RSS Feed for This PostCurrent Article

Internet Security

Helping Educators Protect Children – Why Internet Monitoring is Needed

The number of children who use the Internet is soaring. Currently more than 30 million kids under the age of 18 use the Internet. That represents nearly half of the children living in the United States. 14 million children access the information highway from school, a figure that is expected to increase to 44 million by 2003. Also by that year, we believe more students will access the Internet from the classroom than from home according to the Consortium of School Networking.

Over the last decade, while the numbers of people who use the Internet grew, the Internet, and what it is used for, has changed as well. It is no longer a community of scientists and academics. Now, anyone can publish whatever he or she wants on a web site and have an instant worldwide audience. While the World Wide Web opens up a world of information, entertainment, and social interaction to kids, it also gives them access to some very unfriendly information. Today there are nearly 7 million pornography sites on the web and that number increases by the day. Children unwittingly plug an innocuous word into a search engine and not only does the information they seek pop up, but often, so do porn sites, and sites with topics devoted to bomb-making, weaponry, gambling, and drugs. Just like the World Wide Web, if we consider it an entity, does not know the ages of the people who surf it, inappropriate email does not know the age of its addressee, and it shows up in everyone’s email box. Worst of all, the Internet makes it possible for the worst sort of predator, the pedophile, to creep into our schools and homes.

Organizations ranging from schools and hospitals to churches and businesses now rely on the Internet for access to information. It also provides instantaneous access to vendors, suppliers, sales, customer service and more. But with the good, comes some bad. Along with all the vital information that flows across the web, there is also content that is at best inappropriate and at worst illegal. Educators who fail to protect their students from some of this easily obtainable material face a host of problems, including legal liability (last year employees at a public library in Minneapolis filed suit with the Equal Employment Opportunity Commission (EEOC) saying that exposure to porn due to patron surfing constituted a hostile work environment) negative publicity, wasted money due to nonproductive use of equipment (excess lines, routers, disk storage and printers, unreliable or slow connections, etc.), and, of course, the human costs, which are incalculable.

Our children are our most precious and vulnerable citizens and they are at risk. But the risk is nott necessarily where we as parents and educators think it is. Law enforcement officers who deal with the growing problem of cyber crime report that web content is one problem, but major criminal activity is taking place in chat rooms, instant messaging applications, and in email. These modes of communication have given predators or pedophiles access to online playgrounds where they find children to virtually, and potentially literally, molest. The Internet has provided these criminals with a means of communicating with millions of children. The fact that they have anonymity means that they are free to pose as anyone they want to.

The problem is larger than we think. Consider that one Midwestern city with a population of 190,000 has 270 registered sex offenders. This is one small city. When a cyber crime enforcement agent in that city recently logged into a chat room posing as a 13-year-old girl, he had ten men wanting to talk sexually with her within 5 minutes!

I. An Overview of the Children’s Internet Protection Act

The Children’s Internet Protection Act was signed into law in December of 2000. The law became effective in April of last year. CIPA mandates the use of blocking, filtering or monitoring technology on computers in public libraries and schools receiving E-rate telecomm discounts or Library Services and Technology Act (LSTA) or Elementary and Secondary Education Act (ESEA) funds to filter harmful to minors material. The law has not been universally praised. Organizations ranging from the American Civil Liberties Union to the American Library Association (ALA) have filed suits with the goal of overturning the law.

The ALA believes the legislation is unconstitutional because it limits access to constitutionally protected information that is available on the Internet at public libraries. The bill, introduced by Senator John McCain, the republican from Arizona, requires libraries to adopt acceptable use policies accompanied by technology that would block access to material harmful to minors.

This is obviously a very controversial issue. At one recent hearing about the Child Online Protection Act (COPA), a hearing that took place in California, one ALA representative testified that ALA members routinely review books and other material, including videos, music and magazines in order to determine which material is appropriate for their readers. They essentially filter material before it is placed on library shelves. And if it is deemed inappropriate, they block it. At this hearing, a COPA commissioner asked why the ALA does not want to do the same thing for information on the Internet. The only reply from the ALA representative: the information is different. Different is certainly one way to see it!

My question for you is: why should information that is available on the Internet be subject to less strict control than books or magazines or music or video? The material that is published on paper, whether in books or magazines or appears in video form, is scrutinized very carefully, and federal and state laws mandate that minors be prevented from obtaining some of this material. Why should information on the Internet be treated any differently? Why should we allow our children access to such material because it is different? We are not talking about book burning; we are simply questioning the controls in place for this new and easily accessible information source.

I believe that CIPA, COPA and COPPA, along with all the other acts proposed, or those that are already law, have not gone far enough. Our children are not adequately protected. And it is our job to address the issues that affect our children. We have a moral obligation to our future generations to protect them. In our society children mature sooner because of the myriad of instant communications available, unmonitored communication has contributed to the loss of innocence. We must protect our children, and not give the only voice on this subject to those who believe the right to free speech is more important than safety.

II. A Look at the History of Content Controls

In the mid-1990s, reports of the negative experiences that children were having on the Internet began to make headlines. At the 1994 Fall Comdex meeting, the National Center for Missing and Exploited Children and the Interactive Services Association issued Child Safety on the Information Highway, the first statement suggesting that parents should monitor their childrren internet activities. As any parent knows, Do’s and Don’ts lists simply do not work. Kids are curious, and whether intentionally or accidentally, will find their way to inappropriate material. If we also consider that an estimated 5 million new or renamed websites are put up every week, it’s easy to understand why it seems impossible to protect ourselves and our children from potentially destructive material. Another approach, limiting access by rating internet content thereby preventing children from accessing harmful content the way that movie theaters prevent children under age 17 from buying tickets to R rated movies has been ineffectual. Only about 150,000 websites, out of the hundreds of millions of web sites, have registered to rate themselves.

Several years ago, in response to concerns from the public, from parents, from educators, and from law-enforcement officers, congress and advocacy groups began to look for ways that the government could control children access to harmful material, a movement that culminated in the Communications Decency Act, an amendment to the Telecommunications Act of 1996.

At the same time that the ratings debate waged, companies began to develop filtering and monitoring software products. In 1996 there were just a few; by 1997 there were about 3 dozen and last year, there were more than 100 on the market. There are a variety of products available. Most rely on lists of URLs and then block access to sites that appear to contain pornographic material. If a user attempts to go to such a site, the user receives a message stating that access to this specific site is prohibited. Other applications filter the information on the Internet and look for keywords that indicate the site may contain material that is inappropriate for children. Essentially, the URL blocker blocks the entire site while the filter allows access to the site, but filters out the information that is inappropriate. Opponents say that these approaches overblock content, filtering out references to breast cancer, and to researchers who hold magna cum laude honors, and so on.

Most recently, several products that monitor user activities have been offered to the public. These applications do not block or filter, but rather promote the organization Acceptable Use Policy and monitor the computer user activities. If the user violates the organization Acceptable Use Policy by accessing pornographic or other inappropriate material, the systems administrator or other assigned person is notified. This approach is becoming increasingly popular because when an organization posts its Acceptable Use Policy, and its users know their computer use is being monitored, it puts the responsibility back in the user hands. In other words, if a user knows the Acceptable Use Policy, and he or she chooses to violate the policy, then presumably he or she is willing to suffer the consequences.

III. The Consortium for School Networking

In order to help schools understand the far-reaching on-line safety issues and comply with the Children’s Internet Protection Act, the Consortium for School Networking is providing updated resources related to Internet safety. At http://www.safewiredschools.org, school leaders and parents can find a downloadable PowerPoint presentation on factors they must consider for Internet protection. There is also a detailed compliance guide covering all of the requirements of CIPA legislation.

According to the CoSN, when a school decides to manage or monitor the content that their students can access via the Internet, they will need to consider a variety of issues. Among them: Local community and international standards, for the www is an international entity that knows no boundaries, the culture of the school district, the degrees of control that teachers and administrators want to retain, the extent to which teachers and other officials wish to be involved on an ongoing basis, and cost. School administrators will also have to decide whether rules will vary according to children’s ages.

Among the approaches that the CoSN outlines in its briefing:

1. Acceptable Use Policies. Whether or not a school ultimately decides to use a filtering, monitoring or blocking application, it should still have an Acceptable Use Policy which children are aware of before they go online. The National Center for Educational Statistics reported in May of 2001 that 98 percent of schools with Internet access had an Acceptable Use Policy in place. Typically a student and his or her parents will be asked to sign off on the policy at the beginning of the school year. The policy should spell out the consequences a student (or staff member) will face if the policy is violated.

2. Monitoring. School districts may opt to take the approach in which they gives students unlimited access, but monitor the sites that individual students (and staff) have accessed. This gives an administrator the opportunity to respond to a student/staff member who is spending too much time on sites that are obviously not school-related.

3. Blocking/Filtering. Filtering means allowing access to a restricted number of web sites. Access is either limited to a specific list of approved sites, or access is blocks to sites that are considered off limits. Someone ultimately has to decide which sites will be included on the list. Some teachers and school officials may want to retain complete control over that, but others will opt to have a third party manage the process for them.

4. Proxy Servers. Some school districts decide to install filtering software on the district proxy server. It can also be used as a firewall, providing protection from viruses as well as access by hackers and other outsiders.

5. Application Service Providers. This is a relatively new option, whereby a school district hires a company to manage the school’s computer applications from the company’s own servers.

6. Filtered Internet Access. Many Internet service providers that market to schools and families have adopted content controls of their own. Users can then decide whether or not to use the controls.

7. Portals and Search Engines. There are a growing number of search engines and portals aimed at the education market. In some cases the school can configure their system to go straight to that portal or search engine. Administrators will need to carefully consider how restrictive these portals actually are, and whether they allow children to access inappropriate sites though back door methods.

8. Green spaces. Proprietary networks or Intranets designed for children are sometimes referred to as green spaces. They are designed to create closed spaces where children can roam freely among content that has been deemed appropriate for them. Generally speaking, they provide access to a relatively small number of sites.

IV. The Problems Posed by the Internet Today

As is the Internet itself, the tools and solutions we have at our disposal for managing and monitoring content are constantly evolving. Sadly, so are the methods of Internet users and the abusers who prey on children. Blocking and filtering have historically offered adequate protection for our children, but that is no longer reality.

Access to inappropriate information on the Internet is now roughly 25% of the problem. The other 75% of the problem is the material that arrives via chat rooms, instant messaging, email and attachments. Adults whose objective is to do harm to unsuspecting children know that they can find them by way of these seemingly innocuous methods. Predators use email and attachments, instant messaging, and chats to obtain personal information, to send sexually harassing and hate documents; they even use applications such as Word or Notepad to write and send such material. Children unwittingly transport this information via floppy disks and CDs that can be viewed in the classroom. Or they develop personal web sites at home, sites that contain explicit or disallowed material that can be accessed from school. These new problems demand new solutions that can address the full spectrum of problems.

V. What the Future Holds: Filtering, Blocking and Monitoring Tools Available to Educators and Parents Today

As technology changes so must our concepts of the problems created by such changes. The World Wide Web is growing exponentially and is a resource that gives any user access to ANY information, and provides the opportunity for any user to communicate with anyone, anywhere, anytime. Regardless of who is checking or how they are checking content, the main problem still exists. The Internet is an instant visual communication tool that has a dark underbelly. Teachers and parents must be made aware of all the dangers, not just those which exist with web content but that which is present in the chat rooms, instant messaging, e-mail, attachments and applications. We need the tools that will allow us to prevent people with evil intent from gaining access to our children and doing them harm.

European schools are heavily invested in technologies to monitor internet activity including Policy Central from Security Software Solutions. A number of school districts in the United States are now monitoring internet activity rather than simple site blocking. To learn more about Policy Central and its usage in combating internet problems in school visit http://www.securitysoft.com


Youtube Results For Internet Security

“Phishing” Internet Security PSA

0.77 min. | 4.6666665 user rating
(Watch it in HD!) Are you aware you are being phished? That you may have recieved an imitation email or that you could be lured into a fake website? Billions of dollars are stolen every year through a deceptive tacktic called “Phishing.” A “phisher” sets up a look-alike website (of a bank, for example) and sends out legitimate looking emails to lure in victims. They then use these to trick the user into giving up sensative information. Always be carefull to check you are on the REAL website of any bank, store, or other important site. Always be wary of imitation emails asking for personal information. And never give out personal information if you are unsure about who you are giving it to. By taking care to check where you are online and who is actually contacting you in email, you can help eliminate the risk of falling victim to a phishing attack. This video was created by Crosshair Studios and Team Purps as a submission to the 2009 Computer Security Awareness competition presented by educause.edu More information about the contest can be found at: www.educause.edu

Yahoo Answers For Internet Security

Question Internet security?
which is the best internet security? i used to use kaspersky internet security. it was good. but i wanna change it.

The Best Answer Not sure there is a best–for all systems, all times, and all users.

Also, I am not a fan of all-in-one security packages.

You need a firewall, an antivirus program, and spyware protection (detection and removal at least; some provide real-time protection as well).

You can research alternatives at download.com. For each type, rank search results there by Cnet editors’ ratings and read their reviews for their best choices; also rank search results by users’ reviews, because editors don’t review everything. (To sort search results there, just click on the corresponding column head.)


Question Internet Security?
What do you need to do to get into internet security. Like tracking child predators online?

The Best Answer I just started a Masters program with Virginia College online for Cybersecurity. It’s been a tough course for me but definitely worth looking into.


Question internet security?
Does anyone know about internet security suite 2007? i got this free when I purchased my computer 3 months ago.My Norton antivirus has just expired so i wanted to know it the software I just mentioned above is any good.
Thanks

The Best Answer There are many programs under this name in the market like Norton internet security suit,
eTrust internet security suit,,
Panda internet security suit,
ZoneAlarm internet security suit,
McAfee and many others.

I recommend using McAfee internet security suit while you have other alternatives but it’s better to have the antivirus, firewall, spamkiller and antispyware come from the same vendor.

The most important fators regarding security suits are the included antivirus and firewall and from my experience I vote for McAfee and Kaspersky. Norton, Panda and AVG “free edition” in the school’s computer lab failed to detect a virus spreads via flash memory called “generic downloader”, while kaspersky succeeded to neautralize it on an infected system.

Just make sure to keep your security suit updated regularly.


Question What is the best internet security software?
I currently use kaspersky internet security 2010, however, I am thinking of switching when my license expires.

I am wondering what is the best current internet security software.

Some people say MSE/avast/windows firewall, but the reports I have seen say they are mediocre and ok for free but the commercial can be better.

It must have a 3 user license at least, preferably 5.

The Best Answer I use Avast , I have also got superantispyware and Malwarebytes. I recently changed to Comodo firewall which seems fine and I seem to boot up quicker. They are all free for personal use and I have had no trouble with Viruses Trojans Hackers etc. I also use Windows Defender from the Microsoft site. It is safe to use two anti-spy products but never use more than one A/V as it can cause conflicts. You should run A/V and anti spy weekly.
You will have to find the appropriate links as i am now getting violations each time I post a link. Seems like I have a troll.


Twitter Results For Internet Security

kemangibot (security bot) – Norton Internet Security/ Anti Virus 2011 18.1.0.37 http://bit.ly/9fzRKs


sukittakran (sukittakran) – McAfee Internet Security 2005 7.0 [VirusScan, Firewall, Spamkiller, Privacy, Parental Controls] [LB]: http://bit.ly/9U1Z6Q


Trackback URL

Sorry, comments for this entry are closed at this time.