SlideShare ist ein Scribd-Unternehmen logo
1 von 9
By
Auwalu Adamu
DP/IT/13/041A
• Malware distribution
• Cyber-bullying
• Shelf-life of information (lives forever in
cyberspace)
• Privacy concerns
– Information about you that you post
– Information about you that others post
– Information about you the social networking sites
collect and share with others
• Can result in social engineering, identity theft, financial fraud,
infected computers, stalking, child abuse, sexual predation,
defamation, lawsuits, mad boyfriend/girlfriend/spouse/parent,
unwanted legacy, embarrassment, …
 Similar to other threats that can lead to
downloading/installing malware
 Malicious ads
 Clickjacking
 Wall posts, inbox or chat messages with malicious
links from Friends (hijacked user account)
 “My wallet was stolen and I’m stuck in London.
Please send me cash now.”
 Spam email pretending to be from Facebook admins
• Friends & family
• Friends of friends & family
• Parents
• Employers and co-workers
• Customers
• Universities
• Marketing companies & vendors
• Criminals & hackers
• Government agencies (IRS, SRS!)
• EVERYONE ELSE
• Does your University have a policy? Is incidental personal
use allowed? At what point does it exceed “incidental”?
Discuss it with your supervisor
• Faculty and staff posting work-related information without
authorization, or posting work-related information on
personal pages
• K-State units should use Facebook Pages or groups rather
than setting up a user profile; latter violates FB policy
• Should also be conscious of branding, making it clear
whether the page is an official institutional page
• See Social Media Guidelines from K-State’s Media Relations
www.k-state.edu/media/socialmedia/
• Possible data loss (inadvertent or malicious)
• Damage to reputation (personal or institutional)
• Regulatory compliance issues (e.g., FERPA, HIPAA)
• Personal rights issues (free speech, academic freedom)
1. Use a strong, unique password (don’t use the same
password on multiple sites; don’t use same ID
password on social networking sites)
2. Provide as little personal information as possible –
avoid revealing birth date, address, etc.
3. Understand and customize the privacy settings in all of
your social networking accounts
4. Don’t allow 3rd party applications to access
your information (if possible)
5. Be careful about what you post
a. Photos of self or others
b. Opinions on controversial topics
c. Don’t rip classmates, professors, coworkers,
employers, etc. – it WILL come back to haunt you
6. Don’t post anything related to your
employer (unless you’re authorized)
7. Supervise your kids’ use of social
networking sites
8. Be suspicious of friend and follow requests, ads,
3rd party applications, chat messages, etc.
9. Minimize exploration – don’t carelessly click on
lots of ads, videos, games, etc.
10. Use built-in and add-on features in web browsers
to warn you of malicious sites
a. Anti-phishing filters in IE and Firefox
b. Web of Trust
c. No Script
d. Ad block Plus
e. Preview features of bit.ly, TinyURL
11. Trend Micro Web Reputations
Services is your friend
12. Google yourself and scrutinize results
13. Think before you click!!
Power Point Presentation by Auwalu Adamu

Weitere ähnliche Inhalte

Was ist angesagt?

Cruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointCruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointscc0523
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking SafetyJEM JEM
 
The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsDiana Benner
 
Plagiarism student handout
Plagiarism student handoutPlagiarism student handout
Plagiarism student handoutthinkict
 
hello world: the 2010 web and the enterprise
hello world:  the 2010 web and the enterprisehello world:  the 2010 web and the enterprise
hello world: the 2010 web and the enterpriseDenise Howell
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Digital Divide
Digital DivideDigital Divide
Digital Dividecronegeek
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for EducatorsFrederick Lane
 

Was ist angesagt? (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointCruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpoint
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School Districts
 
Plagiarism student handout
Plagiarism student handoutPlagiarism student handout
Plagiarism student handout
 
hello world: the 2010 web and the enterprise
hello world:  the 2010 web and the enterprisehello world:  the 2010 web and the enterprise
hello world: the 2010 web and the enterprise
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
 

Ă„hnlich wie Power Point Presentation by Auwalu Adamu

Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
CyberSafety
CyberSafetyCyberSafety
CyberSafetyiceman1953
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyStaci Trekles
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Classkschermerhorn
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Students I Safety
Students I SafetyStudents I Safety
Students I SafetyDesiree Caskey
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxDIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxvanessacabang2
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Six Tenets of Digital Citizenship
Six Tenets of Digital CitizenshipSix Tenets of Digital Citizenship
Six Tenets of Digital Citizenshipblog4itech
 

Ă„hnlich wie Power Point Presentation by Auwalu Adamu (20)

2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxDIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Six Tenets of Digital Citizenship
Six Tenets of Digital CitizenshipSix Tenets of Digital Citizenship
Six Tenets of Digital Citizenship
 

KĂĽrzlich hochgeladen

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

KĂĽrzlich hochgeladen (20)

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

Power Point Presentation by Auwalu Adamu

  • 2. • Malware distribution • Cyber-bullying • Shelf-life of information (lives forever in cyberspace) • Privacy concerns – Information about you that you post – Information about you that others post – Information about you the social networking sites collect and share with others
  • 3. • Can result in social engineering, identity theft, financial fraud, infected computers, stalking, child abuse, sexual predation, defamation, lawsuits, mad boyfriend/girlfriend/spouse/parent, unwanted legacy, embarrassment, …
  • 4.  Similar to other threats that can lead to downloading/installing malware  Malicious ads  Clickjacking  Wall posts, inbox or chat messages with malicious links from Friends (hijacked user account)  “My wallet was stolen and I’m stuck in London. Please send me cash now.”  Spam email pretending to be from Facebook admins
  • 5. • Friends & family • Friends of friends & family • Parents • Employers and co-workers • Customers • Universities • Marketing companies & vendors • Criminals & hackers • Government agencies (IRS, SRS!) • EVERYONE ELSE
  • 6. • Does your University have a policy? Is incidental personal use allowed? At what point does it exceed “incidental”? Discuss it with your supervisor • Faculty and staff posting work-related information without authorization, or posting work-related information on personal pages • K-State units should use Facebook Pages or groups rather than setting up a user profile; latter violates FB policy • Should also be conscious of branding, making it clear whether the page is an official institutional page • See Social Media Guidelines from K-State’s Media Relations www.k-state.edu/media/socialmedia/ • Possible data loss (inadvertent or malicious) • Damage to reputation (personal or institutional) • Regulatory compliance issues (e.g., FERPA, HIPAA) • Personal rights issues (free speech, academic freedom)
  • 7. 1. Use a strong, unique password (don’t use the same password on multiple sites; don’t use same ID password on social networking sites) 2. Provide as little personal information as possible – avoid revealing birth date, address, etc. 3. Understand and customize the privacy settings in all of your social networking accounts 4. Don’t allow 3rd party applications to access your information (if possible) 5. Be careful about what you post a. Photos of self or others b. Opinions on controversial topics c. Don’t rip classmates, professors, coworkers, employers, etc. – it WILL come back to haunt you 6. Don’t post anything related to your employer (unless you’re authorized) 7. Supervise your kids’ use of social networking sites
  • 8. 8. Be suspicious of friend and follow requests, ads, 3rd party applications, chat messages, etc. 9. Minimize exploration – don’t carelessly click on lots of ads, videos, games, etc. 10. Use built-in and add-on features in web browsers to warn you of malicious sites a. Anti-phishing filters in IE and Firefox b. Web of Trust c. No Script d. Ad block Plus e. Preview features of bit.ly, TinyURL 11. Trend Micro Web Reputations Services is your friend 12. Google yourself and scrutinize results 13. Think before you click!!

Hinweis der Redaktion

  1. I’m only going to deal with security issues, not sociological or cultural implications (addictions, wasting time, mindless drivel, distraction from studying, myth of multitasking)
  2. RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.”over the past few years — and negligently stored them in plaintext in an incompetently protected database.RockYou’s official bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw , or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account.Read more: http://techcrunch.com/2009/12/27/privacy-theater/#ixzz0oaNyV1XL
  3. RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.”over the past few years — and negligently stored them in plaintext in an incompetently protected database.RockYou’sofficial bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw , or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account.Read more: http://techcrunch.com/2009/12/27/privacy-theater/#ixzz0oaNyV1XL