School as a space for a safe Internet: expectations and reality

    How do you protect your organization’s server from incoming traffic that could harm the mental and physical health of the child? If this question is not surprising, then you are working in the education system and starting from September 1, 2012, your educational institution has an incoming traffic administration system.


    According to laws 436-ФЗ “On protecting children from information harmful to their health and development” and 114-FZ “On countering extremist activity”, any information that promotes so-called “anti-humanistic” values ​​- all kinds of addictions, violence, is prohibited for children to view cruelty, any form of discrimination, extremism, pornography.
    In the process of learning, to ensure that immature minds are not allowed to socially negative materials on the Web should, in fact, be an educational institution in accordance with the Law on Education. In this connection, the responsibility of administrators is to create a clearly structured administration system that includes monitoring and accounting for data requested and received on the school’s server from the Internet.

    Remember the old Russian fairy tale in which Alyonushka asked her young relative not to drink drinks of unknown origin. An adult and experienced girl understood what trouble would happen to her brother. But, because of his age, the young lad did not understand this, and Alyonushka, besides words, had no other leverage. Today, thousands of Alyonushki schools are trying to block the troubled waters of the Internet using all available means and methods.
    A significant amount of sites required to be blocked was formed by the censor in the person of Roskomnadzor in connection with the application of Law 139-FZ and entered into the “Unified Register” of sites prohibited in the Russian Federation. To protect the system from the resources specified in this list, first of all, it is necessary to configure automatic filtering for incoming / outgoing traffic using filter programs of the typeTraffic Inspector ; should also be able to configure a proxy server. A high-quality filter program automatically regularly updates the list of sites in accordance with the Registry.
    But here, administration encounters a confrontation between the Law and developers of illegal Internet content. The latter, in order to remain on the Web, have to go to a number of tricks, such as: create “mirrors” of the sites entered in the Registry, as well as use subdomains.

    And here is the real situation about the prosecutor’s check in an educational institution. The inspector manages to find through the search engine mirror sites of resources recognized by the court as extremist. It must be said that checks on precisely sites of a nationalist nature that propagandize mass protests and extreme leftist views have now been tightened due to the entry into force on February 1 of the current year of the amendment to the law "On Information, Information Technologies and the Protection of Information." So, resources were opened from a computer that were recognized by the relevant regional courts as unacceptable for children to see in the Russian Federation: a site with poems by Nikolai Fedorov “Miracles-Yuda” and a resource containing the full text of the leaflet “Last Wishes to the Ivanes”, as well as a site with scenes of executions and torture.


    A program is installed on the organization’s server that allows you to configure filtering of the requested sites according to the forbidden list of URLs, so when the request was made through the address bar, the sites were blocked. However, when requesting information through a search engine, links were found to mirror sites, which, respectively, opened:; , as well as .
    Therefore, it is advisable to add a content analysis module, in addition to the filter program, a plug-in that analyzes texts, site content and, depending on your settings, blocks or redirects to the site you need.

    The administration of Internet content using the content analysis plugin, at a minimum, includes checking all requests received on the server against a ready-made resource database with questionable content, broken down by category. All content arriving at the server is divided into categories and is filtered accordingly. It is also crucial that the database is constantly updated and in line with the Register of Prohibited Sites approved by Roskomnadzor.
    As a maximum, such a program should have the ability to manually configure user rules - rules whose parameters are completely set by the administrator. You yourself can set up rules by which inappropriate content will be “cut off” by setting a key phrase in the plugin’s settings, forbidden words, etc.
    Blocking is done by IP address, subnet, domain name, line item, file format and size, as well as regular expressions. All requested and incoming information passes through a proxy server that filters out the content depending on your settings.
    You can configure blocking according to the “black” (everything is allowed - except for what is forbidden) or the “white” list (everything that is not allowed - is forbidden) of forbidden / allowed sites.

    Currently successful experience in administering servers and local workstations in educational institutions shows that traffic is filtered according to the “white list” plus the use of custom content blocking depending on the category of the site and its content. With appropriate configuration of the program, everything that does not correspond to the list of allowed sites is automatically blocked by the filter program, plus manually configured content analysis of the installed plug-in rejects unwanted content. Content analysis plugins like NetPolice work through a proxy server.
    The experience of administration has accumulated rich and comes to the point that you have to look at the daily requested traffic and replenish the addresses of banned sites manually, because, unfortunately, content analyzers can not give a 100% guarantee. So, a considerable number of Ivanushki will fall into the hands of Baba Yaga, for which they will ask from Alyonushka.

    In our case, an instruction was issued to the educational institution with the wording: "violation of the law on countering extremist activities and the law" On Education ", and the requirement to eliminate access to these sites.
    In any case, what should be done when sites with "bad" content open during the verification process? First of all, indicate that the system takes into account the data of the Registry using a filter module - your task is to show that mirror sites are open, and their addresses are not registered in the Registry. The list of resources from the state registry in the program is by default or it can be taken from the sites: for the URL list and for IP list of resources.

    Also popular now: