 30 years of age). The PRIORITY, FOLLOWING however, with 56 percent of teens posting problem is that the immigrants are raising TERRORISM personal information (McAfee, 2010) the natives and assume the natives know on the Internet and child predators and what they are doing because they have AND COUNTER- criminals looking for this information— so much interest in the latest technology. INTELLIGENCE.” I think not. Unfortunately, the focus is on obtaining Here is the wakeup call: The FBI and using the bells and whistles of the has made cybercrime its number three new technology, rather than the dangers priority (fbi.gov, 2010), following terror- that come along with it. ism and counterintelligence. In addition, Immigrants raising natives is not a new cyber criminals are scraping the social situation. For example, in the early 1900s networking sites, using the automated free when immigrants arrived from other tools available on the Internet, to collect parts of the world, they needed to focus the personal information posted by social more on feeding their families than edu- network users so they can more easily cating their children. They accomplished commit crimes. On the bright side, many this by sending young children to work of the issues can be mitigated with a few instead of school—obviously dangerous, simple steps to increase the difficulty of but probably necessary. Laws were then criminals gaining access to our personal created to make sure all children attended information, and potentially us. school. Our society cannot wait for Internet safety to be a required part of the Educators Need to Take the Lead curriculum or depend solely on parents Internet security is an important topic who may not have the knowledge to teach for educators due to curriculums now Internet safety. incorporating tools such as the Internet, Google docs, e-portfolios and course Why is it Suddenly OK management systems. Those tools require to Talk to Strangers? students to spend more time online, where Technology has allowed us to obtain they are susceptible to manipulation or knowledge in a most efficient way. intimidation if they do not stay on task. However, utilizing that technology is also PH OTO Kids of all ages lack emotional maturity. leaving us vulnerable to exploitation. We BY They also need attention and validation; tell our children not to talk to strangers, STOCK combine that with their extreme lack of yet that is exactly what they are doing on .X C H NG caution, and a broadband connection, the Internet. As mentioned earlier, more . COM and we now have a big problem. than half of teens are posting personal in- 52 Techniques MAY 2011 www.acteonline.org formation such as name, age and address, and are chatting with people they have met in chat rooms and social network- ing sites. The Internet is misleading in that people use it in seclusion, feeling somewhat anonymous and safe when they post their personal accounts and photos. People are posting where they live, not only with text, but with the photos taken from their smartphones. Taking pictures using mobile phones with GPS capability will embed the longitude and latitude of where the photo was taken. Therefore, if you post a photo on a social networking site taken in front of your house using your smartphone, and mention you are going on vacation next week or that you work every day—you have just sent an open invitation to a burglar. Online Predators There are not enough FBI agents to locate and arrest every online predator. PHOTO BY ISTOCK.COM Therefore, it is important for educators to teach young people of all ages about the dangers of the Internet. A great resource for educators to teach kids of all ages “INTERNET SECURITY IS AN IMPORTANT TOPIC about Internet safety is netsmartz.org. This FOR EDUCATORS DUE TO CURRICULUMS Web site contains content (videos, Power- NOW INCORPORATING TOOLS SUCH AS THE Points and activities) for parents, teach- INTERNET, GOOGLE DOCS, E-PORTFOLIOS ers and children of all ages that helps to AND COURSE MANAGEMENT SYSTEMS.” stress important issues such as: never meet someone in person that they have met online, or give out personally identifying The FBI suggests keeping comput- while driving. LG Mobile Phones spon- information. Monitoring a child’s technol- ers in a common room. Think hard sored a study surveying 1,017 teens. The ogy use can be overwhelming. The FBI before buying a device that has Internet study showed that 45 percent of teens suggests a few signals to determine if a capabilities. Set ground rules for use if admit to texting while driving, and 41 per- child is a target of an online predator: purchased. Communicate with kids about cent admit to some form of sexting (sent, the potential dangers on the Internet. Use received, or forwarded a text with sexual • Child spends large amounts real examples that will resonate with kids. content). Eight students from a Pennsylva- of time online. A suggestion specifically for parents is to nia high school recently learned a tough • Child receives phone calls from maintain access and randomly check their lesson about sexting. The teens, who all people you don’t know. children’s activities on any social network knew one another, were accused of using • Child turns monitor off when and e-mail accounts. their mobile phones to take and send nude you come into the room. photographs of one another, resulting in a • Child becomes withdrawn from Teens and Mobile Phones felony pornography charge for each of the the family. The two main problems that are in the teens (Miller and Hirschkorn, 2010). Some • Child receives gifts through the mail limelight right now regarding kids and teens do not realize sexting is against the (bus tickets, mobile phones, Web cams). mobile phones are sexting and texting law. Even if they are familiar with the law, www.acteonline.org MAY 2011 Techniques 53 they may not think they will get caught. enough, since people can hide the phone rects phone calls and texts (using GPS to They need a reminder that once you send while they are texting—or again, do not determine speed). A number of companies something out, you can’t take it back; think they will get caught. Granted, once have already announced various solutions there is also a chance that whatever they an accident occurs, texting can be verified to prevent texting while driving (Purdy, are sending can become viral (each person simply by analyzing the mobile phone. 2010). sending to another and so on). Obviously, at this point it is too late; Another solution is setting expectations No one would argue that texting while the accident has occurred. It would be and rules for cell phone usage; sometimes driving is an extreme problem. There beneficial for parents to install software on the teens engage in this behavior because are laws in some states outlawing texting their children’s mobile phones that either they think mom and dad aren’t checking while driving. However, laws are not prevents texting while driving, or redi- the phone. Talk to teens about the legal ramifications of sexting and texting while driving. Viruses Viruses are not a new problem, but they are certainly a bigger problem than ever before. In the past, hackers needed a high skill level even to create a relatively simple virus. Now, due to the extensive knowl- Best edge base on the Internet, very sophisti- cated viruses can be created with a rela- tively low skill level. Users can mitigate this problem just by being cognizant of the latest scam. One way to avoid a virus is Practices don’t be so quick to click! Pop-up windows and Innovations that prompt users to download antivirus software or claim that they will scan Conference your computer for malware are probably 2011 scams. Clicking on them could install the malware on your computer. Sometimes Save the Date! these FakeAV (Fake Antivirus, Rogue Antivirus, ScareWare) are sent directly to When: the victim as an attachment or as a link in September 28 – 30, 2011 a spam e-mail message (SOPHOS, 2010). Where: The e-mail message will prompt a user to visit a Web site where they will be asked to Arlington Resort Hotel and Spa pay for the elimination of the nonexistent Hot Springs National Park, Arkansas virus. Mark your calendar and prepare to learn Phishing Scams from CTE leaders from around the country Another danger to Internet users is phish- ing scams. Users are lured to provide Registration and program information will be personal information, typically through available at www.acteonline.org/bestpractices11.aspx e-mail and instant messaging. Criminals Don’t miss this great opportunity! use botnets (robot networks), to perpetu- ate phishing scams. Botnets are multiple computers that are infected with a virus that enable a single hacker to remotely control the infected computers to send out 54 Techniques MAY 2011 www.acteonline.org “INTERNET SAFETY SHOULD BE TAUGHT AS PROACTIVELY References AS OUR WOOD AND METAL SHOP TEACHERS TAUGHT Enck, W., Gilbert, P., Chun, B., Cox, L., US SAFETY IN JUNIOR HIGH BEFORE WE USED THE Jung, J., McDaniel, P., Sheth, A.