Kids and the Internet - Parental Control made easy. Christian Donner



Similar documents
Evaluation Guide. Powerful & Immediate Business Web Security via the Cloud

Full version is >>> HERE <<<

Inspection of Encrypted HTTPS Traffic

Zscaler Internet Security Frequently Asked Questions

REGULATORY OPTIONS TO FACILITATE THE ADOPTION OF INTERNET PARENTAL CONTROLS PUBLIC CONSULTATION RESPONSE FROM NETSWEEPER INC.

Network Configuration Settings

Direct or Transparent Proxy?

Automatic Hotspot Logon

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

HomeNet. Gateway User Guide

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

How to train your Browser Controller

Product Manual. Administration and Configuration Manual

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

USG40HE Content Filter Customization

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

NEFSIS DEDICATED SERVER

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

SSC Getting rid of the biggest drag on VoIP!

The current case DNSChanger what computer users can do now

App Orchestration 2.0

ISA Server Plugins Setup Guide

MailFoundry Users Manual. MailFoundry User Manual Revision: MF Copyright 2005, Solinus Inc. All Rights Reserved

Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009

7 6.2 Windows Vista / Windows IP Address Syntax Mobile Port Windows Vista / Windows Apply Rules To Your Device

SSL VPN Technical Primer

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

Firewalls, Tunnels, and Network Intrusion Detection

Document No. FO1004 Issue Date: Draft: Work Group: FibreOP Technical Team July 23, 2013 Final: Single Static IP Customer Owned LAN Router Support

Get Started Guide - PC Tools Internet Security

Web Security Firewall Setup. Administrator Guide

Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.

Core Protection Suite


escan SBS 2008 Installation Guide

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

ZTE Australia Help Guides MF91

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

How To Get The Most Out Of Your From Your Mail Server (For A Small Business)

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Home Internet Filter User Guide

User Guide. You will be presented with a login screen which will ask you for your username and password.

SSL User Authentication with the HTTP Security Server

Firewall Environments. Name

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

+27O.557+! RM Auditor Additions - Web Monitor. Contents

Chapter 8 Router and Network Management

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Filter Avoidance and Anonymous Proxy Guard

SonicOS 5.9 One Touch Configuration Guide

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper

How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication

Off Site Access PPD IT How to Guides December 2010

How-to: HTTP-Proxy and Radius Authentication and Windows IAS Server settings. Securepoint Security System Version 2007nx

Appendix D: Configuring Firewalls and Network Address Translation

Configuring Your Gateman Proxy Server

Fireware How To Authentication

Using a Firewall General Configuration Guide

Configuring a customer owned router to function as a switch with Ultra TV

Using DC Agent for Transparent User Identification

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

AccessEnforcer. HTTPS web filter overview

20/20 Insight and WebResponse Whitelist & Settings Information

Zenprise Device Manager 6.1.5

vcloud Director User's Guide

Avira Managed Security AMES FAQ.

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

D3 TECHNOLOGIES SPAM FILTER

Figure 41-1 IP Filter Rules

Test Case 3 Active Directory Integration

The Secure Web Access Solution Includes:

Building Effective Firewalls with MikroTik P R E S E N T E D B Y: R I C K F R E Y, N E T W O R K E N G I N E E R I P A R C H I T E C H S O P E R AT I

AVG Business SSO Connecting to Active Directory

Migration Manual (For Outlook Express 6)

FortKnox Personal Firewall

SuperLumin Nemesis. Administration Guide. February 2011

Symantec Hosted Mail Security Getting Started Guide

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

How to Prevent Children from Browsing Improper Web Page within the Time Limit Step 1: Get the MAC Address of the Computer that Children Use

Barracuda Spam&Virus Firewall v5.1 a Web Filter v5.0 Nové funkce, pluginy a uživatelská vylepšení. Jiří Blažek, Product Manager

ThreatSTOP Technology Overview

FiOS Quantum TM. Gateway GUEST WI-FI SETUP GUIDE FOR BUSINESS CUSTOMERS

Transcription:

Kids and the Internet - Parental Control made easy Christian Donner

Setting the bar What is your level of experience with computers and the internet? What are you expecting to take away from this class? 2009 Christian Donner 2

Types of threats, and possible responses Overuse no time limit, or time limit being ignored Time Control Time control is a separate problem that is relatively easy to solve Content violence, porn, Malware viruses, back doors, and trojans Sexual predators on the web chat rooms, Myspace, Web Filter Web filters are try to prevent access to potentially harmful web addresses. 2009 Christian Donner 3

Goals of technology use in parental control Support, not replace traditional controls, such as Providing detailed verbal instructions Setting time limits (can be enforced with technology) Making computer use an open activity by not allowing a computer in the child s bedroom Encouraging self-control (by gradually switching older children from controlling to monitoring) 2009 Christian Donner 4

Technology primer How the web works IP Address unique identifier for every station connected to the web Domain optional, the portion of a Universal Resource Locator (URL) that identifies a web page DNS Domain Name System, a directory that maps a domain to an IP address Access control only works in conjunction with these technologies 2009 Christian Donner 5

Domain Name Resolution (DNS) cdonner.com DNS Server DNS Lookup (provider-specific, or 3 rd party, E.g. Open DNS) 65.98.16.186 DNS Server Response is IP address Web Server 65.98.16.186 GET http:// www.cdonner.com/ HTTP/1.0 2009 Christian Donner 6

Important concepts White-listing Defining allowed sites Black-listing Defining blocked sites Proxy server A separate server can analyze and filter traffic in real-time More detailed control and monitoring possible 2009 Christian Donner 7

Different age groups have different needs Determined by Ability to read and type Ability and desire to use a computer alone Curiosity and desire to browse new sites Peer pressure and coolness factor 2009 Christian Donner 8

First steps with parent 5 to 7 years Computer controlled by a parent Common space (kitchen, etc) Parent at computer or nearby Parent selects online/offline applications Few hand-picked applications or web sites Parental control: not required 2009 Christian Donner 9

Learning alone 7 to 10 years Computer not always controlled by parent Child may own a computer Computer use in common space may not be enforceable Few web sites (10-50) and few applications, hand-picked by parent Parental control: White-listing is ok 2009 Christian Donner 10

Autonomous use 10 to 15 years Computer not controlled by parent Child has own computer Computer use without parents present Number of sites/applications not limited Parental control: Black-listing Child will find many ways to circumvent the filters (mobile phone, friend, open wireless networks, etc) 2009 Christian Donner 11

Internet Content Rating (ICRA) Self-regulation effort of the porn industry to avoid (US) government regulation Web pages are tagged with content rating codes Browsers can use rating to interpret and filter content Used by commercial tool vendors, e.g. http://www.cybersitter.com http://www.cyberpatrol.com http://www.netnanny.com Effectiveness and value questionable May not have much of a future E.g. go to Hustler.com, click on Parental Blocking in the page footer: several of the subsequent links are broken 2009 Christian Donner 12

Monitoring Respect your child s privacy Build an environment of trust Use monitoring only as a last resort, if there is other evidence of abuse Very computer-literate children will find software that is installed on their computer to track their activities Network-based monitoring (router, firewall, other computer) are less intrusive 2009 Christian Donner 13

Effectiveness A (subjective) comparison of tools Bubble Size = Value Microsoft Family Safety Firewall (OpenDNS) Firewall (blacklisting) Firewall (whitelisting) DNS-based filtering Paid commercial solutions Ease of Configuration 2009 Christian Donner 14

3 Hands-on setup examples Firewall with white-listing ActionTec (Verizon Fios Router) Blunt tool, but readily available OpenDNS Free managed DNS service Simple and effective Microsoft Windows Live Family Safety Comprehensive solution with Windows-integration Best for computers shared by family members with different security profiles 2009 Christian Donner 15

Verizon FIOS Router (ActionTec) White-listing and/or time control White-listing is suitable for younger children (up to 10 to 12 years, depending on computer proficiency) 2009 Christian Donner 16

OpenDNS Free service User-managed white-listing via 3 rd party DNS Very simple setup and configuration Ad-funded Privacy concerns DNS-based solutions can be circumvented by using the IP address directly, but Many larger sites redirect the browser, triggering subsequent DNS look-ups Many smaller sites require host headers; HTTP requests with only an IP address are rejected Some routers (i.e. Netgear WNR2000) work with OpenDNS and make it more difficult to bypass the protection 2009 Christian Donner 17

OpenDNS configuration 2009 Christian Donner 18

OpenDNS blocked page 2009 Christian Donner 19

Windows Life Family Safety 2009 Christian Donner 20

How does it work? 2009 Christian Donner 21

Centralized Fine-Grained Control 2009 Christian Donner 22

Windows Live Family Safety Pros Better protection than URL filters IP addresses are also blocked, not just the URL Searches are blocked, even on Youtube (95% reliable) Email requests allow remote approval, while you are at work for instance Browser-independent Reports online Cons Setup is complicated Requires Windows Live ID and online configuration Children need a Windows Live ID as well A lot of information is being disclosed to Microsoft Windows and Playstation only Lots of false positives annoy parents 2009 Christian Donner 23

Limitations Managed black-lists, including commercial solutions and OpenDNS, depend on employee editors or crowd-sourcing for content labeling There is always a time lag between the appearance of bad content and when it is blacklisted Youths may be capable of setting up VPN tunnels or connect remotely to each other computers, bypassing all of the methods discussed here for filtering and monitoring. I.e. parental control has technical and systemic limits 2009 Christian Donner 24

Selected links Windows Live Family Safety Blogs http://familysafety.spaces.live.com/ OpenDNS http://www.opendns.com/solutions/homenetwork/ Netgear WNR2000 ($80) http://www.amazon.com/gp/product/b001azp8ew FOSI http://www.fosi.org/icra/ 2009 Christian Donner 25

Thank you! Visit http://www.medfieldblogs.net to download this slide deck 2009 Christian Donner 26