$30 off During Our Annual Pro Sale. View Details »

E-Safety: How technology can protect us from technology

Chris Cooper
February 11, 2014

E-Safety: How technology can protect us from technology

A talk on the technology behind E-Safety for parents of primary school-aged children.

Presented at Seabrook Primary School on 11th February 2014.

Chris Cooper

February 11, 2014

More Decks by Chris Cooper

Other Decks in Education


  1. E-Safety How technology can protect us from… technology. Safer Internet

    Day 2014 Seabrook Primary School
  2. Information Security Consultant Chris Cooper I work at SureCloud data,

    hackers, privacy, malware, identity theft, etc
  3. Problems Risks, threats etc Awareness Understanding you can share Controls

    Software, settings and services
  4. Children + the Internet Ability, exploration and curiosity vs Safety,

    caution and instincts
  5. Devices

  6. None
  7. Risks Content Age-inappropriate – explicit, violent, hate speech Conduct Online

    behaviour and sharing personal info Contact with people who might bully, abuse or exploit Commercialism aggressive advertising and marketing Malware viruses, spyware, adware etc Personal Security preventing people from gaining access to you personal info
  8. A balanced approach: restriction vs freedom Dialogue

  9. Content

  10. Inappropriate Content Explicit, hate speech, racist, violent Websites, online games,

    mobile applications Deliberate or accidental access
  11. Filtering is hard, for a computer anyway

  12. ISP Parental Controls The four big UK internet service providers

    offer parental controls.
  13. Built-In Parental Controls Most “connected” devices now have their own

    parental controls. • Windows Parental Controls (Vista, 7, 8) – filter websites, enforce time limits, restrict games • Mac OS X Parental Controls • Games Consoles (Xbox 360/One, PS3/4, Wii/U) – game content, internet browsing, voice chat • Android – Google Play restrictions. (Some tablets now support restricted profiles.) • iOS – restrict apps, settings, content, websites
  14. 3rd Party Software Examples…. Name Filtering Social Monitoring Time Restrictions

    App Control Devices Price Qustodio (free) £FREE Qustodio Premium £30-£50 / YEAR Norton Family (free) £FREE Norton Family Premium £30 / YEAR Bitdefender Parental Control £20 / YEAR AVG Family Protection £30 / YEAR +MOB
  15. Website Controls Some websites provide their own parental controls. YouTube

    safety mode, Google SafeSearch, 4oD parental control, iPlayer parental guidance lock, ITV Player PIN protection, Sky Go parental controls
  16. Conduct

  17. Inappropriate Conduct Losing control of the information you share

  18. Be aware of whoyou are sharing information with e.g. friends

    of friends… YOU
  19. Consider the purpose of the social network

  20. Privacy Settings Most social networks give you at least some

    control over who you want to share information with. If your child is old enough to use social networks, help them set these up correctly / reasonably.
  21. Social Monitoring Encourage conversation about your child’s activities on social

    networks. If desired, some 3rd party software can help you monitor social media activity.
  22. Contact

  23. Inappropriate Contact Bullying, abuse and exploitation.

  24. Lies are easy when you’re online

  25. Moderated Services Some services are moderated and much more child-friendly.

    Club Penguin is a good example, where staff are paid to supervise interaction and strict / smart content-filters are in place.
  26. Social Monitoring Encourage conversation about who you children are talking

    to online and what websites / apps they use to message others. If desired, some 3rd party software can help you monitor social media activity.
  27. Reporting • Child to an adult (you or a teacher)

    • CEOP – sexual abuse or harassment (www.ceop.police.uk) • BeatBullying – cyberbullying (http://www.beatbullying.org/) • Reporting inappropriate contact within apps/websites
  28. Everything Else

  29. Tips for commercialism, personal security and malware 1. Install an

    ad-blocker (e.g. https://adblockplus.org/) 2. Be wary when following links or opening files from untrusted sources. Go direct if possible. 3. Always check for HTTPS (green padlock) when entering sensitive information into a trusted website. 4. Try to keep your operating system (Windows) and software up-to-date, especially Java and Flash. 5. Install anti-virus software and keep it up-to-date! (e.g. www.bitdefender.co.uk/solutions/free.html)
  30. Ultimately it all comes down to controlling exposure whilst still

    learning through experience
  31. Chris Cooper Information Security Consultant Thank You