share
google Cyber Attack Prevention | Master Internet Safety Checklist | iPredatortwitter Cyber Attack Prevention | Master Internet Safety Checklist | iPredatorfacebook Cyber Attack Prevention | Master Internet Safety Checklist | iPredatorlinkedin Cyber Attack Prevention | Master Internet Safety Checklist | iPredatortumblr Cyber Attack Prevention | Master Internet Safety Checklist | iPredatorprint Cyber Attack Prevention | Master Internet Safety Checklist | iPredatoremail Cyber Attack Prevention | Master Internet Safety Checklist | iPredator


MASTER CYBER ATTACK PRVENTION CHECKLIST IPREDATOR INC IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

MASTER INTERNET SAFETY CHECKLIST

Cyber Attack Prevention | Master Internet Safety Checklist

Below are a compilation of cyber attack prevention and risk items compiled from the iPredator Internet Safety Checklists (IISC) developed by iPredator Inc. founder, Dr. Michael Nuccitelli. Feel free to download the entire list by scrolling to the bottom of the webpage and clicking on the green pdf/print button. No personal information is required to download and iPredator Inc. never requires personal information unless you are purchasing their internet safety products and services. Given that most online users will not find all the checklist segments applicable to their lifestyle, the goal is to correctly score 90% or better.

Attached for immediate download, at no cost, is iPredator Inc.’s iPredator Bridge Warning Signs Checklist (IBWSC.) Use this checklist to assess if an associate, loved one or peer is behaving in an odd or suspicious manner related to their online usage. If the person you are assessing scores 5 or more on the 50 item IBWSC, the probability they are engaging in nefarious online activities is likely. To download, simply click on the IBWSC image and the PDF file will open for download.

Feel free to investigate Dr. Nuccitelli’s checklists and inventories compiled over the last four years of intensive research. Of the 39 assessments, 13 of the checklists (Abr.) are abridged versions of the other tools and are considerably less expensive. These tools are the same as the full versions, but do not include the scoring keys, scoring categories or the list of internet safety dynamics that Dr. Nuccitelli used in his development of the iPredator theoretical construct.

Whereas the full assessment versions cost $199.95-$399.95, the abridged versions cost $29.95-$49.95. The scoring key for the abridged assessments can be viewed here in the scoring key page: https://www.ipredator.co/products/scoring-keys/

250PX IPREDATOR INC STALKS CYBERSPACE HUNTING ONLINE CHILD PREDATORS STAND DOWN IPREDATOR Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

IPREDATOR INTERNET SAFETY CHECKLISTS-ABR PAGE

https://www.ipredator.co/products/checklists-abr/

IPREDATOR INTERNET SAFETY CHECKLIST-ABR SCORING KEY PAGE

https://www.ipredator.co/products/scoring-keys/

IPREDATOR INTERNET SAFETY CHECKLISTS/INVENTORIES PAGE

https://www.ipredator.co/inventories-checklists/

IPREDATOR SOCIAL MEDIA SAFETY ASSESSMENT PAGE

https://www.ipredator.co/product/social-media-safety/

IPREDATOR PROTECTED MEMBERSHIP PAGE

https://www.ipredator.co/product/ipredator-protected-membership/ 

IPREDATOR INC. PROFESSIONAL SERVICES PAGE

https://www.ipredator.co/services/      

5PV IPREDATOR THEORETICAL CONSTRUCT INFORMATION AGE MODEL IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

(click image to visit page)

CHECKLIST DIRECTIONS

iPredator Internet Safety Checklists (IISC)

1. To complete the checklist, you are required to respond to each statement with 1 of 4 choices as follows:

  • A. Y__ (Yes, Agree, True)
  • B. N__ (No, Disagree, False)
  • C. IDK__ (I Do Not Know, I Did Not Know, I Am Unsure)
  • D. DNA__ (Does Not Apply, Not Applicable, Not Relevant)

3. Only answer “Yes” or “No” to statements you are positive about or almost certain in your decision with minimal doubt.

4. If there is a statement you do not understand, respond with choice D. DNA__ (Does Not Apply, Not Applicable, Not Relevant).

5. If there is a statement that does not apply to you or the subject being queried, respond with choice D. DNA__ (Does Not Apply, Not Applicable, Not Relevant). For example, if a checklist statement discusses mobile devices, but you do not own a mobile device, you would respond with choice D. (Does Not Apply, Not Applicable or Not Relevant).

Prior to taking the checklist, please review the two definitions listed below and refer back to them as needed. The definition of Information and Communications Technology (ICT) and iPredator is as follows:

ICT: Information and Communications Technology (ICT) is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. ICT stresses the role of unified communications and the integration of telecommunications, which enable users to create access, store, transmit and manipulate information. ICT consists of all forms of telecommunication, information technology, broadcast media, audio and video processing, transmission and network based control and monitoring functions. Information and Communications Technology (ICT) is a concept incorporating all electronic and digital forms of communication.

iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology (ICT.) iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using Information and Communications Technology (ICT.) Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of Information and Communications Technology (ICT) to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT.) These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using Information and Communications Technology (ICT) in an abstract electronic universe.

All the checklists are designed to assess the subject’s internet safety acumen, cyber attack awareness, cyber security practices and general understanding of knowing how to protect oneself in today’s digital device environment. Scoring well does not require the respondent to be an advanced information technology professional. If anything, being advanced in electronic devices can give some a false sense of security. Few people score 95% and higher on their first attempt as we are all living at the beginning of a new paradigm called, the Information Age. Michael Nuccitelli Psy.D., iPredator Inc.

ADULT BULLYING CYBERBULLYING CYBERSTALKING IPREDATOR IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

AISC & AISC ABR

ADULT INTERNET SAFETY CHECKLIST

(correct responses are yes, true or agree)

1. Your email addresses, instant messaging usernames and links to personal homepages cannot be connected to your home address or exact identity.

2. You do not announce your physical location via status updates on GPS-enabled applications.

3. You never leave a logged in computer unattended for extended periods.

4. You know what “digital footprint” means and actively monitor it.

5. You have not shared private information to a now ex-friend or ex-intimate partner online.

6. You practice caution what you share or post online.

7. You protect all your online images from strangers being able to view or download them.

8. You have segmented your personal life from your work or career persona as a digital reputation control measure.

9. You know what digital reputation means and monitor ICT to make sure you have a positive digital reputation.

10. You know your images can remain in cyberspace for years and information you post or share online may be impossible to delete.

11. You have a mobile device or phone that does not have information that is embarrassing and/or sensitive.

12. You are careful about posting your personal information online and know why it is important related to your digital reputation.

13. You refrain from “sexting” and know it can be criminal if the subject being “sexted” about is a minor.

14. You have not shared private information to a now ex-friend online and concerned about what they will do.

15. You work to have a positive “digital reputation” or know how to create a positive “digital reputation.”

16. You know the images and videos you post online can remain in cyberspace for years.

17. You know sensitive and/or sexual information you share online may be impossible to delete.

18. You know “sexting” involving you or friends can be shared with others without your consent.

19. You know not to have sexual conversations with someone you met online.

20. You always review the privacy and security settings at social media sites (i.e. Facebook, MySpace) you have joined.

CYBER ATTACK PREVENTION IPREDATOR IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

BISC & BISC-ABR

BUSINESS INTERNET SAFETY CHECKLIST

(correct responses are yes, true or agree)

1. The business is ICT safe from hackers and checked regularly for updates.

2. The business is ICT safe from viruses and checked regularly for updates.

3. The business is ICT safe from malware and checked regularly for updates.

4. The business is ICT safe from a mobile device cyber-security breach and checked regularly for updates.

5. The business has a formal written internet security policy.

6. The business engages in internet safety training.

7. The business’s ICT get automatic software and security updates.

8. The business knows what is needed to prevent a security breach of sensitive information.

9. The business protects sensitive company data on mobile devices.

10. The business monitors how employees interact with social media.

11. The business checks for new cybercrime protection products and services.

12. The business monitors sensitive online information and knows the value to a cyber criminal.

13. The business knows the consequences of using the Internet in an unsafe manner.

14. The business tracks social networking sites employees visit during downtime at the job location.

15. The business is educated on safe online practices.

16. The business diversifies the company ICT passwords.

17. The business knows how to combat the latest cyber threats.

18. The business is safe from a loss of data.

19. The business is safe from customer and financial information theft.

20. The business is safe from loss of employee or financial data.

CYBERBULLYING CYBERBULLYING LAWS CYBER HARASSMENT IPREDATOR IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

CBAC & CBAC-ABR

CYBER BULLY ABUSER CHECKLIST

(correct responses are no, false or disagree)

1. Peers and/or adults have described the child/student as impulsive.

2. Peers and/or adults have described the child/student as hotheaded.

3. Peers and/or adults have described the child/student having a dominant personality.

4. Peers and/or adults have described the child/student lacking empathy.

5. Peers and/or adults have described the child/student having difficulty conforming to rules.

6. Peers and/or adults have described the child/student having a low frustration tolerance.

7. Peers and/or adults have described the child/student having a positive attitude toward violence.

8. Peers and/or adults have described the child/student being physically aggressive.

9. Peers and/or adults have described the child/student as gradually decreasing their interest in school.

10. The child/student has reported to peers or adults a lack of parental warmth and involvement.

11. The child/student has reported to peers or adults their parents being overly permissive.

12. The child/student has reported to peers or adults their parents being excessively harsh with discipline.

13. The child/student has reported to peers or adults their parents being excessively harsh with physical punishment.

14. The child/student has been reported by peers or adults to not identify with the emotions or feelings of others.

15. The child/student has reported to peers or adults a positive attitude toward violence.

16. The child/student has been exposed to models of bullying/cyber bullying.

17. In school, the child/student has been reported by peers or adults as having a lack of supervision during breaks.

18. In school, the child/student has been reported by peers or adults as having unsupervised interactions between different grade levels during breaks.

19. The child/student has been reported by peers or adults to be indifferent towards teacher attitudes on bullying/cyber bullying.

20. The child/student has been reported by peers or adults to be indifferent towards student attitudes on bullying/cyber bullying.

THINK INFORMATION AGE AND USE INTERNET SAFETY TOOLS IPREDATOR IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

CBTC & CBTC-ABR

CYBER BULLY TARGET CHECKLIST

(correct responses are no, false or disagree)

1. The child/student has reported to peers or adults being taunted online.

2. The child/student has reported to peers or adults being maliciously teased online.

3. The child/student has reported to peers or adults being joked about by others online.

4. The child/student has reported to peers or adults being repeatedly teased about their physical attributes by others online.

5. The child/student has reported to peers or adults being repeatedly teased about their race or religious faith by others online.

6. The child/student has reported to peers or adults being sexually teased by others online.

7. The child/student has reported to peers or adults having their personal belongings taken by others who tease them online.

8. The child/student has reported to peers or adults having rumors spread about them online.

9. The child/student has reported to peers or adults having been socially excluded by others online.

10. The child/student has reported to peers or adults being a victim of extortion online.

11. The child/student has reported to peers or adults being a victim of repeated intimidation online.

12. Peers or adults have described the child/student as lacking social support from others online.

13. Peers or adults have described the child/student as having minimal means of support during cyberbullying episodes.

14. Peers or adults have described the child/student as being rejected within their established peer group online.

15. Peers or adults have described the child/student as being non-aggressive and often shy evidenced by their ICT activities.

16. Peers or adults have described the child/student as having difficulty being proactive against being teased or harassed online.

17. The child/student has reported less likely reporting being cyberbullied given they perceive their school or classroom is tolerant of bullying.

18. The child/student has reported to peers or adults being unable to appropriately handle cyberbullying situations whether they are the victim or a bystander.

19. The child/student has reported to peers or adults their school does not have an open-door policy for all students.

20. The child/student has reported to peers or adults their school does not clearly identify adults to whom cyberbullying incidents are reported.

CYBERCRIME IDENTITY THEFT IPREDATOR IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

CCPC & CCPC-ABR

CYBER CRIME PROTECTION CHECKLIST

(correct responses are yes, true or agree)

1. All Information and Communications Technology is safe from hackers and checked regularly for updates.

2. All Information and Communications Technology is safe from viruses and checked regularly for updates.

3. All Information and Communications Technology is safe from malware and checked regularly for updates.

4. All Information and Communications Technology is safe from a mobile device cyber security breach and checked regularly for updates.

5. You, your loved ones or business have a formal or informal written Internet security plan.

6. You, your loved ones or business participates in Internet safety training or education.

7. All Information and Communications Technology gets automatic software and security

updates.

8. You, your loved ones or business regularly inspects what information you have and what is needed to protect it.

9. You, your loved ones or business regularly inspects how to store and protect data on mobile devices.

10. You, your loved ones or business do not share personal information on social networking sites.

11. You, your loved ones or business regularly assesses what new privacy settings you may need at social networking sites.

12. You, your loved ones or business are aware of the information you put online and the potential value to a cyber criminal or cyber terrorist.

13. You, your loved ones or business review bank and credit card statements regularly.

14. You, your loved ones or business is aware of what websites and social networking sites are being visited during downtime at the workplace or at your home.

15. You, your loved ones or business are educated on safe online practices.

16. You, your loved ones or business have up to date antivirus software that monitors viruses, worms and other types of malicious programs.

17. You, your loved ones or business are prepared to combat the latest cyber threats.

18. You, your loved ones or business are safe from a loss of data and checked regularly.

19. You, your loved ones or business are safe from loss of customer or personal information and regularly inspected.

20. You, your loved ones or business have guidelines or rules on how long to store online documents.

CYBER STALKING CYBER BULLYING STATISTICS IPREDATOR IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

CSPC & CSPC-ABR

CYBER STALKING PREVENTION CHECKLIST

(correct responses are yes, true or agree)

1. You, your child, a loved one or employee ignore being “flamed” (provocative or angry online message.)

2. You, your child, a loved one or employee has a genderless screen name.

3. You, a loved one or employee post minimal personal information online.

4. You, your child, a loved one or employee knows your state cyberstalking, cyberbullying and cyber harassment laws.

5. You, your child, a loved one or employee refrain from posting a home address online.

6. You, your child, a loved one or employee password protects all ICT with secure passwords that are difficult to guess.

7. You, your child, a loved one or employee regularly change passwords and secret questions on all ICT accounts.

8. You, your child, a loved one or employee are always suspicious of incoming emails, telephone calls or text messages that ask for personal identifying information.

9. You, your child, a loved one or employee never gives out a Social Security Number or financial information to unknown online entities.

10. You, your child, a loved one or employee use stat counters to record all incoming traffic to your blogs and websites.

11. You, your child, a loved one or employee regularly check the status of your credit reports regarding online transactions.

12. You, your child, a loved one or employee have computers and mobile devices regularly checked for spyware.

13. You, your child, a loved one or employee refrains from sharing contact information in e-mail, IM, text, Twitter and chat room messages.

14. You, your child, a loved one or employee are extremely cautious about meeting online acquaintances in person.

15. You, your child, a loved one or employee makes sure your ISP and Internet Relay Chat (IRC) networks have an acceptable use policy prohibiting cyberstalking.

16. You, your child, a loved one or employee know to log off and contact local law enforcement if a situation online becomes hostile.

17. You, your child, a loved one or employee know to save all communications for evidence if cyberstalked or harassed.

18. You, your child, a loved one or employee know to keep records of contacts with internet system administrators and law enforcement if cyberstalked or harassed.

19. You, your child, a loved one or employee know how to block or filter messages from a potential cyberstalker or harasser.

20. You, your child, a loved one or employee know to report a cyberstalker or harasser to an Internet Service Provider (ISP.)

CYBER TYGER BLACK AND WHITE BLUE STRIPPED SYMBOL Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

IPREDATOR GOOGLE PLUS LINKS

[VISIT, JOIN & SHARING APPRECIATED]



HOMEPAGE BUTTON IPREDATOR INTERNET SAFETY IMAGE Cyber Attack Prevention | Master Internet Safety Checklist | iPredator

share
google Cyber Attack Prevention | Master Internet Safety Checklist | iPredatortwitter Cyber Attack Prevention | Master Internet Safety Checklist | iPredatorfacebook Cyber Attack Prevention | Master Internet Safety Checklist | iPredatorlinkedin Cyber Attack Prevention | Master Internet Safety Checklist | iPredatortumblr Cyber Attack Prevention | Master Internet Safety Checklist | iPredatorprint Cyber Attack Prevention | Master Internet Safety Checklist | iPredatoremail Cyber Attack Prevention | Master Internet Safety Checklist | iPredator