Smartphone/Internet Safety

Smartphone/Internet Safety

Smartphone/Internet Safety www.safekidsamerica.org Chad Williams Safe Kids America Thompson Middle School Presentation Email [email protected] for presentation notes What They Say… What they say… What they say… Learning Exercise Coffee Shop Scenario Typical unsecured wireless connection. This is what you think that you are logging into… Man In The Middle Attack The Man-In-The-Middle grabs and/or modifies data that is sent/received. http://www.interlinknetworks.com/whitepapers/Link_Layer_Security.htm Coffee-Shop-Data-Collectors • Most public wireless connections are NOT secure • It’s easy to capture your data • Don’t log into websites that reveal your sensitive credentials (email, bank account, etc.) • Use onboard firewall software • Lock your screen before leaving your seat • Don’t store sensitive information on your computer • Use an encrypted VPN (Virtual Private Network) VPN – Virtual Private Network Protect your traffic by encrypting it. • http://myvpnreviews.com/ • http://en.wikipedia.org/wiki/Virtual_private_network • http://www.interlinknetworks.com/whitepapers/Link_Layer_Security.htm Ten Ways Your Smartphone Knows Where You Are 1. GPS (45 seconds) 2. Assisted GPS (Speeds up the GPS locator process by using WiFi connections to transmit GPS data…15 seconds) 3. Synthetic GPS (Forecasts satellite positions…2 seconds) 4. Cell ID (Carriers figure out which cell a customer is using, and how far they are from the neighboring cells) 5. WiFi (see next slide) WiFi #1 RSSI (received signal strength indication), takes the signals your phone detects from nearby access points and refers to a database of Wi-Fi networks. The database says where each uniquely identified access point is located. Using signal strength to determine distance, RSSI determines where you are (down to tens of meters) in relation to those known access points. WiFi #2 The other form of Wi-Fi location, wireless fingerprinting, uses profiles of given places that are based on the pattern of Wi-Fi signals found there. This technique is best for places that you or other cellphone users visit frequently. The fingerprint may be created and stored the first time you go there. 6. Inertial Sensors (Most smartphones now come with three inertial sensors: a compass (or magnetometer) to determine direction, an accelerometer to report how fast your phone is moving in what direction, and a gyroscope to sense turning motions. Together, these sensors can determine your location with other outside inputs) 7. Barometer…Some smartphones already have chips that can detect barometric pressure and are best used in combination with other tools, including GPS, Wi-Fi and short-range systems that register that you've gone past a particular spot. 8. Near Field Communication (shopper loyalty company Shopkick is already using a short-range system to verify that consumers have walked into a store. Instead of using a radio, Shopkick broadcasts ultrasonic tones just inside the doors of a shop. If the customer has the Shopkick app running when they walk through the door, the phone will pick up the tone through its microphone and the app will tell Shopkick that they've entered). 9. Bluetooth Beacons (Very precise location can be achieved in a specific area, such as inside a retail store, using beacons that send out signals via Bluetooth. The beacons, smaller than a cellphone, are placed every few meters and can communicate with any mobile device equipped with Bluetooth. The system can determine location to within 10 centimeters. With location sensing that specific, a store could tell when you were close to a specific product on a shelf and offer a promotion. 10. Terrestrial Transmitters…uses the same principle as GPS but are mounted on buildings and cell towers. Because they are stationary and provide a much stronger signal to receivers than satellites do from space, Locata's radios can pinpoint a user's location almost instantly to as close as 2 inches. Another company in this field, NextNav, is building a network using licensed spectrum that it says can cover 93 percent of the U.S. population. SOCIAL NETWORKING SIMPLIFIED 1.Twitter I need to pee. 2.Facebook I peed! 3.Foursquare I’m peeing here. 4.Quora Why am I peeing? 5.Youtube Watch this pee! 6.LinkedIn I’m good at peeing. New Social Networking Apps Name That App WhatsApp WhatsApp is a mobile text messaging app designed to let cell phone users send text messages without having to pay SMS fees to their carriers. The messages are sent via the Internet and therefor require the user to have a data plan on their phone, which is typical of these messaging apps. Messages can include video, audio and photos, not just text. Name That App SnapChat Snapchat differs from most mobile communication apps in that it specializes in sending messages with a particular feature--they disappear. (However, there are ways around this…see next slide for details). The once thought short-lived nature of Snapchat messages has made the app controversial yet popular with young people. The company is valued at $800m and users send 350m messages per day, up from 200m in June. Name That App Text Plus and TextFree The textPlus app TextFree apps offer free unlimited texting on your iPod touch or phone by setting up your own “phone number” that you can give to your friends and family. Name That App Vine (Twitter for Videos) A mobile app that enables its users to create and post video clips. Video clips created with Vine have a maximum length of 6 seconds and can be shared or embedded on social networking services such as Twitter—which acquired the app in October 2012—and Facebook. Name That App GIFYO.com The most popular GIF sharing application on the internet. Allows for animated GIFs. When you get home, search Google for gifyo girls and go to the images…THAT is why knowing these apps ASAP is critical for parents. Name That App POOF Poof is an app that allows you to hide and unhide icons on your SpringBoard (your iPhone interface). The apps are still there, but cannot be seen unless you know how to access them. Poof requires the phone to be “JailBroken”, so if this may be a red flag app if you find it on your child’s phone. Name That App Tango Tango is a free app that, in addition to video calls, is also optimized for voice calls, texting, photo sharing, and playing games. Name That App Talkatone Another mobile app offering free voice calling and text messaging over WiFi or 3G/4G/LTE data plans. The Talkatone website says the Talkatone app allows people to "call and text any US or Canadian phone over WiFi or Data (3G/4G), without requiring cell minutes." What is Internet Safety? Internet safety or online safety is the security of people and their information when using the Internet. Internet safety means protecting your personal information while online. Details such as your address, full name, telephone number, birth date and/or social security number can potentially be used by on-line criminals. Adapted from: - Wikipedia: http://en.wikipedia.org/wiki/Internet_safety - eHow: http://www.ehow.com/about_6577504_definition-internet-safety.html Personal Protection From… • Internet Predators • Coffee-Shop-Data-Collectors • “Script-Kiddies” (what you might think of as “hackers”) • Viruses / Trojans / Ad-Ware • Those who take advantage of children & teens – Use “Social Engineering” to manipulate victim – Sexual Intentions – Murderous Intentions – Other Malicious Intent • Phishing Attempts (Masquerading as a trustworthy entity while attempting to acquire sensitive information) • Scam Artists – Email scams are meant to take your money – Scams on Craigslist that are using you to commit fraudulent activities What would you share with your neighbors? At what age should my child start using social media? • According to Consumer Reports an estimated 7.5 million pre-teens –including 5 million under the age of 10 are on a social network site like Facebook Up to age 10 • It's never too early to foster open and positive communication with children. It's a good idea to talk with them about computers and to stay open to their questions and curiosity. • Always sit with your kids at this age when they're online. • Set clear rules for Internet use. • Insist that your children not share personal information such as their real name, address, phone number, or passwords with people they meet online. • Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Up to age 10 • Use family safety tools to create appropriate profiles for each family member and to help filter the Internet. • For more information, see Windows Live Family Safety, Windows 7 Parental Controls, or Windows Vista Parental Controls. • Help protect your children from offensive pop-up windows by using the pop-up blocker that's built in to Internet Explorer. • All family members should act as role models for young children who are just starting to use the Internet. Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Ages 11 to 14 • It's a good idea to foster open and positive communication with your children. Talk with them about computers and stay open to their questions and curiosity. (i.e. chat rooms & online predators) • Set clear rules for Internet use. • Insist that your children not share personal information (i.e. real name, address, phone number, or passwords) with people they meet online. • Help your kids create online nicknames that give away no personal information. Source: http://www.microsoft.com/security/family-safety/childsafety-age.aspx Ages 11 to 14 • Use family safety tools to help filter the Internet. • Keep Internet-connected computers in an open area where you can easily supervise your kids' activities.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    92 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us