Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child...

17
Stuart Bannerman

Transcript of Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child...

Page 1: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

Stuart Bannerman

Page 2: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

Child SafetyCyberbullying

cyberbullying information

Predatory adultsChild Exploitation and Online Protection Centre

Offensive material

Advice on protecting children from inappropriate material

Page 3: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

MalwareVirusesWormsTrojansRootkitsSpywareAdwareCrimeware

Page 4: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

VirusesComputer programs that can reproduce

themselves and infect computersAttach themselves to existing programsHave to be activated by computer userCause ‘unexpected, usually negative, events’

Page 5: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

WormsReproduce themselves automaticallyNo user activation requiredCan disable services on the computer

Page 6: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

TrojansNon-replicatingLooks like something usefulOnce installed, allows others access to your

computer

Page 7: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

RootkitsProgram designed to conceal malware

Page 8: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

SpywareCollects information about userCan change browser home pageCan disable services

Page 9: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

AdwareSoftware that displays adverts, with or

without consent

Page 10: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

Software that displays adverts, with or without consentWell-known adware programs/programs distributed with adware

180SearchAssistant AOL Instant Messenger Ask.com Toolbar (Toolbar is automatically installed with many

different programs, even after you uncheck Ask.com during the installation process.)

Bearshare Bonzi Buddy ClipGenie Comet Cursor Crazy Girls Cydoor Daemon Tools - (Software comes bundled with the "Daemon Tools

WhenUSave Toolbar" but can be unchecked during installation)

DivX DollarRevenue eBike Insurance eCar Insurance eVan Insurance Ebates MoneyMaker ErrorSafe Evernote FaceGame.exe Foxit PDF Reader FlashGet Gamespy Gamevance

Gator Gool.exe Kazaa Kiwee Toolbar Messenger Plus! Live - (Software comes bundled with adware, but

can be unchecked during installation) MessengerSkinner Mirar Toolbar Oemji Toolbar PornDigger! Smiley Central Spotify - (A subscription can be paid to remove ads.) Tribal Fusion Viewpoint Media Player VirusProtectPro Vuze WeatherBug WhenU WinAce (now with MeMedia AdVantage) Windows Live Messenger Winzix Yahoo! Messenger Zango Zango Toolbar Zwinky

Page 11: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

CrimewareDesigned to steal identityThen takes funds or carries out unauthorised

transactionsNorton has a specific tool to detect it

Page 12: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

Card fraudAdvice on avoiding card fraud

Page 13: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

PhishingMasquerading as financial institution in order

to obtain account details

Page 14: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.
Page 15: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

Consumer affairsCitizens Advice produce guides to your rights

when buying on-line

Citizens Advice factsheet on buying over the web

Citizens Advice factsheet on buying on auction sites

Page 16: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.

SpamSpam is unsolicited (junk) emailIt is usually directed into a special folder

Page 17: Stuart Bannerman. Child Safety Cyberbullying cyberbullying information Predatory adults Child Exploitation and Online Protection Centre Offensive material.