SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Secure SocialSecure Social
NetworkingNetworkingWhat is it and how to protect yourself and your childrenWhat is it and how to protect yourself and your children
Osaid To’meh
OverviewOverview
‱ What is Social Networking?
‱ The Good, the Bad and the Ugly
‱ How to protect yourself
‱ How to protect your children
What is SocialWhat is Social
Networking?Networking?
 Wikipedia
 A social network service focuses on building online
communities of people who share interests and/or
activities, or who are interested in exploring the interests
and activities of others.
 National Cyber Alert System
 “Social networking sites
build on the concept of
traditional social networks where you are connected to
new people through the people you already know.”
 “Friend of a Friend”
More definitionsMore definitions
 Web 2.0 – technology that “allows users to interact
with others and to change website content, in
contrast to non-interactive websites that are limited
to passive viewing of information.” (Wikipedia)
 Examples: social networking sites, video sharing sites, blogs, etc.
 Facebook & MySpace – free-access social
networking websites
 Twitter – “micro” blog – 140 characters or less
 Blog – shared on-line journal
 Video Sharing Sites – YouTube, Flikr
 Podcast – audio broadcast that can be
downloaded
The Good, the bad andThe Good, the bad and
the Uglythe Ugly
‱ The Good
o Networking
o Communicating
o Reconnecting with old friends
o Keeping up with family
o Business marketing and promotion
‱ i.e., TCU on Facebook, Twitter
o Entertaining and fun
Virginia Tech exampleVirginia Tech example
 After shooting rampage in 2007, campus in
lockdown mode, phone lines jammed,
website overloaded – students, faculty, staff
used “
MySpace and Facebook to get in
touch with family and friends outside
traditional channels.”
 Also used to “
send condolences, share
memories and gain closure.”
*SC Magazine, article “Social Anxiety”, page 21,
August 2009.
The Bad and the uglyThe Bad and the ugly
 Personal information could get in the wrong
hands.
 Phishing scams, viruses and spyware may
spread through social networks.
 Once you’ve posted something, others can
copy it or it may exist in cache, so that even
if you delete it, it may still exist and is out of
your control.
 Anti-social? If you spend all your time on the
computer.
More bad and uglyMore bad and ugly
‱ Internet provides sense on anonymity.
‱ Lack of physical contact may give false
sense of security.
‱ People may post information for friends to
read, forgetting that others may see it.
ExamplesExamples
 The case of a person asking for
emergency money while impersonating
a Facebook user to her friends.
 http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on-
facebook/
 Also the British MI6 chief that was
exposed by his wife’s Facebook pictures:
 http://www.dailymail.co.uk/news/article-1197562/MI6-chief-
blows-cover-wifes-Facebook-account-reveals-family-holidays-
showbiz-friends-links-David-Irving.html
How can you protectHow can you protect
yourself?yourself?
 Keep private information private
 Do not post address, ssn, phone number, financial info, your
schedule, full birth date
 Be careful not to display information used to answer security
questions (e.g., favorite pet, mother’s maiden name)
 Use caution when you click links
 Be careful about installing extras on your site
 Be wary of unknown friends (strangers)
 Google yourself
 Don’t blindly connect
 Trust your gut instinct
Protect yourself continuedProtect yourself continued
 Use and maintain anti-virus software
 Use strong passwords
 Don’t use the same password for a social
networking site and for your email
 Remember - social networking sites are a public
resource – like a billboard in cyberspace
 Evaluate sites privacy settings
 Lock down your profile information to people you accept as a friend.
That way no one can read your personal information unless they are an
approved friend.
protect your childrenprotect your children
“It’s 10 p.m., do you know where your
children are?”
 “And who they are talking to online?”
Age limits on some social networking sites
Facebook and MySpace open to people 13 and older
Twitter open to all
Protect Your ChildrenProtect Your Children
(continued)(continued)
 Talk to children about online safety
 Tell them to keep personal information
private
 Explain what personal information is (address, ssn, phone
number, schedule, birth date, etc.)
 And to not share personal information of their family or
their friends either.
 Caution them about sharing information such as school
name, sports teams, where they work, hang out or other
info that can be used to identify or locate them offline.
Protect your childrenProtect your children
(continued)(continued)
 More talking points
 Warn them to only be “friends”
with people they actually know
and are friendly with in real life.
 Talk to them about bullying
 Remind them that once they post information online, just
because they delete it, it might not be really gone.
 Warn about dangers of flirting with strangers online. Warn
about online sex talk.
 Tell them to trust their gut if suspicious.
Protect your childrenProtect your children
(continued)(continued)
 Keep the computer in an
open area, like the kitchen
or family room.
 Use the Internet with your
kids.
 Create a Facebook or MySpace
profile
 Be one of their “friends”
 Let your kids know that you are there
 Teach them how to act as they
socialize online
Protect your childrenProtect your children
(continued)(continued)
‱ Check their profile
o Check the privacy settings
o Review their list of friends
o Make sure their screen name doesn’t say too
much about them. It may be dangerous to use
full name, age or hometown.
Any Question?
Thank you.

Weitere Àhnliche Inhalte

Was ist angesagt?

Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for ParentsJamie Tubbs
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldProjectsByJen.com
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital erabns_library
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Pogled kroz prozor
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training PresentationOCTF Industry Engagement
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 

Was ist angesagt? (20)

Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for Parents
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
 

Andere mochten auch

Update on health workforce agencies
Update on health workforce agenciesUpdate on health workforce agencies
Update on health workforce agenciesC4WI
 
198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimiS. Zenbilci
 
D4E1 leeshulp montageplan
D4E1 leeshulp montageplanD4E1 leeshulp montageplan
D4E1 leeshulp montageplanbrownsuga288
 
Pennsylvania law
Pennsylvania lawPennsylvania law
Pennsylvania lawAaronChisholm
 
CfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsCfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsC4WI
 
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013C4WI
 
Hack.privacy
Hack.privacyHack.privacy
Hack.privacyOsaid To'meh
 
Types of databases based on data structure
Types of databases based on data structureTypes of databases based on data structure
Types of databases based on data structureOsaid To'meh
 
New first amendment
New first amendmentNew first amendment
New first amendmentAaronChisholm
 
Insights into future skills and competences
Insights into future skills and competencesInsights into future skills and competences
Insights into future skills and competencesC4WI
 
Planning your workforce for future uncertainty
Planning your workforce for future uncertaintyPlanning your workforce for future uncertainty
Planning your workforce for future uncertaintyC4WI
 
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationCfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationC4WI
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsungOsaid To'meh
 
Trend analysis presentation
Trend analysis presentationTrend analysis presentation
Trend analysis presentationwiechmanna
 

Andere mochten auch (17)

Update on health workforce agencies
Update on health workforce agenciesUpdate on health workforce agencies
Update on health workforce agencies
 
198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi
 
D4E1 leeshulp montageplan
D4E1 leeshulp montageplanD4E1 leeshulp montageplan
D4E1 leeshulp montageplan
 
Pennsylvania law
Pennsylvania lawPennsylvania law
Pennsylvania law
 
CfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsCfWI conference 2012 poster finalists
CfWI conference 2012 poster finalists
 
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
 
Hack.privacy
Hack.privacyHack.privacy
Hack.privacy
 
Types of databases based on data structure
Types of databases based on data structureTypes of databases based on data structure
Types of databases based on data structure
 
MBI inventario de burnout
MBI inventario de burnoutMBI inventario de burnout
MBI inventario de burnout
 
New first amendment
New first amendmentNew first amendment
New first amendment
 
Pandora
PandoraPandora
Pandora
 
Insights into future skills and competences
Insights into future skills and competencesInsights into future skills and competences
Insights into future skills and competences
 
Planning your workforce for future uncertainty
Planning your workforce for future uncertaintyPlanning your workforce for future uncertainty
Planning your workforce for future uncertainty
 
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationCfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
 
4th amendment
4th amendment4th amendment
4th amendment
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 
Trend analysis presentation
Trend analysis presentationTrend analysis presentation
Trend analysis presentation
 

Ähnlich wie Secure social networking

CyberSafety
CyberSafetyCyberSafety
CyberSafetyiceman1953
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyStaci Trekles
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 ParentsAaron Puley
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundStephanie Barnhart
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 

Ähnlich wie Secure social networking (20)

CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Digitize Me
Digitize MeDigitize Me
Digitize Me
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 Parents
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 

KĂŒrzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

KĂŒrzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Secure social networking

  • 1. Secure SocialSecure Social NetworkingNetworkingWhat is it and how to protect yourself and your childrenWhat is it and how to protect yourself and your children Osaid To’meh
  • 2. OverviewOverview ‱ What is Social Networking? ‱ The Good, the Bad and the Ugly ‱ How to protect yourself ‱ How to protect your children
  • 3. What is SocialWhat is Social Networking?Networking?  Wikipedia  A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others.  National Cyber Alert System  “Social networking sites
build on the concept of traditional social networks where you are connected to new people through the people you already know.”  “Friend of a Friend”
  • 4. More definitionsMore definitions  Web 2.0 – technology that “allows users to interact with others and to change website content, in contrast to non-interactive websites that are limited to passive viewing of information.” (Wikipedia)  Examples: social networking sites, video sharing sites, blogs, etc.  Facebook & MySpace – free-access social networking websites  Twitter – “micro” blog – 140 characters or less  Blog – shared on-line journal  Video Sharing Sites – YouTube, Flikr  Podcast – audio broadcast that can be downloaded
  • 5. The Good, the bad andThe Good, the bad and the Uglythe Ugly ‱ The Good o Networking o Communicating o Reconnecting with old friends o Keeping up with family o Business marketing and promotion ‱ i.e., TCU on Facebook, Twitter o Entertaining and fun
  • 6. Virginia Tech exampleVirginia Tech example  After shooting rampage in 2007, campus in lockdown mode, phone lines jammed, website overloaded – students, faculty, staff used “
MySpace and Facebook to get in touch with family and friends outside traditional channels.”  Also used to “
send condolences, share memories and gain closure.” *SC Magazine, article “Social Anxiety”, page 21, August 2009.
  • 7. The Bad and the uglyThe Bad and the ugly  Personal information could get in the wrong hands.  Phishing scams, viruses and spyware may spread through social networks.  Once you’ve posted something, others can copy it or it may exist in cache, so that even if you delete it, it may still exist and is out of your control.  Anti-social? If you spend all your time on the computer.
  • 8. More bad and uglyMore bad and ugly ‱ Internet provides sense on anonymity. ‱ Lack of physical contact may give false sense of security. ‱ People may post information for friends to read, forgetting that others may see it.
  • 9. ExamplesExamples  The case of a person asking for emergency money while impersonating a Facebook user to her friends.  http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on- facebook/  Also the British MI6 chief that was exposed by his wife’s Facebook pictures:  http://www.dailymail.co.uk/news/article-1197562/MI6-chief- blows-cover-wifes-Facebook-account-reveals-family-holidays- showbiz-friends-links-David-Irving.html
  • 10. How can you protectHow can you protect yourself?yourself?  Keep private information private  Do not post address, ssn, phone number, financial info, your schedule, full birth date  Be careful not to display information used to answer security questions (e.g., favorite pet, mother’s maiden name)  Use caution when you click links  Be careful about installing extras on your site  Be wary of unknown friends (strangers)  Google yourself  Don’t blindly connect  Trust your gut instinct
  • 11. Protect yourself continuedProtect yourself continued  Use and maintain anti-virus software  Use strong passwords  Don’t use the same password for a social networking site and for your email  Remember - social networking sites are a public resource – like a billboard in cyberspace  Evaluate sites privacy settings  Lock down your profile information to people you accept as a friend. That way no one can read your personal information unless they are an approved friend.
  • 12. protect your childrenprotect your children “It’s 10 p.m., do you know where your children are?”  “And who they are talking to online?” Age limits on some social networking sites Facebook and MySpace open to people 13 and older Twitter open to all
  • 13. Protect Your ChildrenProtect Your Children (continued)(continued)  Talk to children about online safety  Tell them to keep personal information private  Explain what personal information is (address, ssn, phone number, schedule, birth date, etc.)  And to not share personal information of their family or their friends either.  Caution them about sharing information such as school name, sports teams, where they work, hang out or other info that can be used to identify or locate them offline.
  • 14. Protect your childrenProtect your children (continued)(continued)  More talking points  Warn them to only be “friends” with people they actually know and are friendly with in real life.  Talk to them about bullying  Remind them that once they post information online, just because they delete it, it might not be really gone.  Warn about dangers of flirting with strangers online. Warn about online sex talk.  Tell them to trust their gut if suspicious.
  • 15. Protect your childrenProtect your children (continued)(continued)  Keep the computer in an open area, like the kitchen or family room.  Use the Internet with your kids.  Create a Facebook or MySpace profile  Be one of their “friends”  Let your kids know that you are there  Teach them how to act as they socialize online
  • 16. Protect your childrenProtect your children (continued)(continued) ‱ Check their profile o Check the privacy settings o Review their list of friends o Make sure their screen name doesn’t say too much about them. It may be dangerous to use full name, age or hometown.

Hinweis der Redaktion

  1. Facebook has over 300 million users.