IT Services Secure IT Online Security at Home
Online Security at Home
- 黑料网
- JCU Global Experience
- International Students
- Open Day
- How to apply
- Pathways to university
- Virtual Open Day
- Living on Campus
- Courses
- Publications
- Scholarships
- Parents and Partners
- JCU Heroes Programs
- Aboriginal and Torres Strait Islander in Marine Science
- Elite Athletes
- Defence
- AI@JCU
- Current Students
- New students
- JCU Orientation
- LearnJCU
- Placements
- CEE
- Unicare Centre and Unicampus Kids
- Graduation
- Off-Campus Students
- JCU Job Ready
- Safety and Wellbeing
- JCU Prizes
- Professional Experience Placement
- Employability Edge
- Art of Academic Writing
- Art of Academic Editing
- Careers and Employability
- Student Equity and Wellbeing
- Career Ready Plan
- Careers at JCU
- Partners and Community
- Alumni
- About JCU
- Reputation and Experience
- Chancellery
- Governance
- Celebrating 50 Years
- Academy
- Indigenous Engagement
- Education Division
- Graduate Research School
- Research and Teaching
- Research Division
- Research and Innovation Services
- CASE
- College of Business, Law and Governance
- College of Healthcare Sciences
- College of Medicine and Dentistry
- College of Science and Engineering
- CPHMVS
- Anthropological Laboratory for Tropical Audiovisual Research (ALTAR)
- Anton Breinl Research Centre
- Agriculture Technology and Adoption Centre (AgTAC)
- Advanced Analytical Centre
- AMHHEC
- Aquaculture Solutions
- AusAsian Mental Health Research Group
- ARCSTA
- Lions Marine Research Trust
- Australian Tropical Herbarium
- Australian Quantum & Classical Transport Physics Group
- Boating and Diving
- Clinical Psychedelic Research Lab
- Centre for Tropical Biosecurity
- Centre for Tropical Bioinformatics and Molecular Biology
- CITBA
- CMT
- Centre for Disaster Solutions
- CSTFA
- Cyclone Testing Station
- The Centre for Disaster Studies
- Daintree Rainforest Observatory
- JCU Eduquarium
- JCU Turtle Health Research
- Language and Culture Research Centre
- MARF
- Orpheus
- TESS
- JCU Ideas Lab
- TARL
- eResearch
- Indigenous Education and Research Centre
- Estate
- Work Health and Safety
- Staff
- Discover Nature at JCU
- Cyber Security Hub
- Association of Australian University Secretaries
- Services and Resources Division
- Environmental Research Complex [ERC]
- Foundation for Australian Literary Studies
- Gender Equity Action and Research
- Give to JCU
- Indigenous Legal Needs Project
- Inherent Requirements
- IsoTropics Geochemistry Lab
-
IT Services
- Student IT Essentials
- Staff IT Essentials
- Help and Support
- Stay Informed
-
Secure IT
- Choosing a strong Password
- Cyber Security Hub
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- Multi-Factor Authentication (MFA)
- Student Systems
- IT Service Catalog
- About
- JCU Webinars
- JCU Events
- JCU Motorsports
- JCU Sport
- Library
- Mabo Decision: 30 years on
- Marine Geophysics Laboratory
- Office of the Vice Chancellor and President
- Outstanding Alumni
- Pharmacy Full Scope
- Planning for your future
- Policy
- PAHL
- Queensland Research Centre for Peripheral Vascular Disease
- Rapid Assessment Unit
- RDIM
- Researcher Development Portal
- Roderick Centre for Australian Literature and Creative Writing
- Contextual Science for Tropical Coastal Ecosystems
- State of the Tropics
- Strategic Procurement
- Student profiles
- SWIRLnet
- TREAD
- TropEco for Staff and Students
- TQ Maths Hub
- TUDLab
- VAVS Home
- WHOCC for Vector-borne & NTDs
- Media
- Copyright and Terms of Use
- Australian Institute of Tropical Health & Medicine
- Pay review
It is natural to be concerned about the well-being of children using the internet. In addition to ensuring they follow the good advice covered here - kids need to be aware of the dangers, talk to them about these issues and encourage them to be alert.
Good Practice:
Make sure you know what sites your children are visiting online.
Ensure that children get your approval before downloading software or apps.
Educate your kids not to provide ANY personal information to people they meet online - not even their name.
Monitor your kid’s online interactions - the people they are talking to may not be who they claim to be.
Consider installing parental lock software, or better still consider placing the computer in a shared space (such as the living room).
The Queensland Police, amongst others, have useful information regarding risks posed to children over the internet. Kids are often naive when it comes to computer use - behaviour that would trigger 'stranger danger' in person, may not get the same reaction from your child when online.
Make sure you children know, never to provide personal information (and especially not photos) to anyone, unless you (the parent) have met and verified the identity of the person face to face.
Security on Social Networking Sites
The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces additional risks, so you should take precautions.
DO
Check your security settings for you profile and ensure only the information you want to be released is made public.
Only log into the website or service by typing the address into your browser.
DON’T
Use your social media account details to log onto a 3rd party website or App. Create a separate account on that website with a unique password.
Post information you don’t want to be in the public domain, you don’t know when the service might change its terms and conditions and make your information public.
Wireless Security
Wireless internet access poses a number of risks, the most concerning of these is others using your access without permission. Additional risks include: theft of internet bandwidth (you probably pay for access); contamination of your computer by someone using your wireless without your authorisation and theft of private information.
Perhaps the scariest potential risk with unauthorised access to your wireless network, is what someone could do with that access. They could be involved with child exploitation, illegal software downloads or computer hacking. When the authorities track this activity, it will trace back to YOU (your wireless access point) - this could make for an interesting discussion with authorities.
On your computer make sure you always turn your wireless adapter off when not in use. On your access point, enable encryption, WEP is weak (but better than nothing) and WPA2 is stronger. Allow only a certain set of MAC addresses to connect to the router and don't broadcast your SSID.