Skip to main content

Home/ Digiteen/ Group items tagged security

Rss Feed Group items tagged

Riya P

Keep your kids safe on Facebook - 1 views

  • First step, if you don't have a Facebook account, get one and learn about it before you allow your teen to get one. Another suggestion, teach your kids to use common sense. Don't put your social security number, address or phone number online. Finally, don't teach your kids to be dishonest!
  •  
    What parents should do to keep their kids and family safe on Facebook.
Garrett E

Good Online Habits - cybersecurity.idaho.gov - 0 views

  •  
    There is much importance in protecting yourself online. Studies have shown that most of the cyber security breaches resulted from something you did or failed to do.
Merritt D

How to be a better Cyber Citizen and stay safe online - Fort Lauderdale Parenting Teens... - 0 views

  •  
    How do your teens treat their friends - online? Teaching our kids and teens respect starts from a young age, however when it comes to technology, parents need to understand it is just as important to continue the lesson of respect digitally.
  •  
    How to be a cyber citizen and stay safe online are major topics in this day and age. Many people (not just teens) need to learn that respect should be carried into the digital world. Ten ways to be a better cyber citizen: 1.) Understand the technology available to protect you and your family's digital identity 2.)Consider using a personal security device when going online 3.)Use antivirus and antispyware software 4.)Teach family & friends about the importance of strong passwords 5.)Get involved in your child's online life 6.)Report cybercrime 7.) Protect your home or small business Wi-Fi network 8.) If you're a parent, consider parental control systems for Internet access on 3G mobile phones 9.) If your bank does not provide a smart bankcard, know the other safe ways to shop online 10.) Don't share information with web sites you don't trust
Ashley B.

BBB offers parents tips to keep children safe while online | Wichita Eagle - 1 views

  • * Set privacy options.
  • * Explain to your children that they can't take back what they've written.
  • * Know who is looking at your profile
  • ...8 more annotations...
  • * Don't "friend" everyone
  • Don't let your child's profiles on social websites be available to everyone. Explain to your child why it's important to have the highest security and privacy settings. Parents should monitor their children's use of the computer while they're on the Internet.
  • Children and teens should think about who will be looking at their profile. Many people will be able to see their page, including parents, teachers, coaches, the police and the college or the job they might want to apply for in the next few years. They should post only the information they are comfortable with others seeing about them.
  • Merely deleting a post doesn't mean it's not still available for others to see in cyberspace. It is important for children and teens to know that once you press the "send" or "post" button, there is no going back. Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people — for example, your friends or your family.
  • Unfortunately there are dangerous people who may be creeping
  • * Don't divulge too much information.
  • Now that school has started children and teens are spending more time online doing school work, research, and socializing. As soon as a child starts using the computer and Internet, it's time to talk with them about online behavior, safety and security. Parents need to know what to do to ensure their child is safe online, in texting, blogging, Facebook and visiting other Internet sites.
  • Better Business Bureau
  •  
    This website talks about how parents can make sure their children are safe online.
carrie n

Safety Tips for Social Networking | Cyber Security Awareness Month 2011 - 0 views

  •  
    This tells you what websites are the biggest that you need to know about social awareness. "The first step is STOP. THINK. CONNECT."
Brandon P

Google Promotes Online Safety With 'Good to Know' Campaign - Search Engine Watch (#SEW) - 0 views

  • Google Promotes Online Safety With 'Good to Know' Campaign
  • Google is about to launch its first online safety campaign. Teaming with the Citizens Advice Bureau (CAB), Google will promote “safe computer usage” for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device
  • Gillan Guy, the CAB's chief executive, said that “Information is a powerful tool for preventing problems from arising in the first and safety, personal data and identity theft are among the top concerns of people of using internet”.
  • ...1 more annotation...
  • Google & the Citizens Advice Bureau created a few tips to stay safe online: Always make sure to have a strong password. Try to always have a unique password to you that no one else will know. Using a long password will keep it safe. Try to always have a mixture of letters, numbers, and symbols. Some people remember their password with a song or lyrics or a mixture of the two. When you get a suspicious email with personal information on it, go directly to the site: don't click on the link in the email. Unless you're expecting the email, it's probably not from them and is known as a "Phishing attack" that's trying to get your personal info and steal from you. Always look for 'https' in the URL. A website is running through a secure connection when it's through https. This will safeguard your emails, credit card numbers, and all other info from watching eyes. Just as you make sure not to leave your front door open, you need to make sure you're always signing out of your computer. Make sure to always sign out of social media accounts and all other accounts that you may have signed into. Try and only use safe networks that are secure. Internet cafes are nice but not always the safest place for you to be browsing the Internet. With all the apps out there, make sure that you always have the latest app. Make sure you trust all your apps and the sources your apps come from. Always lock and passcode lock your phone. Never store personal details on your phone because anyone could take it and have all your info. Two-step verification is a must if accounts offer it. This will make you or anyone else go through two different steps of verification to access your account – much like Facebook when you login. You have to login and then tell which computer you're logging in from, then it texts you. By doing this it will keep your account safe.
  •  
    On this website, I have highlighted a few sections that I thought were important. In the pink, I highlighted what Google is launching and why. In the yellow, I highlighted a quote someone said. The green highlight shows 7 tips that are very important for not only students, but everyone else to stay safe online.
  •  
    Google gives information on how to be safe online. "Good to Know" campaign.
  •  
    "Google will promote "safe computer usage" for users: by logging out of computers when they're finished using them, specialized child protection, use of cookies in web browsers, and 'two-factor authorization' which sees the user entering a password and then a unique verification code sent to their mobile device."
Valerie B.

Lessons and Teaching Materials | Stay Safe Online - 3 views

  •  
    The National Cyber Security Alliance (NCSA) has posted some new posters and lesson plans for K-12
Haley M

Justin, Demi, Selena, Rihanna - and COPPA | BCP Business Center - 1 views

  • Justin, Demi, Selena, Rihanna - and COPPA By Lesley Fair October 4, 2012 - 1:29pm It's not likely we'll succumb to Bieber Fever.  We're of a generation more susceptible to the Rockin' Pneumonia and the Boogie Woogie Flu.  But a company that ran official fan websites for pop stars may be feeling the effects of an FTC law enforcement action alleging violations of the Children's Online Privacy Protection Act and COPPA Rule. The defendant, Artist Arena, operated authorized sites for Justin Bieber, Demi Lovato, Selena Gomez, and the mononymous recording artist Rihanna.  (It is, too, a word.  Ask Cher or Fabio.)  Visitors to BieberFever.com, DemiLovatoFanClub.net, SelenaGomez.com, or RihannaNow.com could join fan clubs and subscribe to online newsletters.  Fan club members also had access to social networking functions, like creating personal profiles, posting on walls, or "friending" other members.  Of course, to take advantage of those features, people had to provide personal information. The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics.  But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent.  According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it. What about Artist Arena's promises that it wouldn't collect children's personal information or activate kids' registrations without parental consent?  The FTC challenged those claims as false. The settlement imposes a $1 million civil penalty, bars future COPPA violations, and requires the company  to delete the information collected illegally. Looking for specifics on COPPA compliance?  Visit the BCP Business Center's Children's Privacy page.  
  •  
    This Justin Beiber fan site has been penalized more than $100,000 for collecting emails of minors under 13 without parental permission. COPPA compliance is more important than ever. I find it ironic that kids under 13 aren't even supposed to be able to have emails in the first place on many websites. "The details of the registration process varied depending on the site, so you'll want to read the complaint for the specifics. But the 25-words-or-less summary is that Artist Arena allegedly collected kids' names, addresses, email addresses, birthdates, gender and other info without properly notifying parents and getting their consent. According to the complaint, the company violated COPPA by knowingly registering over 25,000 kids under 13 and collected and maintained personal information from almost 75,000 other kids under 13 who started the sign-up process, but didn't finish it."
  •  
    This is important and why kids under 13 cannot get on most social media websites.
  •  
    This article is about kids that obtain info for personal websites without properly notifying parents and getting their consent.
Vicki Davis

Regulators shut down global PC 'tech support' scam | Politics and Law - CNET News - 0 views

  •  
    Scareware. Yes, it is a term. Scaring people into thinking they have a virus. Knowledge is power and it will also save you money. Being educated about computers pays over your life. It is time for all of us to be educated and savvy. I know someone taken by this scam. "English-speaking consumers in the United States, Canada, Australia, Ireland, New Zealand, and the U.K. were targeted in the global scam, regulators said. Most of the scammers were based in India, but some also came from the U.S. and U.K. The scam involved cold callers who claimed to work for major technology companies, such as Microsoft or Google, and who told consumers they had viruses on their PCs, according to regulators. The callers would attempt to dupe users into giving them remote access to their computers, locking the user out while attempting to "fix" the malware that the scammer claimed was on the machine."
William B

Cyber Bullying Statistics - Bullying Statistics - 0 views

  • Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs.
  • Over 80 percent of teens use a cell phone regularly, making it the most popular form of technology and a common medium for cyber bullying About half of young people have experienced some form of cyber bullying, and 10 to 20 percent experience it regularly Mean, hurtful comments and spreading rumors are the most common type of cyber bullying Girls are at least as likely as boys to be cyber bullies or their victims Boys are more likely to be threatened by cyber bullies than girls Cyber bullying affects all races Cyber bullying victims are more likely to have low self esteem and to consider suicide
  • Talks to teens about cyber bullying, explaining that it is wrong and can have serious consequences. Make a rule that teens may not send mean or damaging messages, even if someone else started it, or suggestive pictures or messages or they will lose their cell phone and computer privileges for a time. Encourage teens to tell an adult if cyber bullying is occurring. Tell them if they are the victims they will not be punished, and reassure them that being bullied is not their fault. Teens should keep cyber bullying messages as proof that the cyber bullying is occurring. The teens' parents may want to talk to the parents of the cyber bully, to the bully's Internet or cell phone provider, and/or to the police about the messages, especially if they are threatening or sexual in nature. Try blocking the person sending the messages. It may be necessary to get a new phone number or email address and to be more cautious about giving out the new number or address. Teens should never tell their password to anyone except a parent, and should not write it down in a place where it could be found by others. Teens should not share anything through text or instant messaging on their cell phone or the Internet that they would not want to be made public - remind teens that the person they are talking to in messages or online may not be who they think they are, and that things posted electronically may not be secure. Encourage teens never to share personal information online or to meet someone they only know online. Keep the computer in a shared space like the family room, and do not allow teens to have Internet access in their own rooms. Encourage teens to have times when they turn off the technology, such as at family meals or after a certain time at night. Parents may want to wait until high school to allow their teens to have their own email and cell phone accounts, and even then parents should still have access to the accounts.
  •  
    Many people get Cyber Bulling over online activities. People need to make their websites and pages private and know how to use it. "Over half of adolescents and teens have been bullied online, and about the same number have engaged in cyber bullying. More than 1 in 3 young people have experienced cyberthreats online. Over 25 percent of adolescents and teens have been bullied repeatedly through their cell phones or the Internet. Well over half of young people do not tell their parents when cyber bullying occurs."
Summer T

MySecureCyberspace: File Sharing - 0 views

  •  
    File sharing is when you share computer data or space with others on a network. File sharing allows multiple users to read, modify, copy or print the same file. Different users may have different levels of access to files on the network.
  •  
    Parents need to watch what they put on the internet and what they share with other people.
andyjackins

Nude Heather Morris pictures - hacker blamed | Naked Security - 0 views

  •  
    Another celebrity has there personal information hacked.  Shows how we need to be more responsible for what we take photos and video of as more people are having their emails and phones hacked. 
Alex r

Individual Awareness - 1 views

  •  
    Individuality on a computer
Vicki Davis

White House Privacy Bill of Rights Brought to You by Years of Online Debacles | Threat ... - 0 views

  •  
    There is now an Online Privacy Bill of Rights from the white house that demands that online ad networks build profiles that will respect "no not track" settings in browsers. It is sad when you have to force people to be honest. It will also mean that people will have to come to grips with the fact that NOTHING IS FREE. You're always giving up something when you use a free service. ALWAYS.
Todd Stahlecker

Please Rob Me - 2 views

  •  
    This page raises awareness about over sharing on the web and the possibility of your private information being used to hurt you in some way.
Nolan C

Netiquette - Wikipedia, the free encyclopedia - 0 views

shared by Nolan C on 02 Oct 09 - Cached
  • Netiquette (a compound formed from "net etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855.[1] However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community. The points most strongly emphasized about USENET netiquette often include using simple electronic signatures, and avoiding multiposting, cross-posting, off-topic posting, hijacking a discussion thread, and other techniques used to minimize the effort required to read a post or a thread. Netiquette guidelines posted by IBM for employees utilizing Second Life in an official capacity, however, focus on basic professionalism, maintaining a tenable work environment, and protecting IBM's intellectual property.[2] Similarly, some Usenet guidelines call for use of unabbreviated English[3][4] while users of online chat protocols like IRC and instant messaging protocols like SMS often encourage just the opposite, bolstering use of SMS language.
  • Common rules for e-mail[7] and USENET such as avoiding flamewars and spam are constant across most mediums and communities. Another rule is to avoid typing in all caps, which is considered to be the equivalent of shouting or yelling. Other commonly shared points, such as remembering that one's posts are (or can easily be made) public, are generally intuitively understood by publishers of web pages and posters to USENET, although this rule is somewhat flexible depending on the environment. On more private protocols, however, such as email and SMS, some users take the privacy of their posts for granted. One-on-one communications, such as private messages on chat forums and direct SMSes, may be considered more private than other such protocols, but infamous breaches surround even these relatively private media. For example, Paris Hilton's Sidekick PDA was cracked in 2005, resulting in the publication of her private photos, SMS history, address book, etc.[8]
  •  
    Netiquette project
  • ...2 more comments...
  •  
    the definition of netiquette
  •  
    Wikipedia definition of Netiquette
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
  •  
    Netiquette (short for "network etiquette" or "Internet etiquette") is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary from community to community.
Vicki Davis

Cyber Bullying Alert | CyberBullying Prevention Software | Internet Harassment - 1 views

  • The CyberBully Alert software is a tool for parents to equip their children with the ability to immediately communicate and document any threats or cyberbullying their children experience when online. Th
  • Experts agree that the best way to address cyberbullying and online threats is to immediately communicate the incident with an adult, as well as document what the threat is.
    • Vicki Davis
       
      I think that every internet browser should have an easy, built in way to take a screen shot and send it to someone. We need this for many safety reasons. It is to protect those who need it most and are often the most technically challenged.
  • A text and email message immediately notifies pre-specified recipients of the online threat - assuring rapid communication between adults and children.
  • ...1 more annotation...
  • CyberBully Alert gives parents the security of immediately being there for their kids when a threat occurs—whether they are at work, in a meeting, on the road, or simply in another room.
  •  
    Software program to mention in cyberbullying section of the wiki.
  •  
    New software that allows children to document and report harmful harrassment online. I would love to test this tool, I find it very interesting. I think this kind of thing is good, but never replaces a parent talking to a child. However, if there is nothing that "can be done" because local laws and others have no method of dealing with it, then I don't know if it will breed frustration. I think every computer should have an easy way to grab screenshots like my fireshot program in firefox. I think this should be part of every web browser.
Miller S.

Hacker (computer security) - Wikipedia, the free encyclopedia - 0 views

  •  
    In common usage, hacker is generic term for a computer criminal, often with a specific specialty in computer intrusion.[1] While other definitions peculiar to the computer enthusiast community exist, they are rarely used in mainstream context. Computer hacking subculture is often referred to as the network hacker subculture or simply the computer underground.[citation needed] According to its adherents, cultural values center around the idea of creative and extraordinary computer usage.[citation needed] Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.[citation needed]
« First ‹ Previous 41 - 60 of 91 Next › Last »
Showing 20 items per page