SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Secure SocialSecure Social
NetworkingNetworkingWhat is it and how to protect yourself and your childrenWhat is it and how to protect yourself and your children
Osaid To’meh
OverviewOverview
‱ What is Social Networking?
‱ The Good, the Bad and the Ugly
‱ How to protect yourself
‱ How to protect your children
What is SocialWhat is Social
Networking?Networking?
 Wikipedia
 A social network service focuses on building online
communities of people who share interests and/or
activities, or who are interested in exploring the interests
and activities of others.
 National Cyber Alert System
 “Social networking sites
build on the concept of
traditional social networks where you are connected to
new people through the people you already know.”
 “Friend of a Friend”
More definitionsMore definitions
 Web 2.0 – technology that “allows users to interact
with others and to change website content, in
contrast to non-interactive websites that are limited
to passive viewing of information.” (Wikipedia)
 Examples: social networking sites, video sharing sites, blogs, etc.
 Facebook & MySpace – free-access social
networking websites
 Twitter – “micro” blog – 140 characters or less
 Blog – shared on-line journal
 Video Sharing Sites – YouTube, Flikr
 Podcast – audio broadcast that can be
downloaded
The Good, the bad andThe Good, the bad and
the Uglythe Ugly
‱ The Good
o Networking
o Communicating
o Reconnecting with old friends
o Keeping up with family
o Business marketing and promotion
‱ i.e., TCU on Facebook, Twitter
o Entertaining and fun
Virginia Tech exampleVirginia Tech example
 After shooting rampage in 2007, campus in
lockdown mode, phone lines jammed,
website overloaded – students, faculty, staff
used “
MySpace and Facebook to get in
touch with family and friends outside
traditional channels.”
 Also used to “
send condolences, share
memories and gain closure.”
*SC Magazine, article “Social Anxiety”, page 21,
August 2009.
The Bad and the uglyThe Bad and the ugly
 Personal information could get in the wrong
hands.
 Phishing scams, viruses and spyware may
spread through social networks.
 Once you’ve posted something, others can
copy it or it may exist in cache, so that even
if you delete it, it may still exist and is out of
your control.
 Anti-social? If you spend all your time on the
computer.
More bad and uglyMore bad and ugly
‱ Internet provides sense on anonymity.
‱ Lack of physical contact may give false
sense of security.
‱ People may post information for friends to
read, forgetting that others may see it.
ExamplesExamples
 The case of a person asking for
emergency money while impersonating
a Facebook user to her friends.
 http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on-
facebook/
 Also the British MI6 chief that was
exposed by his wife’s Facebook pictures:
 http://www.dailymail.co.uk/news/article-1197562/MI6-chief-
blows-cover-wifes-Facebook-account-reveals-family-holidays-
showbiz-friends-links-David-Irving.html
How can you protectHow can you protect
yourself?yourself?
 Keep private information private
 Do not post address, ssn, phone number, financial info, your
schedule, full birth date
 Be careful not to display information used to answer security
questions (e.g., favorite pet, mother’s maiden name)
 Use caution when you click links
 Be careful about installing extras on your site
 Be wary of unknown friends (strangers)
 Google yourself
 Don’t blindly connect
 Trust your gut instinct
Protect yourself continuedProtect yourself continued
 Use and maintain anti-virus software
 Use strong passwords
 Don’t use the same password for a social
networking site and for your email
 Remember - social networking sites are a public
resource – like a billboard in cyberspace
 Evaluate sites privacy settings
 Lock down your profile information to people you accept as a friend.
That way no one can read your personal information unless they are an
approved friend.
protect your childrenprotect your children
“It’s 10 p.m., do you know where your
children are?”
 “And who they are talking to online?”
Age limits on some social networking sites
Facebook and MySpace open to people 13 and older
Twitter open to all
Protect Your ChildrenProtect Your Children
(continued)(continued)
 Talk to children about online safety
 Tell them to keep personal information
private
 Explain what personal information is (address, ssn, phone
number, schedule, birth date, etc.)
 And to not share personal information of their family or
their friends either.
 Caution them about sharing information such as school
name, sports teams, where they work, hang out or other
info that can be used to identify or locate them offline.
Protect your childrenProtect your children
(continued)(continued)
 More talking points
 Warn them to only be “friends”
with people they actually know
and are friendly with in real life.
 Talk to them about bullying
 Remind them that once they post information online, just
because they delete it, it might not be really gone.
 Warn about dangers of flirting with strangers online. Warn
about online sex talk.
 Tell them to trust their gut if suspicious.
Protect your childrenProtect your children
(continued)(continued)
 Keep the computer in an
open area, like the kitchen
or family room.
 Use the Internet with your
kids.
 Create a Facebook or MySpace
profile
 Be one of their “friends”
 Let your kids know that you are there
 Teach them how to act as they
socialize online
Protect your childrenProtect your children
(continued)(continued)
‱ Check their profile
o Check the privacy settings
o Review their list of friends
o Make sure their screen name doesn’t say too
much about them. It may be dangerous to use
full name, age or hometown.
Any Question?
Thank you.

Weitere Àhnliche Inhalte

Was ist angesagt?

Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
bns_library
 

Was ist angesagt? (20)

Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for Parents
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 

Andere mochten auch

198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi
S. Zenbilci
 
Pennsylvania law
Pennsylvania lawPennsylvania law
Pennsylvania law
AaronChisholm
 
CfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsCfWI conference 2012 poster finalists
CfWI conference 2012 poster finalists
C4WI
 
Types of databases based on data structure
Types of databases based on data structureTypes of databases based on data structure
Types of databases based on data structure
Osaid To'meh
 
New first amendment
New first amendmentNew first amendment
New first amendment
AaronChisholm
 
Trend analysis presentation
Trend analysis presentationTrend analysis presentation
Trend analysis presentation
wiechmanna
 

Andere mochten auch (17)

Update on health workforce agencies
Update on health workforce agenciesUpdate on health workforce agencies
Update on health workforce agencies
 
198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi
 
D4E1 leeshulp montageplan
D4E1 leeshulp montageplanD4E1 leeshulp montageplan
D4E1 leeshulp montageplan
 
Pennsylvania law
Pennsylvania lawPennsylvania law
Pennsylvania law
 
CfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsCfWI conference 2012 poster finalists
CfWI conference 2012 poster finalists
 
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
 
Hack.privacy
Hack.privacyHack.privacy
Hack.privacy
 
Types of databases based on data structure
Types of databases based on data structureTypes of databases based on data structure
Types of databases based on data structure
 
MBI inventario de burnout
MBI inventario de burnoutMBI inventario de burnout
MBI inventario de burnout
 
New first amendment
New first amendmentNew first amendment
New first amendment
 
Pandora
PandoraPandora
Pandora
 
Insights into future skills and competences
Insights into future skills and competencesInsights into future skills and competences
Insights into future skills and competences
 
Planning your workforce for future uncertainty
Planning your workforce for future uncertaintyPlanning your workforce for future uncertainty
Planning your workforce for future uncertainty
 
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationCfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
 
4th amendment
4th amendment4th amendment
4th amendment
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 
Trend analysis presentation
Trend analysis presentationTrend analysis presentation
Trend analysis presentation
 

Ähnlich wie Secure social networking

CyberSafety
CyberSafetyCyberSafety
CyberSafety
iceman1953
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
tholman77
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
Kwazi Communications
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
cpitchford
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
Loreto Normanurst
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
amulhall
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
Julia Bryan-Diehl
 

Ähnlich wie Secure social networking (20)

CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Digitize Me
Digitize MeDigitize Me
Digitize Me
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 Parents
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 

KĂŒrzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

KĂŒrzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 

Secure social networking

  • 1. Secure SocialSecure Social NetworkingNetworkingWhat is it and how to protect yourself and your childrenWhat is it and how to protect yourself and your children Osaid To’meh
  • 2. OverviewOverview ‱ What is Social Networking? ‱ The Good, the Bad and the Ugly ‱ How to protect yourself ‱ How to protect your children
  • 3. What is SocialWhat is Social Networking?Networking?  Wikipedia  A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others.  National Cyber Alert System  “Social networking sites
build on the concept of traditional social networks where you are connected to new people through the people you already know.”  “Friend of a Friend”
  • 4. More definitionsMore definitions  Web 2.0 – technology that “allows users to interact with others and to change website content, in contrast to non-interactive websites that are limited to passive viewing of information.” (Wikipedia)  Examples: social networking sites, video sharing sites, blogs, etc.  Facebook & MySpace – free-access social networking websites  Twitter – “micro” blog – 140 characters or less  Blog – shared on-line journal  Video Sharing Sites – YouTube, Flikr  Podcast – audio broadcast that can be downloaded
  • 5. The Good, the bad andThe Good, the bad and the Uglythe Ugly ‱ The Good o Networking o Communicating o Reconnecting with old friends o Keeping up with family o Business marketing and promotion ‱ i.e., TCU on Facebook, Twitter o Entertaining and fun
  • 6. Virginia Tech exampleVirginia Tech example  After shooting rampage in 2007, campus in lockdown mode, phone lines jammed, website overloaded – students, faculty, staff used “
MySpace and Facebook to get in touch with family and friends outside traditional channels.”  Also used to “
send condolences, share memories and gain closure.” *SC Magazine, article “Social Anxiety”, page 21, August 2009.
  • 7. The Bad and the uglyThe Bad and the ugly  Personal information could get in the wrong hands.  Phishing scams, viruses and spyware may spread through social networks.  Once you’ve posted something, others can copy it or it may exist in cache, so that even if you delete it, it may still exist and is out of your control.  Anti-social? If you spend all your time on the computer.
  • 8. More bad and uglyMore bad and ugly ‱ Internet provides sense on anonymity. ‱ Lack of physical contact may give false sense of security. ‱ People may post information for friends to read, forgetting that others may see it.
  • 9. ExamplesExamples  The case of a person asking for emergency money while impersonating a Facebook user to her friends.  http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on- facebook/  Also the British MI6 chief that was exposed by his wife’s Facebook pictures:  http://www.dailymail.co.uk/news/article-1197562/MI6-chief- blows-cover-wifes-Facebook-account-reveals-family-holidays- showbiz-friends-links-David-Irving.html
  • 10. How can you protectHow can you protect yourself?yourself?  Keep private information private  Do not post address, ssn, phone number, financial info, your schedule, full birth date  Be careful not to display information used to answer security questions (e.g., favorite pet, mother’s maiden name)  Use caution when you click links  Be careful about installing extras on your site  Be wary of unknown friends (strangers)  Google yourself  Don’t blindly connect  Trust your gut instinct
  • 11. Protect yourself continuedProtect yourself continued  Use and maintain anti-virus software  Use strong passwords  Don’t use the same password for a social networking site and for your email  Remember - social networking sites are a public resource – like a billboard in cyberspace  Evaluate sites privacy settings  Lock down your profile information to people you accept as a friend. That way no one can read your personal information unless they are an approved friend.
  • 12. protect your childrenprotect your children “It’s 10 p.m., do you know where your children are?”  “And who they are talking to online?” Age limits on some social networking sites Facebook and MySpace open to people 13 and older Twitter open to all
  • 13. Protect Your ChildrenProtect Your Children (continued)(continued)  Talk to children about online safety  Tell them to keep personal information private  Explain what personal information is (address, ssn, phone number, schedule, birth date, etc.)  And to not share personal information of their family or their friends either.  Caution them about sharing information such as school name, sports teams, where they work, hang out or other info that can be used to identify or locate them offline.
  • 14. Protect your childrenProtect your children (continued)(continued)  More talking points  Warn them to only be “friends” with people they actually know and are friendly with in real life.  Talk to them about bullying  Remind them that once they post information online, just because they delete it, it might not be really gone.  Warn about dangers of flirting with strangers online. Warn about online sex talk.  Tell them to trust their gut if suspicious.
  • 15. Protect your childrenProtect your children (continued)(continued)  Keep the computer in an open area, like the kitchen or family room.  Use the Internet with your kids.  Create a Facebook or MySpace profile  Be one of their “friends”  Let your kids know that you are there  Teach them how to act as they socialize online
  • 16. Protect your childrenProtect your children (continued)(continued) ‱ Check their profile o Check the privacy settings o Review their list of friends o Make sure their screen name doesn’t say too much about them. It may be dangerous to use full name, age or hometown.

Hinweis der Redaktion

  1. Facebook has over 300 million users.