US-CERT Cyber Security Tip ST05-002 -- Keeping Children Safe Online

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                    Cyber Security Tip ST05-002
                    Keeping Children Safe Online

   Children present unique security risks when they use a computer--not
   only do you have to keep them safe, you have to protect the data on
   your computer. By taking some simple steps, you can dramatically
   reduce the threats.

What unique risks are associated with children?

   When  a  child  is using your computer, normal safeguards and security
   practices   may   not   be  sufficient.  Children  present  additional
   challenges   because  of  their  natural  characteristics:  innocence,
   curiosity,  desire  for independence, and fear of punishment. You need
   to consider these characteristics when determining how to protect your
   data and the child.

   You  may  think  that  because  the  child  is only playing a game, or
   researching  a  term paper, or typing a homework assignment, he or she
   can't  cause  any  harm. But what if, when saving her paper, the child
   deletes  a  necessary  program  file?  Or  what if she unintentionally
   visits  a  malicious web page that infects your computer with a virus?
   These  are just two possible scenarios. Mistakes happen, but the child
   may  not  realize  what  she's  done or may not tell you what happened
   because she's afraid of getting punished.

   Online  predators  present another significant threat, particularly to
   children.  Because  the  nature of the internet is so anonymous, it is
   easy  for  people  to  misrepresent themselves and manipulate or trick
   other  users (see Avoiding Social Engineering and Phishing Attacks for
   some examples). Adults often fall victim to these ploys, and children,
   who  are usually much more open and trusting, are even easier targets.
   The  threat  is even greater if a child has access to email or instant
   messaging  programs,  visits chat rooms, and/or uses social networking
   sites  (see  Using Instant Messaging and Chat Rooms Safely and Staying
   Safe on Social Network Sites for more information).

What can you do?

     * Be  involved  -  Consider  activities  you  can  work on together,
       whether  it  be  playing  a game, researching a topic you had been
       talking  about (e.g., family vacation spots, a particular hobby, a
       historical  figure), or putting together a family newsletter. This
       will  allow  you to supervise your child's online activities while
       teaching her good computer habits.
     * Keep  your  computer  in  an  open area - If your computer is in a
       high-traffic area, you will be able to easily monitor the computer
       activity.  Not  only  does  this  accessibility deter a child from
       doing  something  she knows she's not allowed to do, it also gives
       you  the  opportunity  to  intervene if you notice a behavior that
       could have negative consequences.
     * Set  rules and warn about dangers - Make sure your child knows the
       boundaries  of  what  she  is allowed to do on the computer. These
       boundaries  should  be appropriate for the child's age, knowledge,
       and  maturity,  but  they  may include rules about how long she is
       allowed to be on the computer, what sites she is allowed to visit,
       what  software  programs she can use, and what tasks or activities
       she  is  allowed to do. You should also talk to children about the
       dangers of the internet so that they recognize suspicious behavior
       or  activity. The goal isn't to scare them, it's to make them more
       aware.
     * Monitor  computer  activity - Be aware of what your child is doing
       on the computer, including which web sites she is visiting. If she
       is  using  email,  instant  messaging, or chat rooms, try to get a
       sense  of  who  she is corresponding with and whether she actually
       knows them.
     * Keep  lines  of  communication open - Let your child know that she
       can approach you with any questions or concerns about behaviors or
       problems she may have encountered on the computer.
     * Consider  partitioning your computer into separate accounts - Most
       operating systems (including Windows XP, Mac OS X, and Linux) give
       you the option of creating a different user account for each user.
       If you're worried that your child may accidentally access, modify,
       and/or  delete your files, you can give her a separate account and
       decrease the amount of access and number of privileges she has.
       If  you  don't  have  separate accounts, you need to be especially
       careful  about  your  security  settings.  In addition to limiting
       functionality   within  your  browser  (see  Evaluating  Your  Web
       Browser's  Security  Settings for more information), avoid letting
       your  browser  remember  passwords  and other personal information
       (see  Browsing  Safely: Understanding Active Content and Cookies).
       Also,  it is always important to keep your virus definitions up to
       date (see Understanding Anti-Virus Software).
     * Consider  implementing  parental controls - You may be able to set
       some  parental controls within your browser. For example, Internet
       Explorer  allows  you to restrict or allow certain web sites to be
       viewed on your computer, and you can protect these settings with a
       password.  To  find  those  options, click Tools on your menu bar,
       select  Internet Options..., choose the Content tab, and click the
       Enable... button under Content Advisor.
       There  are  other  resources you can use to control and/or monitor
       your child's online activity. Some ISPs offer services designed to
       protect  children  online. Contact your ISP to see if any of these
       services  are  available. There are also special software programs
       you  can  install  on  your  computer.  Different  programs  offer
       different features and capabilities, so you can find one that best
       suits your needs. The following web sites offer lists of software,
       as  well  as  other  useful  information about protecting children
       online:

     * GetNetWise   -   http://kids.getnetwise.org/  -  Click  Tools  for
       Families  to  reach  a page that allows you to search for software
       based  on  characteristics  like  what  the  tool  does  and  what
       operating system you have on your computer.
     * Yahooligans! Parents' Guide -
       http://yahooligans.yahoo.com/parents/   -   Click   Blocking   and
       Filtering  under  Related  Websites on the left sidebar to reach a
       list of software.
     _________________________________________________________________

     Authors: Mindi McDowell, Allen Householder
     _________________________________________________________________

     Produced 2005 by US-CERT, a government organization.

     Note: This tip was previously published and is being re-distributed 
     to increase awareness. 
  
     Terms of use
 
     <http://www.us-cert.gov/legal.html>
  
     This document can also be found at
 
     <http://www.us-cert.gov/cas/tips/ST05-002.html>
 

     For instructions on subscribing to or unsubscribing from this
     mailing list, visit <http://www.us-cert.gov/cas/signup.html>.     
     
     


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBR5dg4PRFkHkM87XOAQIp8wf+Nu41u5ciqvFDdPnYZ9d0ej3MnOPdpqNr
41P9P90pDIjd5FcjAtyZ276GXgxKwT7kx7MQqIjUBldP506Ghm+LXLnECwHYyHF/
ZPeDNwakg6YaFM2rgGmLt2O2p6PDgtkPLYenB/bOvAk5wgT5/tE42Qp1+p72aM+k
U43wmrSFUOZdAbJKR9XhDUB9mRdMcE+Yzz5mL/o5FpB1Hw4dok+EkFoG5vfTFqMF
cdqniJ/k3i7HtZ+vcIKreaVSOpQ2b+Kwy06PvnysXG0XHvs+MexQIVT5zaFRKbGp
NlOwbjUA6Xqv5OJ5hkxdcXVXlLRdp8g6SuFmb5cFD0PdtHku7MEwwA==
=HXn5
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux