Online Safety in a Foreign Language - Connecting with Teens
The inescapable dangers of our increasingly connected world are likely most threatening to our young adults. Teens, especially, see social media and related online platforms as inextricable from their public and private personas. These digital natives have grown up being comfortable with sharing all aspects of their lives with the Internet - without the healthy suspicion and caution of those who have seen the technology grow over the years. The importance of protecting our teenage Internet denizens apparent, it falls to parents, teachers, and industry professionals to effectively educate this group. What follow are tested methods and associated research on relating to and informing teenagers so they might understand and properly mitigate the risks they face. Importantly, this paper explores these topics in a way that doesn't overstate the dangers or attempt to upheave the norms of communication so organic to this generation.
38080 (PDF, 3.99MB)
16 Oct 2017Related Content
Structural Vulnerability: Autodesk Revit Server WAN Exposure Versus Cost of Autodesk Construction Cloud
Research PaperAutodesk Revit Server, a critical collaboration tool in the architecture, engineering, and construction (AEC) industry, was designed to operate within trusted networks.
- 7 Nov 2025
Privacy Protections: Are Stronger Laws Changing What We Reveal?
Research PaperAs U.S. states enact privacy laws aimed at giving consumers more control over their personal data, little is known about whether privacy legislation influences individuals’ willingness to disclose their identity on public platforms.
- 26 Sep 2025
Forensic Investigation of Bluetooth-Based Credit Card Skimmers
Research PaperHidden Bluetooth Low Energy (BLE) credit skimmers are a growing threat to credit card fraud. Criminals can set up practical and inexpensive systems built on top of modules, such as the HM-19, to collect and transmit stolen data covertly across wireless channels.
- 3 Sep 2025
A Pebble In the Ocean: Maximizing Log Fidelity In Container Environments
Research PaperLog fidelity is crucial for Incident Response Teams to investigate and contain cyber incidents but...
- 17 Apr 2025
Unveiling the Dependency on Network Telemetry: Optimizing Lateral Movement Detection
Research PaperThis study investigates the dependency on network and endpoint telemetry for identifying lateral...
- 17 Jan 2025
Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success
Research PaperIdentification of phishing emails can be cumbersome, accomplished by rule-based filters, machine...
- 7 Jan 2025
Revolutionizing Enterprise Security: The Exciting Future of Passkeys Beyond Passwords
Research PaperAs digital threats grow increasingly sophisticated, traditional password-based authentication...
- 23 Dec 2024
- Rich Greene
Protecting the Poor: A Deep Dive into EBT Skimming and Solutions to Combat It
Research PaperElectronic Benefits Transfer (EBT) cards provide individuals receiving government assistance for...
- 23 Dec 2024
The Open-Source Trap: Unraveling Open-Source Threats in the Software Supply Chain
Research PaperThe risk to the software supply chain is increasingly clear, as breaches like SolarWinds, Equifax,...
- 5 Dec 2024
Hook, Line, and Sinker: The Best Free Tools to Catch Phishing
Research PaperPhishing has become a widespread threat that organizations and IT security teams face daily. As...
- 5 Dec 2024
SANS 2024 State of ICS/OT Cybersecurity
Research PaperThis white paper, SANS Certified Instructor Jason Christopher explores the growing trends in cyber...
- 9 Oct 2024
- SANS Institute
Shining a Light on AI: Ensuring Vendor Transparency in Data Sourcing and Delivery
Research PaperAmidst the proliferation of AI solutions, the focus lies in evaluating transparency, undisclosed...
- 29 Jan 2024
Building a Resilient Offensive Security Strategy
Research PaperIn this white paper, SANS Certified Instructor Matt Bromiley explores the results of our survey that...
- 13 Oct 2023
- Matt Bromiley
Really, How Bad Do Routers Have It?
Research PaperIn recent years, the United States government has warned the public that state-sponsored cyber...
- 22 Feb 2023
Inoculating the Masses: Evaluating Cybersecurity Awareness Training
Research PaperLike a disease, cybercrime is spreading across the world. The sums of money lost to these criminals...
- 22 Sep 2022
Building an Intelligent, Automated Tiered Phishing System: Matching the Message Level to User Ability
Research PaperPhishing campaigns and the procedures to run them have remained unchanged since the dawn of the...
- 12 Jan 2022
Expired Domain Dumpster Diving
Research PaperEvery day 200,000 domains expire ("DomCop FAQ," n.d.), become available for purchase and possible...
- 1 Sep 2021
Information Security Starts with the Employees
Research PaperOrganizations continue to spend exorbitant budgets to combat the issue of insider threat with one...
- 8 Jul 2021
A Swipe and a Tap: Does Marketing Easier 2FA Increase Adoption?
Research PaperData breaches and Internet-enabled fraud remain a costly and troubling issue for businesses and home...
- 19 Nov 2018
Complement a Vulnerability Management Program with PowerShell
Research PaperA vulnerability management program is a critical task that all organizations should be running. Part...
- 10 Aug 2017
