SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Look both ways when you use Social Networks Safe Use of Social Networks  ** This work was possible only through significant help from several professional acquaintances, without them this work would not exist. Your feedback will help to make this even better.  Feedback: Ravi.char@gmail.com
Evolution: Websites to Social Networks Yesterday Today ,[object Object]
	Basic information 	on the products and 	services
	Information on 	What, but not 	Who, How, When 	and Where
Highly interactive and collaborative websites
Share and seek personal information
Information is no longer competitive advantage, it’s organized knowledgeSocial  Networks:  Creates tendency to share more information than what we need to!
Social Networks: Double Lane Road OR Look both ways when you use Social Networks
Threats Subversive techniques that leverage your trust relationship. Hackers that scan sites for Personal Information or Proprietary Information. Online Predators. Peer pressure to participate and give out more information than needed - exposing your personal and professional data. Fake online identities that can mislead you. Why Did The Chicken Cross The Road?
Beware! Enticing Applications such as Online Quiz – could ask your DOB in a subtle way or entice you. Installing Applications that have access to your Personal Profile information. Exposure to Worms, Viruses and Malwares that poses risk to Personal Information. Poorly Managed Trust Relationships – Accepting someone as a friend who you don’t know. Posting too much Personal Information. What route are your Security Guards taking to the bank today?
Aware Privacy Settings.  ,[object Object]
Don’t forget your Meta data settings.
READ - Privacy Policy

Weitere ähnliche Inhalte

Was ist angesagt?

My Online Image
My Online ImageMy Online Image
My Online Image
aluthe
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Web
ankitgadgil
 
Darim Presents Facebook&Twitter For JCPSC
Darim Presents Facebook&Twitter For JCPSCDarim Presents Facebook&Twitter For JCPSC
Darim Presents Facebook&Twitter For JCPSC
Lisa Colton
 

Was ist angesagt? (20)

My Online Image
My Online ImageMy Online Image
My Online Image
 
Your Privacy & Security on the Web
Your Privacy & Security on the WebYour Privacy & Security on the Web
Your Privacy & Security on the Web
 
Social Media & Networking How-To
Social Media & Networking How-ToSocial Media & Networking How-To
Social Media & Networking How-To
 
Why Networking Trumps a Job Posting
Why Networking Trumps a Job PostingWhy Networking Trumps a Job Posting
Why Networking Trumps a Job Posting
 
Media Law
Media LawMedia Law
Media Law
 
Worcester County Bar Association Presents The LinkedIn Lawyer
Worcester County Bar Association Presents The LinkedIn LawyerWorcester County Bar Association Presents The LinkedIn Lawyer
Worcester County Bar Association Presents The LinkedIn Lawyer
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - Webinar
 
Tips to stay safe and responsible on social media
Tips to stay safe and responsible on social mediaTips to stay safe and responsible on social media
Tips to stay safe and responsible on social media
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Internet Credibility
Internet CredibilityInternet Credibility
Internet Credibility
 
LinkedIn Smart Card 070314
LinkedIn Smart Card 070314LinkedIn Smart Card 070314
LinkedIn Smart Card 070314
 
Deep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonDeep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia Hetherington
 
Darim Presents Facebook&Twitter For JCPSC
Darim Presents Facebook&Twitter For JCPSCDarim Presents Facebook&Twitter For JCPSC
Darim Presents Facebook&Twitter For JCPSC
 
Capilano University Personal Branding Online
Capilano University Personal Branding OnlineCapilano University Personal Branding Online
Capilano University Personal Branding Online
 
Web 2.0 Technology
Web 2.0 TechnologyWeb 2.0 Technology
Web 2.0 Technology
 
Worcesterbar 01
Worcesterbar 01Worcesterbar 01
Worcesterbar 01
 
Social Media And Web 2.0
Social Media And Web 2.0Social Media And Web 2.0
Social Media And Web 2.0
 
Social Media Education Workshop for the Plus Southwest Chapter
Social Media Education Workshop for the Plus Southwest ChapterSocial Media Education Workshop for the Plus Southwest Chapter
Social Media Education Workshop for the Plus Southwest Chapter
 
Class 2 social media and communication
Class 2   social media and communicationClass 2   social media and communication
Class 2 social media and communication
 
Social Media Insight
Social Media InsightSocial Media Insight
Social Media Insight
 

Andere mochten auch

My Honors Thesis Presentation
My Honors Thesis PresentationMy Honors Thesis Presentation
My Honors Thesis Presentation
ndewinkle
 
KüBaşIk öğRenme
KüBaşIk öğRenmeKüBaşIk öğRenme
KüBaşIk öğRenme
SIDIKA
 
KüBaşIk öğRenme
KüBaşIk öğRenmeKüBaşIk öğRenme
KüBaşIk öğRenme
SIDIKA
 

Andere mochten auch (16)

Donor Retention Slides from 2016 Nonprofit Technology Conference (16NTC)
Donor Retention Slides from 2016 Nonprofit Technology Conference (16NTC)Donor Retention Slides from 2016 Nonprofit Technology Conference (16NTC)
Donor Retention Slides from 2016 Nonprofit Technology Conference (16NTC)
 
F z94 l-_pioneer__tuner__arp2134
F z94 l-_pioneer__tuner__arp2134F z94 l-_pioneer__tuner__arp2134
F z94 l-_pioneer__tuner__arp2134
 
My Honors Thesis Presentation
My Honors Thesis PresentationMy Honors Thesis Presentation
My Honors Thesis Presentation
 
Juee 2986
Juee 2986Juee 2986
Juee 2986
 
Miche Summer 2012 Shells
Miche Summer 2012 ShellsMiche Summer 2012 Shells
Miche Summer 2012 Shells
 
33 Weeks Of Purity
33 Weeks Of Purity33 Weeks Of Purity
33 Weeks Of Purity
 
20[1].03.Simplified Security
20[1].03.Simplified Security20[1].03.Simplified Security
20[1].03.Simplified Security
 
Business plan
Business planBusiness plan
Business plan
 
Gandhi Publicidad
Gandhi PublicidadGandhi Publicidad
Gandhi Publicidad
 
Planificación en el nivel inicial
Planificación en el nivel inicial Planificación en el nivel inicial
Planificación en el nivel inicial
 
Planificación en el nivel inicial
Planificación en el nivel inicial Planificación en el nivel inicial
Planificación en el nivel inicial
 
Secuencia didáctica-alicia pochettino
Secuencia  didáctica-alicia pochettinoSecuencia  didáctica-alicia pochettino
Secuencia didáctica-alicia pochettino
 
Planificación en el nivel primario taller 24 06
Planificación en el nivel primario taller 24 06Planificación en el nivel primario taller 24 06
Planificación en el nivel primario taller 24 06
 
KüBaşIk öğRenme
KüBaşIk öğRenmeKüBaşIk öğRenme
KüBaşIk öğRenme
 
KüBaşIk öğRenme
KüBaşIk öğRenmeKüBaşIk öğRenme
KüBaşIk öğRenme
 
10 Lessons for 10 Years in Business
10 Lessons for 10 Years in Business10 Lessons for 10 Years in Business
10 Lessons for 10 Years in Business
 

Ähnlich wie Safe Use Of Social Networks Final Draft

advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
jaggernaoma
 

Ähnlich wie Safe Use Of Social Networks Final Draft (20)

2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Business Impact of Online Social Networking
Business Impact of Online Social NetworkingBusiness Impact of Online Social Networking
Business Impact of Online Social Networking
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
risks associated with using social Media
 risks associated with using social Media  risks associated with using social Media
risks associated with using social Media
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Users guide
Users guideUsers guide
Users guide
 
Presentation networking
Presentation networkingPresentation networking
Presentation networking
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
 

Safe Use Of Social Networks Final Draft

  • 1. Look both ways when you use Social Networks Safe Use of Social Networks ** This work was possible only through significant help from several professional acquaintances, without them this work would not exist. Your feedback will help to make this even better. Feedback: Ravi.char@gmail.com
  • 2.
  • 3. Basic information on the products and services
  • 4. Information on What, but not Who, How, When and Where
  • 5. Highly interactive and collaborative websites
  • 6. Share and seek personal information
  • 7. Information is no longer competitive advantage, it’s organized knowledgeSocial Networks: Creates tendency to share more information than what we need to!
  • 8. Social Networks: Double Lane Road OR Look both ways when you use Social Networks
  • 9. Threats Subversive techniques that leverage your trust relationship. Hackers that scan sites for Personal Information or Proprietary Information. Online Predators. Peer pressure to participate and give out more information than needed - exposing your personal and professional data. Fake online identities that can mislead you. Why Did The Chicken Cross The Road?
  • 10. Beware! Enticing Applications such as Online Quiz – could ask your DOB in a subtle way or entice you. Installing Applications that have access to your Personal Profile information. Exposure to Worms, Viruses and Malwares that poses risk to Personal Information. Poorly Managed Trust Relationships – Accepting someone as a friend who you don’t know. Posting too much Personal Information. What route are your Security Guards taking to the bank today?
  • 11.
  • 12. Don’t forget your Meta data settings.
  • 13. READ - Privacy Policy
  • 14. REMEMBER - Some sites make their privacy settings complicated!
  • 16. Do not give your full (complete) name. Example: Omit middle name or precise location
  • 17. Don’t be pressured or enticed to reveal more than needed.Data Protection – The protection of personal data is an important individual right.
  • 18.
  • 21. What you write/post could be out there and could haunt you back some other time!
  • 22. Don’t give our your mobile number or e-mail.Disclose with Care & Entrust with Caution
  • 23.
  • 24. Make good assessment on who you TRUST online.Trust but Verify
  • 25. Social Networks are Gaining Credibility Social Networks are used as a tool to screen behavior of potential job candidates. Social Networks data are used by Marketers, Forensic Investigators in various ways. Your Social Networks behavior forms the “Zeroth” impression, you may not even get a chance to make the First impression… Good online presence can enable your brand at the same time it can pose risks to your brand. It’s a part of life!
  • 26. Social Networks Safe Usage Do not disclose your company proprietary information on Social Networks – for example internal project, Intellectual Property. Do not use Social Networks in a way that it violates company Information Security Policy. Do not participate in online rumors, gossips and slandering related to work, colleagues or competitors. When you represent company on a Social Network, ensure that the information is approved by your company – follow proper process. Data leakage = Loss of customer trust = Negative business impact
  • 27.
  • 28. Professional Networking sites are no more trustworthy than Social Networking counterpart.
  • 29. Think before you ink. Ensure the content is appropriate. Don’t use inappropriate language or photos.
  • 30. Don’t brag or compelled to post data on Social Networks that you may regret later.
  • 31. Ensure that your account is protected with a strong password. Some sites might not enforce this.
  • 32. It may be a good idea to keep a tab on your kids activities on Social Networks.Social Networks: It is no fun being too careful, but being cautious and aware goes a long way.
  • 33. Social Networks Data Taxonomy Service Data – Data you give to use service. Meta Data – Derivative data from your use of service. Disclosed Data – Data you provide on your site. Entrusted Data – Data you submit on other sites – you have no control. Incidental Data – Data that other people post about you, you have no control. Behavioral Data – Data site collects, your online habits. Social Networks: Different social networking sites give different level of user control for each data type.
  • 34.