Social Engineering -
Are you Cyber Savvy?
we protect ourselves when we are on the Internet?
|Growing up in today's society is
at once exhilarating and confusing. We are
learning to live life, with all of its curves, while we
are forming our own character and personality. We
are learning to be interdependent and trying to define
where and when to be dependent or independent. All
of this occurs as we encounter an intense amount of peer
and social pressures coupled with physiological changes.
We are vulnerable to becoming exploited by Cliques,
Cyber Bullies, Predators and succumbing to the addictive
salve Visual Reality can offer us.
Although our families can be the best of all families
we have mixed emotions about communicating all that is
occurring in our lives. This could be due to
loyalty to friends, maintaining confidences, thinking
our family is too busy, thinking our family will never
comprehend, our need for establishing independence,
desire for privacy or other reasons. We place a
barricade to family intercommunication and alienate the
very people who could help us place events into
We are susceptible to the Social
Engineering strategy utilized by predators when
they prey upon the innocent and naive. Predators are adept at conning
[using Social Engineering techniques] people into
thinking they [the predator] are a trustworthy being.
What is Social Engineering? It is the art and science of getting people to comply with your wishes. It is accomplished without force,
coercion or hypnosis and does not cause wild behaviourisms.
In respect to us and our families, it is when predators
use our natural instinct to trust in an attempt to
compromise our safety, security and well-being.
It is placing ourselves into
harm's way when we think we are invulnerable or less
than worthy. Common sense, wisdom, research and
communication can go a long way to remaining safe and
will help you enjoy a productive and fun time in life
and on the Internet.
Instead of becoming impatient
with a parent's lack of expertise with computers and the
internet, take some time and help them understand and
learn. Encourage them to learn more so they can
help you when you need their wisdom and guidance.
It will open the door for trust and you can
communicate with them on incidents that concern you.
It will have the additional feature of gaining their
help when you are in the process of researching
- Be careful who you trust online
and remember that online friends are really
strangers. People online, no matter how long you
have been talking to them or how friendly they are,
may not be who they say they are.
- Stay in charge in chat. Keep
your personal information secret when chatting
online (name, address, telephone number, mobile
number, private email address, picture), even if
people ask for this.
- Check your profile and make sure it
doesn’t include any personal information
(name, address, telephone number, mobile number,
private email address, picture).
- Meeting someone you have only been in
touch with online can be dangerous. If you
feel that you ‘have to’ meet, then for your own
safety you must tell your parent or caregiver and take
them with you – at least on the first visit – and
meet in a public place in daytime.
- Tell your parent or caregiver if
someone or something makes you feel uncomfortable or
What are Cyber
Bullies and how do I defend against them?
It is fun talking to my friends and being in demand . How much time do
you spend chatting with a faceless, voiceless
person compared to actual activities?
I said something on Instant Messenger. Now my friends don't
talk to me.
I met a really great guy/girl in a chat, in a game, on Instant
Messenger. How do you know they are who they
say they are? How do you know the picture is
Going away to College? Have you thought about the laptop
you will need for school?
Don't give out personal information on the internet or to people
who are not close family friends.
Passwords should not be Pet's names, activities you enjoy, or
anything that can be ascertained by asking you a
few friendly questions.
- Creating a safe Computer and Internet access environment for the family
- Basic computer configuration
- The basics of safe surfing.
- Social Engineering signals to look for.
- AntiVirus/Firewall/Spyware remover
- Cyber Bullies
- When Virtual reality becomes more important than life activities