国产视频

In Short

Lessons from a Cybersecurity Mom

My suggestion as a parent and cybersecurity expert: lie

Cybersecurity Mom

It鈥檚 a pretty normal weeknight evening at our house. Logan, our 14 year-old, is on the couch playing Minecraft. She鈥檚 building what looks like a hundred-story mansion made of glass and gold, trading resources with other online players to complete her project. Logan鈥檚 younger brother Rex, who鈥檚 in second grade, is creating virtual robots on his Leap Pad, his little sister Nadine, in kindergarten, is waiting patiently for a turn. Or at least, that鈥檚 what it looks like from the Internet鈥檚 perspective.

In reality, our oldest isn鈥檛 named Logan, and she isn鈥檛 14. Same with Rex鈥娾斺妕hat鈥檚 not his real name, and he鈥檚 not in second grade. Nadine doesn鈥檛 even exist (but you might鈥檝e gathered that by the fact that a kindergartner was waiting patiently for a Leap Pad). These are all pseudonyms used by our children to protect their personal information online.

So in this case, I鈥檓 obligated to teach them how to take their own protective measures.

Educational technology pervades deeply into domestic life. Games are online, and learning resources are connected via the Internet. Even the most Luddite parent will soon realize that homework often happens online, and elementary school computer labs aren鈥檛 self-contained. Given the reality of our kids鈥 online lives, how do we best protect them? That question has become even more important recently, as the latest high-level breaches of children鈥檚 personal data often include not just names, but photos, answers to security questions, instant message conversations, and other deeply personal information.

My suggestion as a parent and cybersecurity expert: lie. Yes, lying runs counter to the normal parenting paradigm that we should always鈥娾斺奱lways!鈥娾斺妕each our kids to tell the truth. But given the spread of sensitive information online鈥娾斺妛hether by voluntary submission or unintended breach鈥娾斺妋y responsibilities as a parent are more complicated than that. I don鈥檛 know whether or not the Leap Pad is storing Rex鈥檚 sensitive data, and I don鈥檛 have any control over how they treat that data (whether or not it鈥檚 encrypted, for example). I don鈥檛 know whom Logan might be talking to in the Minecraft world. So in this case, I鈥檓 obligated to teach them how to take their own protective measures.

Kids’ tech encourages so much personal data sharing. For their personal protection, we need to teach them to take a step back and ask not only 鈥渨hy?鈥 but 鈥渨hat happens if my information is exposed?鈥

But I don鈥檛 want to approach the topic as boldly with the kids as I do here. I don鈥檛 want 鈥渓ie to protect your personal information online鈥 to turn into 鈥渓ie to protect yourself at any time.鈥 Logan may consider the fact that she didn鈥檛 finish her book report to be personally sensitive information, but it鈥檚 not going to affect her safety or future credit rating. (It will, however, affect what she鈥檚 doing this weekend.)

Instead, before the kids connect a new device or create a new online account, we ask them to create an 鈥渙nline secret identity,鈥 like a spy. The new identity should be close enough to their own that the educational content is appropriate鈥娾斺奿f the identity of 鈥淩ex鈥 is 16 years old, the math games will be too difficult and my actual child won鈥檛 benefit鈥娾斺奲ut these synthetic identities should never use their real names, ages, birthdates, names of pets, or any other personally identifiable information. We talk about it over dinner, creating a backstory, so that in the rush to connect a new gadget, no personal information leaks out. Kids’ tech encourages so much personal data sharing. For their personal protection, we need to teach them to take a step back and ask not only 鈥渨hy?鈥 but 鈥渨hat happens if my information is exposed?鈥 I don鈥檛 want to frighten the kids away from connecting online (although given the allure, that might not be possible), but I want to enable them to make good decisions and protect themselves as they venture out into the online world. And then when they see me log into my Pinterest account as Larry, a 44 year-old accountant from Cleveland, they鈥檒l know that I too have a secret online identity.


Jamie Winterton is the Director of Strategy for ASU鈥檚 Global Security Initiative, where she specializes in creating novel solutions for multifaceted and disparate problem spaces that relate to global security. She is a at 国产视频.

This post is part of Humans of Cybersecurity, a dedicated section on Context that celebrates stories of the people and ideas that are are changing our digital lives. It is part of 国产视频鈥檚 Women in Cybersecurity Project, which seeks to dramatically increase the representation of women in the cybersecurity/information security field by fostering strategic partnerships with industry leaders, producing cutting-edge workforce research, and championing women鈥檚 voices in media. This is a project of 国产视频鈥檚 broader Cybersecurity Initiative, which aims to clarify and connect the often disjointed debates and policies that surround the security of our networks.

More 国产视频 the Authors

Jamie Winterton
Lessons from a Cybersecurity Mom