SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Secure SocialSecure Social
NetworkingNetworkingWhat is it and how to protect yourself and your childrenWhat is it and how to protect yourself and your children
Osaid To’meh
OverviewOverview
• What is Social Networking?
• The Good, the Bad and the Ugly
• How to protect yourself
• How to protect your children
What is SocialWhat is Social
Networking?Networking?
 Wikipedia
 A social network service focuses on building online
communities of people who share interests and/or
activities, or who are interested in exploring the interests
and activities of others.
 National Cyber Alert System
 “Social networking sites…build on the concept of
traditional social networks where you are connected to
new people through the people you already know.”
 “Friend of a Friend”
More definitionsMore definitions
 Web 2.0 – technology that “allows users to interact
with others and to change website content, in
contrast to non-interactive websites that are limited
to passive viewing of information.” (Wikipedia)
 Examples: social networking sites, video sharing sites, blogs, etc.
 Facebook & MySpace – free-access social
networking websites
 Twitter – “micro” blog – 140 characters or less
 Blog – shared on-line journal
 Video Sharing Sites – YouTube, Flikr
 Podcast – audio broadcast that can be
downloaded
The Good, the bad andThe Good, the bad and
the Uglythe Ugly
• The Good
o Networking
o Communicating
o Reconnecting with old friends
o Keeping up with family
o Business marketing and promotion
• i.e., TCU on Facebook, Twitter
o Entertaining and fun
Virginia Tech exampleVirginia Tech example
 After shooting rampage in 2007, campus in
lockdown mode, phone lines jammed,
website overloaded – students, faculty, staff
used “…MySpace and Facebook to get in
touch with family and friends outside
traditional channels.”
 Also used to “…send condolences, share
memories and gain closure.”
*SC Magazine, article “Social Anxiety”, page 21,
August 2009.
The Bad and the uglyThe Bad and the ugly
 Personal information could get in the wrong
hands.
 Phishing scams, viruses and spyware may
spread through social networks.
 Once you’ve posted something, others can
copy it or it may exist in cache, so that even
if you delete it, it may still exist and is out of
your control.
 Anti-social? If you spend all your time on the
computer.
More bad and uglyMore bad and ugly
• Internet provides sense on anonymity.
• Lack of physical contact may give false
sense of security.
• People may post information for friends to
read, forgetting that others may see it.
ExamplesExamples
 The case of a person asking for
emergency money while impersonating
a Facebook user to her friends.
 http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on-
facebook/
 Also the British MI6 chief that was
exposed by his wife’s Facebook pictures:
 http://www.dailymail.co.uk/news/article-1197562/MI6-chief-
blows-cover-wifes-Facebook-account-reveals-family-holidays-
showbiz-friends-links-David-Irving.html
How can you protectHow can you protect
yourself?yourself?
 Keep private information private
 Do not post address, ssn, phone number, financial info, your
schedule, full birth date
 Be careful not to display information used to answer security
questions (e.g., favorite pet, mother’s maiden name)
 Use caution when you click links
 Be careful about installing extras on your site
 Be wary of unknown friends (strangers)
 Google yourself
 Don’t blindly connect
 Trust your gut instinct
Protect yourself continuedProtect yourself continued
 Use and maintain anti-virus software
 Use strong passwords
 Don’t use the same password for a social
networking site and for your email
 Remember - social networking sites are a public
resource – like a billboard in cyberspace
 Evaluate sites privacy settings
 Lock down your profile information to people you accept as a friend.
That way no one can read your personal information unless they are an
approved friend.
protect your childrenprotect your children
“It’s 10 p.m., do you know where your
children are?”
 “And who they are talking to online?”
Age limits on some social networking sites
Facebook and MySpace open to people 13 and older
Twitter open to all
Protect Your ChildrenProtect Your Children
(continued)(continued)
 Talk to children about online safety
 Tell them to keep personal information
private
 Explain what personal information is (address, ssn, phone
number, schedule, birth date, etc.)
 And to not share personal information of their family or
their friends either.
 Caution them about sharing information such as school
name, sports teams, where they work, hang out or other
info that can be used to identify or locate them offline.
Protect your childrenProtect your children
(continued)(continued)
 More talking points
 Warn them to only be “friends”
with people they actually know
and are friendly with in real life.
 Talk to them about bullying
 Remind them that once they post information online, just
because they delete it, it might not be really gone.
 Warn about dangers of flirting with strangers online. Warn
about online sex talk.
 Tell them to trust their gut if suspicious.
Protect your childrenProtect your children
(continued)(continued)
 Keep the computer in an
open area, like the kitchen
or family room.
 Use the Internet with your
kids.
 Create a Facebook or MySpace
profile
 Be one of their “friends”
 Let your kids know that you are there
 Teach them how to act as they
socialize online
Protect your childrenProtect your children
(continued)(continued)
• Check their profile
o Check the privacy settings
o Review their list of friends
o Make sure their screen name doesn’t say too
much about them. It may be dangerous to use
full name, age or hometown.
Any Question?
Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for ParentsJamie Tubbs
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldProjectsByJen.com
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital erabns_library
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Pogled kroz prozor
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsDave Tinker, CFRE
 

Was ist angesagt? (20)

Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for Parents
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 

Andere mochten auch

Update on health workforce agencies
Update on health workforce agenciesUpdate on health workforce agencies
Update on health workforce agenciesC4WI
 
198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimiS. Zenbilci
 
D4E1 leeshulp montageplan
D4E1 leeshulp montageplanD4E1 leeshulp montageplan
D4E1 leeshulp montageplanbrownsuga288
 
CfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsCfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsC4WI
 
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013C4WI
 
Types of databases based on data structure
Types of databases based on data structureTypes of databases based on data structure
Types of databases based on data structureOsaid To'meh
 
Insights into future skills and competences
Insights into future skills and competencesInsights into future skills and competences
Insights into future skills and competencesC4WI
 
Planning your workforce for future uncertainty
Planning your workforce for future uncertaintyPlanning your workforce for future uncertainty
Planning your workforce for future uncertaintyC4WI
 
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationCfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationC4WI
 
Trend analysis presentation
Trend analysis presentationTrend analysis presentation
Trend analysis presentationwiechmanna
 

Andere mochten auch (17)

Update on health workforce agencies
Update on health workforce agenciesUpdate on health workforce agencies
Update on health workforce agencies
 
198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi
 
D4E1 leeshulp montageplan
D4E1 leeshulp montageplanD4E1 leeshulp montageplan
D4E1 leeshulp montageplan
 
Pennsylvania law
Pennsylvania lawPennsylvania law
Pennsylvania law
 
CfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsCfWI conference 2012 poster finalists
CfWI conference 2012 poster finalists
 
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
 
Hack.privacy
Hack.privacyHack.privacy
Hack.privacy
 
Types of databases based on data structure
Types of databases based on data structureTypes of databases based on data structure
Types of databases based on data structure
 
MBI inventario de burnout
MBI inventario de burnoutMBI inventario de burnout
MBI inventario de burnout
 
New first amendment
New first amendmentNew first amendment
New first amendment
 
Pandora
PandoraPandora
Pandora
 
Insights into future skills and competences
Insights into future skills and competencesInsights into future skills and competences
Insights into future skills and competences
 
Planning your workforce for future uncertainty
Planning your workforce for future uncertaintyPlanning your workforce for future uncertainty
Planning your workforce for future uncertainty
 
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationCfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
 
4th amendment
4th amendment4th amendment
4th amendment
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 
Trend analysis presentation
Trend analysis presentationTrend analysis presentation
Trend analysis presentation
 

Ähnlich wie Secure social networking

Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 ParentsAaron Puley
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundStephanie Barnhart
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 

Ähnlich wie Secure social networking (20)

CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Digitize Me
Digitize MeDigitize Me
Digitize Me
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 Parents
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Secure social networking

  • 1. Secure SocialSecure Social NetworkingNetworkingWhat is it and how to protect yourself and your childrenWhat is it and how to protect yourself and your children Osaid To’meh
  • 2. OverviewOverview • What is Social Networking? • The Good, the Bad and the Ugly • How to protect yourself • How to protect your children
  • 3. What is SocialWhat is Social Networking?Networking?  Wikipedia  A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others.  National Cyber Alert System  “Social networking sites…build on the concept of traditional social networks where you are connected to new people through the people you already know.”  “Friend of a Friend”
  • 4. More definitionsMore definitions  Web 2.0 – technology that “allows users to interact with others and to change website content, in contrast to non-interactive websites that are limited to passive viewing of information.” (Wikipedia)  Examples: social networking sites, video sharing sites, blogs, etc.  Facebook & MySpace – free-access social networking websites  Twitter – “micro” blog – 140 characters or less  Blog – shared on-line journal  Video Sharing Sites – YouTube, Flikr  Podcast – audio broadcast that can be downloaded
  • 5. The Good, the bad andThe Good, the bad and the Uglythe Ugly • The Good o Networking o Communicating o Reconnecting with old friends o Keeping up with family o Business marketing and promotion • i.e., TCU on Facebook, Twitter o Entertaining and fun
  • 6. Virginia Tech exampleVirginia Tech example  After shooting rampage in 2007, campus in lockdown mode, phone lines jammed, website overloaded – students, faculty, staff used “…MySpace and Facebook to get in touch with family and friends outside traditional channels.”  Also used to “…send condolences, share memories and gain closure.” *SC Magazine, article “Social Anxiety”, page 21, August 2009.
  • 7. The Bad and the uglyThe Bad and the ugly  Personal information could get in the wrong hands.  Phishing scams, viruses and spyware may spread through social networks.  Once you’ve posted something, others can copy it or it may exist in cache, so that even if you delete it, it may still exist and is out of your control.  Anti-social? If you spend all your time on the computer.
  • 8. More bad and uglyMore bad and ugly • Internet provides sense on anonymity. • Lack of physical contact may give false sense of security. • People may post information for friends to read, forgetting that others may see it.
  • 9. ExamplesExamples  The case of a person asking for emergency money while impersonating a Facebook user to her friends.  http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on- facebook/  Also the British MI6 chief that was exposed by his wife’s Facebook pictures:  http://www.dailymail.co.uk/news/article-1197562/MI6-chief- blows-cover-wifes-Facebook-account-reveals-family-holidays- showbiz-friends-links-David-Irving.html
  • 10. How can you protectHow can you protect yourself?yourself?  Keep private information private  Do not post address, ssn, phone number, financial info, your schedule, full birth date  Be careful not to display information used to answer security questions (e.g., favorite pet, mother’s maiden name)  Use caution when you click links  Be careful about installing extras on your site  Be wary of unknown friends (strangers)  Google yourself  Don’t blindly connect  Trust your gut instinct
  • 11. Protect yourself continuedProtect yourself continued  Use and maintain anti-virus software  Use strong passwords  Don’t use the same password for a social networking site and for your email  Remember - social networking sites are a public resource – like a billboard in cyberspace  Evaluate sites privacy settings  Lock down your profile information to people you accept as a friend. That way no one can read your personal information unless they are an approved friend.
  • 12. protect your childrenprotect your children “It’s 10 p.m., do you know where your children are?”  “And who they are talking to online?” Age limits on some social networking sites Facebook and MySpace open to people 13 and older Twitter open to all
  • 13. Protect Your ChildrenProtect Your Children (continued)(continued)  Talk to children about online safety  Tell them to keep personal information private  Explain what personal information is (address, ssn, phone number, schedule, birth date, etc.)  And to not share personal information of their family or their friends either.  Caution them about sharing information such as school name, sports teams, where they work, hang out or other info that can be used to identify or locate them offline.
  • 14. Protect your childrenProtect your children (continued)(continued)  More talking points  Warn them to only be “friends” with people they actually know and are friendly with in real life.  Talk to them about bullying  Remind them that once they post information online, just because they delete it, it might not be really gone.  Warn about dangers of flirting with strangers online. Warn about online sex talk.  Tell them to trust their gut if suspicious.
  • 15. Protect your childrenProtect your children (continued)(continued)  Keep the computer in an open area, like the kitchen or family room.  Use the Internet with your kids.  Create a Facebook or MySpace profile  Be one of their “friends”  Let your kids know that you are there  Teach them how to act as they socialize online
  • 16. Protect your childrenProtect your children (continued)(continued) • Check their profile o Check the privacy settings o Review their list of friends o Make sure their screen name doesn’t say too much about them. It may be dangerous to use full name, age or hometown.

Hinweis der Redaktion

  1. Facebook has over 300 million users.