Social Engineering
Are you Cyber Savvy?

How do we protect our children when they are on the Internet?

 
Social Engineering is a strategy utilized by predators when they prey upon the innocent and naive.  Predators are adept at conning [using Social Engineering techniques] people into thinking they [the predator] are a trustworthy being.

In today’s era of Internet access and computers, it often feels like our children are treading in unsafe waters without us. Even if we were there, we would not know what to look for to keep them safe.

If we know anything about computers, it is minimal compared to what our children know. Our knowledge is usually either non-existent or outdated.

Couple the above with a lack of knowledge about Internet access and we feel lost or inept/incompetent during a crucial period of our children’s development. A time when they need us to be aware and one step ahead of them.

We see in the headlines about children being abducted, injured, killed by people they met on the internet.

Most schools require computer and internet access in order for children to complete their homework assignments. Our children need to be proficient in current technology to be successful in their social, academic and, eventually, career paths.

We observe our children's personality changing dramatically and we are not sure if it is due to the teenage maturation process or if it due to some other issue.  Are they using the victim of a cyber bully?  Are they too involved in instant messaging?  Have they become addicted to Internet activities at the expense of living life to the fullest?

We also hear about children who get into trouble on the internet for trespassing where they should not and/or for harassing others.

Of course, our children would never do that. Or would they? Do you KNOW who they are hanging out with on the internet or what they are doing?

How can we protect our children in an area we are ill-informed in? What do we do and how do we do it?

Should we use programs that monitor our children's activities and chats?

Should we go through our children’s private chats?

Should we insist upon meeting the people our children interact with?

When are we being a conscientious parent and when are we invading our children’s privacy?


Checklist for parents

Guidelines for parents

 

    
    

Highlights

  • Creating a safe Computer and Internet access environment for the family
  • Activity/chat monitoring programs
  • The basics of safe surfing.
  • Danger signals to look for.
  • Sites with information on Child safe websites.
  • Cyber Bullies
  • Virtual reality is more important than life activities
  • Computers in open areas vs bedrooms
  • Open communication
  • Education and awareness

 

  

Dolphmera Solutions

 
   

 Home ] Dolphmera Solutions ] Contact Us ] Social Engineering ] Definitions ] Informative Links ] [ Parents ] Youth ]

This website is protected by copyright © 1996 Dolphie and its licensors. All rights reserved.
A link is included on each page for non-author created graphics used, if required.
Last Update: 10/21/2005 11:24:29 AM