Internet Safety

By John Sonnen, Director of Technology, Child Safety Network

Computer interconnectivity has produced enormous benefits but has also enabled criminal activity that exploits this interconnectivity for financial gain and other malicious purposes, such as Internet fraud, child exploitation, identity theft, and terrorism. Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats, (U.S. Government Accountability Office, 2007)

The Internet can give identity thieves, hackers, and scammers online access to your computer, financial and personal information and more. Stop.Think.Click: 7 Practices for Safer Computing (OnGuard Online, 2007)

Additionally, today’s mobile devices are well integrated with the Internet and have far more functionality than mobile phones of the past. They are increasingly used in the same way as personal computers, potentially making them susceptible to similar threats affecting computers connected to the Internet. Cyber Threats to Mobile Devices :(U.S. Computer Emergency Readiness Team, 2010)

For youths, the Internet often serves as a positive and powerful arena for socializing and learning. However, the use of the Internet also brings about risks to their safety, including the dangers of sexual solicitation, online harassment and bullying, and exposure to illegal content. Enhancing Child Safety and Online Technologies: Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States (Berkman Center for Internet & Society at Harvard University, 2008)

By discussing responsible socializing and communicating, parents — regardless of whether they are technologically savvy — can help their kids make better decisions about online behavior. Net Cetera:’s Internet Safety Campaign for Children – A Report to Congress (Federal Trade Commission, 2010))

Efforts to address cybercrime include activities associated with protecting networks and information, detecting criminal activity, investigating crime, and prosecuting criminals. Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats (U.S. Government Accountability Office, 2007)

The Administration has taken significant steps to better protect America against cyber threats. Fact Sheet: The Administration’s Cybersecurity Accomplishments (White House, 2011)

Additionally, the U.S. Department of Homeland Security launched the “Stop. Think. Connect.” campaign, a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. National Cybersecurity Awareness Campaign, (U.S. Department of Homeland Security, Retrieved September 2012)

About John Sonnen

As VP of Technology & CSO, Mr. Sonnen is responsible for designing, building, and securing the servers and network which store and deliver all CSN on-line content. Mr. Sonnen has held numerous network design and data security positions including Network & Telecommunications Manager for DataQuick, Western Telecommunications Manager for Lockheed Martin Corporation, and Infrastructure Engineer for B. F. Goodrich Aerospace. Mr. Sonnen holds numerous professional certifications including CCNA and CISSP, and is an active member of the SANS Institute (System Administration and Security Institute). He has designed, built, and administered some of the most secure and sensitive systems and information in the world for over 25 years. Mr. Sonnen has also been a volunteer for the Child Safety Network for over 8 years, building and securing web servers and networks which deliver child health and safety information to parents and children throughout the United States.