Social Engineering -
Are you Cyber Savvy?

How do we protect ourselves when we are on the Internet?

Growing up in today's society is at once exhilarating and confusing.  We are learning to live life, with all of its curves, while we are forming our own character and personality.  We are learning to be interdependent and trying to define where and when to be dependent or independent.  All of this occurs as we encounter an intense amount of peer and social pressures coupled with physiological changes.

We are vulnerable to becoming exploited by Cliques, Cyber Bullies, Predators and succumbing to the addictive salve Visual Reality can offer us. 

Although our families can be the best of all families we have mixed emotions about communicating all that is occurring in our lives.  This could be due to loyalty to friends, maintaining confidences, thinking our family is too busy, thinking our family will never comprehend, our need for establishing independence, desire for privacy or other reasons.  We place a barricade to family intercommunication and alienate the very people who could help us place events into perspective.

We are susceptible to the Social Engineering strategy utilized by predators when they prey upon the innocent and naive.  Predators are adept at conning [using Social Engineering techniques] people into thinking they [the predator] are a trustworthy being.

What is Social Engineering? It is the art and science of getting people to comply with your wishes. It is accomplished without force, coercion or hypnosis and does not cause wild behaviourisms.  In respect to us and our families, it is when predators use our natural instinct to trust in an attempt to compromise our safety, security and well-being. 

It is placing ourselves into harm's way when we think we are invulnerable or less than worthy.  Common sense, wisdom, research and communication can go a long way to remaining safe and will help you enjoy a productive and fun time in life and on the Internet.

Instead of becoming impatient with a parent's lack of expertise with computers and the internet, take some time and help them understand and learn.  Encourage them to learn more so they can help you when you need their wisdom and guidance.  It will open the door for trust and  you can communicate with them on incidents that concern you.   It will have the additional feature of gaining their help when you are in the process of researching projects.
  • Be careful who you trust online and remember that online friends are really strangers. People online, no matter how long you have been talking to them or how friendly they are, may not be who they say they are.
  • Stay in charge in chat. Keep your personal information secret when chatting online (name, address, telephone number, mobile number, private email address, picture), even if people ask for this.
  • Check your profile and make sure it doesn’t include any personal information (name, address, telephone number, mobile number, private email address, picture).
  • Meeting someone you have only been in touch with online can be dangerous. If you feel that you ‘have to’ meet, then for your own safety you must tell your parent or caregiver and take them with you – at least on the first visit – and meet in a public place in daytime.
  • Tell your parent or caregiver if someone or something makes you feel uncomfortable or worried.

What are Cyber Bullies and how do I defend against them?

It is fun talking to my friends and being in demand . How much time do you spend chatting with a faceless, voiceless person compared to actual activities?

I said something on Instant Messenger.  Now my friends don't talk to me.

I met a really great guy/girl in a chat, in a game, on Instant Messenger.  How do you know they are who they say they are?  How do you know the picture is real?

Going away to College?  Have you thought about the laptop you will need for school?

Don't give out personal information on the internet or to people who are not close family friends.

Passwords should not be Pet's names, activities you enjoy, or anything that can be ascertained by asking you a few friendly questions.


  • Creating a safe Computer and Internet access environment for the family
  • Basic computer configuration
  • The basics of safe surfing.
  • Social Engineering signals to look for.
  • AntiVirus/Firewall/Spyware remover
  • Cyber Bullies
  • Predators
  • When Virtual reality becomes more important than life activities

Dolphmera Solutions


 Home ] Dolphmera Solutions ] Contact Us ] Social Engineering ] Definitions ] Informative Links ] Parents ] [ Youth ]

This website is protected by copyright © 1996 Dolphie and its licensors. All rights reserved.
A link is included on each page for non-author created graphics used, if required.
Last Update: 10/21/2005 11:24:29 AM