SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Be secure, be aware.


Be Security Aware.

  Cyberstalking and
  Safety Tips for Social
  Networks
   B A H R A I N S E P T E M B E R 1 3 TH, 2 0 1 2




      Salah Khalifa @albinjassim
      Security Empowerment Consultant
AGENDA
AGENDA



   •Social Media
   •Cyberstalking
   •Social Media Safety Tips
   •QA.
SOCIAL MEDIA
SOCIAL MEDIA

• Social media is fun.
• Even though the service is free, there's
  the hidden cost of your privacy.
• While social networking sites may feel
  like an invitation-only gathering of
  friends, it's not necessarily a closed and
  safe universe.
• The impulse to share has caused many
  of us to unintentionally expose
  ourselves in ways that can compromise
  our safety and security.
• Cyber stalking ..
CYBERSTALKING
CYBERSTALKING

What is cyberstalking?

• It is technology-based “attack” on one person who has
  been targeted specifically for that attack for reasons of
  anger, revenge or control.
CYBERSTALKING
CYBERSTALKING CAN TAKE MANY FORMS


• Harassment, embarrassment and humiliation of the
  victim
• Harassing family, friends and employers to isolate the
  victim
• Scare tactics to instill fear and more.
CYBERSTALKING
 CYBERSTALKING IS NOT IDENTITY THEFT


• An identity thief, has a very specific goal in mind —
  financial gain.
• Identity thieves are unconcerned by the consequences of
  their behavior on the victim’s life,
• The actions of a cyberstalker are deliberate and focused
  on the consequences to the victim.
CYBERSTALKING
EFFECTS OF BEING CYBERSTALKED?

•   Angry
•   Annoyed
•   Anxious
•   Helpless
•   Depressed
•   Hopeless
•   Feelings of uncertainty and unpredictability
•   Trouble sleeping and concentrating
•   Weight instabilities (losing or gaining)
•   Loss of personal safety and security
SOCIAL NETWORKING SAFETY TIPS
Social Networking Safety Tips



•How do I Know You
•No Such Thing as Private
•Review Before Posting
•X Marks the Spot
•A Little Bird Told Me
•How Old Are You Now?
•Separate Work and Family
•It's Your Fault If It's Default
•You Play, You Pay...in Loss of Privacy

Weitere ähnliche Inhalte

Andere mochten auch

Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
Dampak negatif media sosial
Dampak negatif media sosialDampak negatif media sosial
Dampak negatif media sosial
pha_phin
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

Andere mochten auch (7)

Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
2017 Dubai School Fees (Infographic)
2017 Dubai School Fees (Infographic)2017 Dubai School Fees (Infographic)
2017 Dubai School Fees (Infographic)
 
2017 Abu Dhabi School Fees (Infographic)
2017 Abu Dhabi School Fees (Infographic)2017 Abu Dhabi School Fees (Infographic)
2017 Abu Dhabi School Fees (Infographic)
 
Dampak negatif media sosial
Dampak negatif media sosialDampak negatif media sosial
Dampak negatif media sosial
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Ähnlich wie Cyberstalking and safety tips for social networks

How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
alexclark-efc
 

Ähnlich wie Cyberstalking and safety tips for social networks (20)

Social Media Safety for K-8 audience
Social Media Safety for K-8 audienceSocial Media Safety for K-8 audience
Social Media Safety for K-8 audience
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
 
2012 students-good internet choices
2012 students-good internet choices2012 students-good internet choices
2012 students-good internet choices
 
2011 elementary students-making good choices online
2011 elementary students-making good choices online2011 elementary students-making good choices online
2011 elementary students-making good choices online
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Cyberbullying - Murat Kaplan.pptx
Cyberbullying - Murat Kaplan.pptxCyberbullying - Murat Kaplan.pptx
Cyberbullying - Murat Kaplan.pptx
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

Mehr von MarketingatBahrain

Mehr von MarketingatBahrain (20)

Social Media Strategic Planning Process
Social Media Strategic Planning ProcessSocial Media Strategic Planning Process
Social Media Strategic Planning Process
 
Getting started with social media strategic planning webinar
Getting started with social media strategic planning webinarGetting started with social media strategic planning webinar
Getting started with social media strategic planning webinar
 
Social Media Toolkit for Entrepreneurs
Social Media Toolkit for EntrepreneursSocial Media Toolkit for Entrepreneurs
Social Media Toolkit for Entrepreneurs
 
Social Media Strategies for Entrepreneurs
Social Media Strategies for EntrepreneursSocial Media Strategies for Entrepreneurs
Social Media Strategies for Entrepreneurs
 
The Evolution of Event Apps
The Evolution of Event AppsThe Evolution of Event Apps
The Evolution of Event Apps
 
Mobile for Business - This is the Q?
Mobile for Business - This is the Q?Mobile for Business - This is the Q?
Mobile for Business - This is the Q?
 
Utilizing Social Media for Events Marketing
Utilizing Social Media for Events MarketingUtilizing Social Media for Events Marketing
Utilizing Social Media for Events Marketing
 
Set up your Corporate Blo
Set up your Corporate BloSet up your Corporate Blo
Set up your Corporate Blo
 
Marketing your blog
Marketing your blogMarketing your blog
Marketing your blog
 
Content creation - Let us blog!
Content creation - Let us blog!Content creation - Let us blog!
Content creation - Let us blog!
 
Corporate blogging intro
Corporate blogging introCorporate blogging intro
Corporate blogging intro
 
Social Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business SeminarSocial Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business Seminar
 
The Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business SeminarThe Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business Seminar
 
Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar
 
Social Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business SeminarSocial Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business Seminar
 
Intro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business SeminarIntro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business Seminar
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
My love story
My love storyMy love story
My love story
 
Facebook & instagram case study in ksa
Facebook & instagram case study in ksaFacebook & instagram case study in ksa
Facebook & instagram case study in ksa
 
Growing Active Facebook Communities
Growing Active Facebook CommunitiesGrowing Active Facebook Communities
Growing Active Facebook Communities
 

KĂźrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

KĂźrzlich hochgeladen (20)

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Cyberstalking and safety tips for social networks

  • 1. Be secure, be aware. Be Security Aware. Cyberstalking and Safety Tips for Social Networks B A H R A I N S E P T E M B E R 1 3 TH, 2 0 1 2 Salah Khalifa @albinjassim Security Empowerment Consultant
  • 2. AGENDA AGENDA •Social Media •Cyberstalking •Social Media Safety Tips •QA.
  • 3. SOCIAL MEDIA SOCIAL MEDIA • Social media is fun. • Even though the service is free, there's the hidden cost of your privacy. • While social networking sites may feel like an invitation-only gathering of friends, it's not necessarily a closed and safe universe. • The impulse to share has caused many of us to unintentionally expose ourselves in ways that can compromise our safety and security. • Cyber stalking ..
  • 4. CYBERSTALKING CYBERSTALKING What is cyberstalking? • It is technology-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control.
  • 5. CYBERSTALKING CYBERSTALKING CAN TAKE MANY FORMS • Harassment, embarrassment and humiliation of the victim • Harassing family, friends and employers to isolate the victim • Scare tactics to instill fear and more.
  • 6. CYBERSTALKING CYBERSTALKING IS NOT IDENTITY THEFT • An identity thief, has a very specific goal in mind — financial gain. • Identity thieves are unconcerned by the consequences of their behavior on the victim’s life, • The actions of a cyberstalker are deliberate and focused on the consequences to the victim.
  • 7. CYBERSTALKING EFFECTS OF BEING CYBERSTALKED? • Angry • Annoyed • Anxious • Helpless • Depressed • Hopeless • Feelings of uncertainty and unpredictability • Trouble sleeping and concentrating • Weight instabilities (losing or gaining) • Loss of personal safety and security
  • 8. SOCIAL NETWORKING SAFETY TIPS Social Networking Safety Tips •How do I Know You •No Such Thing as Private •Review Before Posting •X Marks the Spot •A Little Bird Told Me •How Old Are You Now? •Separate Work and Family •It's Your Fault If It's Default •You Play, You Pay...in Loss of Privacy