Social Media: What You Should Know

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

 The Internet can be great- but we need to be careful about how we use it  There are lots of social media sites and some of them are not safe.  You.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Social media threats. Warning! May contain mild peril.
How To Protect Your Privacy and Avoid Identity Theft Online.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
How To Protect Your Privacy and Avoid Identity Theft Online.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
How can you protect yourself from online identity theft?
PRIVACY BOOTCAMP YpJU.
Protecting Your Personal Information November 15, 2013.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Securing Your Facebook Identity Nicholas A. Davis, CISA, CISSP UW-Madison Division of Information Technology 11/10/2015 UNIVERSITY OF WISCONSIN1.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Questions National Picture What social networking sites is your child a member of? Vote –
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
INTRODUCTION & QUESTIONS.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
What Would You Do? The Risks of Behavior on the Internet.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Technological Awareness for Teens and Young Adults.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Online Reputation A guide for children aged 7+
Safety.
How to stay safe using the internet & App’s
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Creating your online identity
MEDIA LITERACY Isabelle M.
Social Media Security: Understanding how to keep yourself safe.
Key words: Secure | Password | Character
How to use the internet safely and How to protect my personal data?
Information Security.
Discussion – what kind of bullying is taking place in the images
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
How to Protect Yourself from ID Theft and Social Engineering
ARE YOU A TARGET? YOU MAY NOT REALIZE IT, BUT YOU ARE A TARGET FOR CYBER CRIMINALS. IDENTITY THEFT IS ON THE RISE. BE AWARE AND TAKE PREVENTIVE ACTIONS.
Protecting your personal information and privacy
Information Security Awareness 101
Warrior Wednesday DIGITAL CITIZENSHIP.
What is Twitter? An online social networking service that enables it users to send and read text-based characters, informally known as “tweets.” Created.
Digital Citizenship and Social Media
Social Media Safety Freshman Seminar.
Introduction to Computers
Rules To Help You Navigate the Internet Safely
Welcome… We will begin shortly..
Keep It Safe! Secure Your Secrets
ICT Communications Lesson 3: Internet Life and Privacy
The Power of Social Media
Online Safety! Created by Educational Technology Network
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Freedom Independence Transition
Internet Safety – Social Media
Online Safety: Rights and Responsibilities
Digital Citizen.
Social Networking.
Security Issues within Social Media
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Social Media: What You Should Know

Overview Survey Results Video: 6 Degrees of Information What is our digital identity? Methods for gaining access to our personal information Video: Think Before You Post How to Protect Yourself

Time Spent on Internet

Social Media Sites

Six Degrees of Information https://www.youtube.com/v/CIcIswUkqiY Think before you post: https://www.youtube.com/watch?v=4w4_Hrwh2XI

Your Digital Identity Face Ethnicity Voice Address Fingerprint Education Gender Language Date of Birth Affiliations Place of Birth Interests Mother’s Maiden Name Hobbies Family Averages: 61 text messages 121 emails Per day 26 apps used per month 5 social media accounts This means, we are constantly putting data and information out on the internet and we may not realize what we are sharing

Your Personal Information Open source – You post it online…or your friends/family do People can gain quit a bit just by searching your social media accounts. Most common are date of birth, address, mother’s maiden name, school, schedules and places you visit

Your Personal Information Theft Think of all the information on your phone and computer Phishing Criminals emails or friend you pretending to be someone else Clicking on an email – can be targeted to you specifically

Your Personal Information Hacking Large scale data breaches can reveal your data and PII

Your Personal Information Passwords Easy passwords like password123 Phishing scams Same password used for all sites Locations Check in features Filters used with the location Embedded in photos Pictures with personal belongings

Think Before You Post

How to Protect Yourself Remove personal information Do a sweep through all of your social media accounts and remove your PII Update your privacy settings Set your profile to private Remove 3rd party apps Hide your friends list

How to Protect Yourself Setup a different email that is only for social media Do not share your location Do not let others tag you

How to Protect Yourself Strong Passwords! Create a strong password 8+ characters long Include numbers, capital letters and symbols Use a different password for each account Change it often Consider using multi-factor authentication Never give it out!

6 Clicks Demo

Project Resources https://www.google.com/amp/s/www.truthfinder.com/infomania/amp/safety/remove-exif-data-geotag/ Applied Fundamentals Consulting LLC presentation on information security http://www.netsmartz.org/SocialMedia Cybertipline.com Coby Persin – The Dangers of Social Media http://www.dailymail.co.uk/news/article-2790418/hackers-release-100-000-photos-videos-intercepted-popular-app-snapchat-including-huge-trove-include-child-pornography.html

GPS Info Sites that Remove GPS (EXIF) Data Sites that do not remove EXIF Data Instagram Snapchat Facebook Tumblr Twitter* Picasa Pinterest Photobucket eBay Dropbox Google+ When unsure, it is always best to remove your GPS location from all images shared on the internet