Cyber Security for Kids

16 tháng 3, 2022

In recent years, children participate in activities on the Internet environment more and more often. Not only entertainment activities, online participation is also exploited for online learning, especially during the complicated development of the COVID-19 epidemic. must still ensure continuous learning through network applications. How to raise children's cyber safety awareness and self-protection measures is something that parents should be concerned about.

1.  What is Cyber Security?

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. (EN-USA)


2.  What is Internet Security?

Internet security consists of a range of security tactics for protecting activities and transactions conducted online over the internet. These tactics are meant to safeguard users from threats such as hacking into computer systems, email addresses, or websites; malicious software that can infect and inherently damage systems; and identity theft by hackers who steal personal data such as bank account information and credit card numbers. Internet security is a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and vulnerabilities of online access and use of the internet.

In today's digital landscape, many of our daily activities rely on the internet. Various forms of communication, entertainment, and financial and work-related tasks are accomplished online. This means that tons of data and sensitive information are constantly being shared over the internet. The internet is mostly private and secure, but it can also be an insecure channel for exchanging information. With a high risk of intrusion by hackers and cybercriminals, internet security is a top priority for individuals and businesses alike.


3.  Threats Internet Security

  • Virus: Perhaps the most well-known computer security threat, a computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user. A virus replicates and executes itself, usually doing damage to your computer in the process.
  •  Hackers and Predators: People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism. These online predators can compromise credit card information, lock you out of your data, and steal your identity. As you may have guessed, online security tools with identity theft protection are one of the most effective ways to protect yourself from this brand of cybercriminal.
  • Phishing: Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. Phishing attacks are some of the most successful methods for cybercriminals looking to pull off a data breach.
  • https: // www.webroot.com/us/en/resources/tips-articles/computer-security-threats

 

THREATS INTERNET SECURITY KIDS

1.  Cyber Predators

The Internet is much more anonymous than the real world. People can hide their identities or even pretend to be someone they're not. This can sometimes present a real danger to children and teens who are online. Online predators may try to lure kids and teens into sexual conversations or even face-to-face meetings. Predators will sometimes send obscene material or request that kids send pictures of themselves. Therefore, it's important to teach your kids to be on their guard whenever they're online.

Teens are generally more at risk from predators. Because they are curious and want to be accepted,they may talk to a predator willingly, even if they know it's dangerous. Sometimes teens may believe they are in love with someone online, making them more likely to agree to a face-to-face meeting.


While it's not necessarily likely that your child will be contacted by a predator, the danger does exist. Below are some guidelines you can tell your kids to help them stay safe from online predators.


  • Avoid using suggestive screen names or photos. These can result in unwanted attention from online predators.
  • If someone is flattering you online, you should be wary. Although many people online are genuinely nice, predators may use flattery to try to start a relationship with a teen. This doesn't mean you need to be suspicious of everyone, but you should be careful.
  • Don't talk to anyone who wants to get too personal. If they want to talk about things that are sexual or personal, you should end the conversation. Once you get pulled into a conversation (or a relationship), it may be more difficult to stop.
  • Keep in mind that people are not always who they say they are. Predators may pretend to be children or teenagers to talk to kids online. They may use a fake profile picture and add other profile details to appear more convincing.
  • Never arrange to meet with someone you met online. Predators may try to arrange a face-to-face meeting with a child or teen. Even if the person seems nice, this can be dangerous.
  • Tell a parent or trusted adult if you encounter a problem. If anyone makes you feel uncomfortable online, you should tell a parent or trusted adult immediately. You should also save any emails or other communication because they may be needed as evidence.

 

Protect yourself against predators:

Who to contact if there's a problem: If you think your child is being contacted by an online predator, seek immediate help from the following resources:

  • Local police: If your child is in immediate danger, you should call 911. Otherwise, you can call your local police's non-emergency number to report a problem.
  • Digital means of reporting a crime on the internet if the local police do not have enough resources, such as police stations specializing in cybercrime.

 

Cyberpredator Content

•    https://www.youtube.com/watch?v=6jMhMVEjEQg&

•    https://www.youtube.com/watch?v=DFWjf5_O-fk

•    https://www.youtube.com/watch?v=euc-WcN5IkY&t

•    https://www.youtube.com/watch?v=dbg4hNHsc_8

•    https://www.youtube.com/watch?v=xk4VmYrquAs

•    https://www.youtube.com/watch?v=m6Z7EWFTYTU&tc

 

2.  Cyberbullying

Just as predators no longer have to leave their homes to interact with children, bullies no longer have to be face to face with their victims. Cyberbullying through social media sites is unfortunately prevalent in today’s world and causes just as much damage as any other form of bullying. This is arguably one of the most challenging threats to deal with, though a solution is to prevent your children from creating social media profiles in the first place. Let them know they can create theirs when they’re older. If you don’t want to do this, remind your children that they can always come to you if they’re being bullied, whether online or not. You won’t be able to do much unless you know it’s happening in the first place.

The vast majority, 90%, of teens agree that cyber bullying a problem, and 63% believe this is a serious problem. What’s more, a 2018 survey of children’s online behavior found that approximately 60% of children who use social media have witnessed some form of bullying, and that, for various reasons, most children ignored the behavior altogether. And according to enough.org, as of February 2018, nearly half (47%) of all young people had been the victims of cyber bullying. Social media and online games are today's virtual playground, and that is where much cyber bullying takes place, and it’s operating 24/7. Children can be ridiculed in social media exchanges. Or, in online gaming, their player personas can be subjected to incessant attack, turning the game from an imaginative adventure into a humiliating ordeal that escalate into cyber bullying across multiple platforms and in real-life.

The best foundation for protecting against cyber bullying is to be comfortable talking to your children about what is going on in their lives online and in in real-life (IRL) and how to stand up to bullies. Cyber security software and specialized apps for monitoring your child’s online and mobile activity can help, but nothing will replace an open dialog.

 

Cyberbullying Content

•    https://www.youtube.com/watch?v=f6K9Ie_Chjs

•    https://www.youtube.com/watch?v=eQo-TknxI_I

•    https://www.youtube.com/watch?v=asTti6y39xI

•    https://www.youtube.com/watch?v=GsE6  spm-gyI

 

3.  Private Information

Children do not yet understand social boundaries. They may post personally identifiable information (PII) online, for example in their social media profiles, that should not be out in public. This might be anything from images of awkward personal moments to their home addresses or family vacation plans.

Much, but not all, of what your children post is in public view. This means that you can also see it—and there's no harm in reminding them that if Mom and Dad can see it, so can everyone else. Avoid snooping, but speak frankly to your kids about public boundaries and what they mean for your children and your family as a whole.

 

4.  Sexting

Sexting is sending sexually explicit messages, photos, or videos via cell phone, computer, or any digital device. Sexting includes photos and videos containing nudity or showing simulated sex acts. It also includes text messages that discuss or propose sex acts.

As teens and children increasingly carry smartphones and use tablets, social media, apps, and messaging, the risks that they will send or receive sexually explicit content has become a concern for parents, teachers, and law enforcement.1

Sexting is often done as a joke, a way of getting attention, or as flirting. Parents should discuss the issue with their children to ensure they understand the risks and what to if or when they're pressured to participate.


Why Is Sexting a Problem?

A photo shared between two people can quickly become a viral phenomenon. Teens may believe it will be kept private and then discover it has been shared widely with their peers, sometimes with grave consequences. These include arrests of teens who shared photos of themselves or other underage teens.

While some states have laws that differentiate sexting from child pornography, others do not. Sexting could result in charges of distributing or possessing child pornography.2.

Bullying, harassment, and humiliation are common problems when the photos and messages get shared beyond the intended recipient. There can be severe emotional and social consequences, including suicides of teens who had their photos shared.


How Can Parents Prevent Sexting?

Start the conversation before your child has an incident. If you are giving your child a smartphone or webcam, that is the time to talk about sexting. You also can use news stories or plotlines in television shows or movies as a conversation starter.

The best approach to talking about sexting is to take a non-judgmental and informational one. Keeping the dialogue open leaves room for your kids to talk with you rather than hiding things away. Also, be aware that kids may have a different name for sexting, so you'll need to be clear about the topic you are discussing.

 

Sexting Content

•    https://www.youtube.com/watch?v=PL57cjJlp7g

•    https://www.youtube.com/watch?v=MoRtLk1xihY

•    https://www.youtube.com/watch?v=SuBxI5OGdlw

•    https://www.youtube.com/watch?v=uFKAFo_etkE

•    https://www.youtube.com/watch?v=RWxAimnKupE

•    https://www.youtube.com/watch?v=UPgHh3wOusI

•    https://www.youtube.com/watch?v=oAI2ajdDIrk

•    https://www.verywellfamily.com/what-is-sexting-problem-1258921

•    https://www.webmd.com/sex/what-is-sexting

 

5.  Overexposing Social Network

If we are more and more willing to expose our lives on social networking sites and share all kinds of moments and situations, we don't necessarily need to abandon caution to think and choose what to publish, where to publish and, especially, for whom to publish. Overexposure, known worldwide as Oversharing, is difficult to measure, but we can always start with common sense and a reflection on the context in which we share something.

We are all free to share things in our lives with others, but we cannot forget the differences of exposure on and off the web. If on a bus or plane trip, or even in a bank line, we don't feel comfortable sharing and exposing part of our intimacy with strangers, then we know that it's not all kinds of content that we can expose, both for our safety and so as not to embarrass the other person.

On the Internet, the same care must be taken, added to some important differences because everything, everything we share is registered and we lose full control over who can have access to this content. We are no longer the only owners of information that can be used not just by the sites that host the sites and services, but by users all over the world who can search and find these details about our lives very easily if we overindulge in online exposure. And, as always, information about our intimacy taken out of context can hurt us, both now and in the future.


Overexposing Social Network Content

•    https://www.youtube.com/watch?v=0EFHbruKEmw

•    https://www.youtube.com/watch?v=e2xm5fc5MQk

•    https://www.youtube.com/watch?v=tRo9n8M7zIE

•    https://www.youtube.com/watch?v=Zbqo7MGVElw&t

•    https://www.youtube.com/watch?v=KdtPNRzuKrk

•    https://www.youtube.com/watch?v=Y6oUf81b1OI

•    https://www.youtube.com/watch?v=0hs8rc2u5ak

•    https://www.youtube.com/watch?v=aP8yrkkLWlM&t

 

6.  Phishing

Phishing is what cyber security professionals call the use of emails that try to trick people into clicking on malicious links or attachments. These can be especially difficult for kids to detect because often, the email will appear to be from someone legitimate, like a friend or family member, saying simply, "Hey— thought you might like this!" This can also  be done with using messaging apps or text messages—then it's called "smishing". (Smishing is an attack that uses text messaging or short message service (SMS) to execute the attack. A common smishing technique is to deliver a message to a cell phone through SMS that contains a clickable link or a return phone number.)

 

•         E-mail phishing

The basic phishing email is sent by fraudsters impersonating legitimate companies, often banks or credit card providers. These emails are designed to trick you into providing log-in information or financial information, such as credit card numbers or Social Security numbers.

•         Spear phishing

While most phishing emails are sent to large groups of people, there is one type of attack that is more personalized in nature, spear phishing.

Spear-phishing emails are targeted toward a specific individual, business, or organization. And unlike more generic phishing emails, the scammers who send them spend time researching their targets. The technique is sometimes called social engineering. These criminals will send emails that look like they’re from legitimate sources.

•         Clone phishing

Another type of phishing, clone phishing, might be one of the most difficult to detect. In this type of phishing attack, scammers create a nearly identical version of an email that victims have already received.

The cloned email is sent from an address that is nearly, but not quite, the same as the email address used by the message’s original sender. The body of the email looks the same, too. What’s different? The attachment or link in the message has been changed. If victims click on those now, it will take them to a fake website or open an infected attachment.

•         Whaling

Sometimes phishers go after the biggest of targets, the whales. Whaling attacks target chief executive officers, chief operating officers, or other high-ranking executives in a company. The goal is to trick these powerful people into giving up the most sensitive of corporate data.

These attacks are more sophisticated than general phishing attacks and require plenty of research from scammers. They usually rely on fraudulent emails that appear to be from trusted sources within the company or from legitimate outside.

•         Pop-up phishing

Pop-up phishing is a scam in which pop-up ads trick users into installing malware on their computers or convince them to purchase antivirus protection they don’t need..

These pop-up ads sometimes use scare tactics. A common pop-up phishing example is when an ad might pop up on a user’s screen warning the user that their computer has been infected and the only way to remove the virus is by installing a particular type of antivirus software.

Once the user installs this software, it either doesn’t work or, worse, actually does infect the computer with malware.

 

Phishing and Social Engineering Content

•     https://us.norton.com/internetsecurity-online-scams-what-is-phishing.html

•     https://www.youtube.com/watch?v=WNVTGTrWcvw

•     https://www.youtube.com/watch?v=JzoJeJBdhuI

•     https://www.youtube.com/watch?v=Y7zNlEMDmI4

•     https://www.youtube.com/watch?v=9TRR6lHviQc

•     https://www.youtube.com/watch?v=BnmneAjVrM4&t

•     https://www.youtube.com/watch?v=XsOWczwRVuc

•     https://www.youtube.com/watch?v=j3nE8JQATXo

•     https://www.youtube.com/watch?v=WG8V1_Sj5g0

•     https://www.youtube.com/watch?v=_faMyjODoR0

•     https://www.youtube.com/watch?v=6OHKRA8T18I

•     https://securityscorecard.com/blog/types-of-phishing-attacks-and-how-to-identify-them

 

7.  Digital Footprinting

What is a digital footprint?

A digital footprint – sometimes called a digital shadow or an electronic footprint – refers to the trail of data you leave when using the internet. It includes websites you visit, emails you send, and information you submit online. A digital footprint can be used to track a person’s online activities and devices. Internet users create their digital footprint either actively or passively.

Whenever you use the internet, you leave behind a trail of information known as your digital footprint. A digital footprint grows in many ways – for example, posting on social media, subscribing to a newsletter, leaving an online review, or shopping online.

Sometimes, it’s not always obvious that you are contributing to your digital footprint. For example, websites can track your activity by installing cookies on your device, and apps can collate your data without you knowing it. Once you allow an organization to access your information, they could sell or share your data with third parties. Worse still, your personal information could be compromised as part of a data breach.

You often hear the terms ‘active’ and ‘passive’ in relation to digital footprints:

 

Active digital footprints

An active digital footprint is where the user has deliberately shared information about themselves – for example, through posting or participating on social networking sites or online forums. If a user is logged into a website through a registered username or profile, any posts they make form part of their active digital footprint. Other activities that contribute to active digital footprints include completing an online form – such as subscribing to a newsletter – or agreeing to accept cookies on your browser.

 

Passive digital footprints

A passive digital footprint is created when information is collected about the user without them being aware that this is happening. For example, this occurs when websites collect information about how many times users visit, where they come from, and their IP address. This is a hidden process, which users may not realize is taking place. Other examples of passive footprints include social networking sites and advertisers using your likes, shares, and comments to profile you and target you with specific content.

 

Digital Footprinting Content

•    https://www.kaspersky.com/resource-center/definitions/what-is-a-  digital-footprint

•    https://en.wikipedia.org/wiki/Digital_footprint

•    https://www.familylives.org.uk/advice/your-family/online-safety/digital-  footprints/

•    https://www.internetsociety.org/learning/digital-footprints/

•    https://learnenglishteens.britishcouncil.org/skills/reading/upper-

intermediate-b2-reading/your-digital-footprint

•    https://techterms.com/definition/digital_footprint

•    https://enhalo.co/360-security/detecting-the-hacker-digital-footprinting/

 

8.  Tools Internet Security

  • https://www.jigsawacademy.com/the-top-5-cyber-security-tools-used-by-organizations/
  • https://www.techtudo.com.br/tudo-sobre/pc-tools-internet-security.html
  • https://blog.gigamon.com/2019/06/13/what-is-network-security-14-tools-and-techniques-to-know/
  • https://www.javatpoint.com/cyber-security-tools
  • https://theexodusroad.com/10-tools-to-keep-your-kids-safe-online/
  • https://staysafeonline.org/blog/guide-essential-tools-keep-children-safe-online/
  • https://internetsafety101.org/Internetsafetytools
  • https://www.makeuseof.com/tag/7-family-safety-tools-using-kids-online/
  • https://www.yourlocalsecurity.com/blog/7-awesome-tech-tools-to-keep-kids-safe-online/
  • https://www.kaspersky.com/resource-center/preemptive-safety/kids-online-safety
  • https://kidshealth.org/en/parents/net-safety.html
  • https://sectigostore.com/blog/internet-safety-for-kids-resources-tools-for-parents/
  • https://br.norton.com/norton-family
  • https://www.techradar.com/best/parental-control
  • https://www.pcmag.com/picks/the-best-parental-control-software
  • https://www.youtube.com/kids/parent-resources/

 

9.  Extra Content

  • https://www.youtube.com/watch?v=JSx7MBIOnW4
  • https://www.csa.gov.sg/Programmes/sg-cyber-safe-students/videos/cyber-safety-kids-rsa-security  
  • https://www.youtube.com/watch?v=8tR9P4QX82I
  • https://www.cisecurity.org/blog/6-educational-cybersecurity-resources-for-kids/  
  • https://www.getcybersafe.gc.ca/en/blogs/cyber-security-kids-how-parents-can-talk-their-children  
  • https://usa.kaspersky.com/resource-center/preemptive-safety/cybersecurity-for-kids
  • https://www.cisa.gov/sites/default/files/publications/Kids%20Cybersecurity%20Presentation.pdf  
  • https://au.norton.com/internetsecurity-kids-safety-middle-school-kit-a-broader-world-of-cybersecurity- protection.html
  • https://www.safewise.com/resources/internet-safety-kids/
  • https://www.triptecnologia.com.br/single-post/2019/10/11/10-dicas-de-seguran%C3%A7a-na-internet-para-  crian%C3%A7as
  • https://www.youtube.com/watch?v=IRYbq9EMyNM  
  • https://www.youtube.com/watch?v=TfAO8P5oVeI  
  • https://www.youtube.com/watch?v=t43OKYEqw8U  
  • https://zillion.com.br/seguranca-infantil-na-internet/
  • https://revistacrescer.globo.com/Criancas/Comportamento/noticia/2020/05/8-dicas-para-garantir-seguranca-online.html
  • https://blog.avast.com/pt-br/as-7-regras-de-seguranca-e-privacidade-para-criancas-na-internet

 

Source: According to Joas Antonio


Bạn cũng có thể quan tâm

4 tháng 6, 2024
Bộ định tuyến chơi game TP-Link Archer C5400X dễ mắc phải các lỗi bảo mật có thể cho phép kẻ tấn công từ xa, không được xác thực thực thi các lệnh trên thiết bị.
3 tháng 6, 2024
Ngày 27 tháng 5 Check Point đã cảnh báo rằng các tác nhân đe dọa đang nhắm mục tiêu vào các thiết bị VPN truy cập từ xa của Check Point trong một chiến dịch đang diễn ra nhằm xâm phạm mạng doanh nghiệp.
31 tháng 5, 2024
Công ty quản lý đơn thuốc Sav-Rx cảnh báo hơn 2,8 triệu cá nhân ở Hoa Kỳ việc họ đã bị vi phạm dữ liệu và dữ liệu cá nhân của họ đã bị đánh cắp trong một cuộc tấn công mạng năm 2023.
Thêm bài viết
Share by: