SAGE Lecture Spark [10/2/18] The Publisher of the Social Sciences.

Slides:



Advertisements
Similar presentations
INTERNET SAFETY QUIZ BY ANGELINA AND CHELSEA. QUESTION 1. WHAT AGE DO YOU HAVE TO BE TO HAVE INSTAGRAM, SNAPCHAT AND FACEBOOK? A.13 B.15 C.18 D.12.
Advertisements

MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
A PowerPoint Presentation by Helen Chelan Johnson.
Computer Skills and Applications Computer Security.
INTRODUCTION & QUESTIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
Digital Footprints By Erik Borge September 29, 2015.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Internet Safety.
Surf smart training.
AP CSP: Identifying People with Data and The Cost of Free
Combating Identity Fraud In A Virtual World
CYBERSECURITY SOLUTIONS
Creating your online identity
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
MEDIA LITERACY Isabelle M.
3 Do you monitor for unauthorized intrusion activity?
Social Media Security: Understanding how to keep yourself safe.
3.6 Fundamentals of cyber security
Six Steps to Secure Access for Privileged Insiders and Vendors
Hotspot Shield Protect Your Online Identity
Lesson Objectives Aims You should be able to:
Common Methods Used to Commit Computer Crimes
Digital Citizenship Middle School
How to use the internet safely and How to protect my personal data?
Information Security.
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Be Safe, use Password Protection Michael Hodges ITS, Identity and Access Management
Social Media as Instruments of Control and Consensus Making
Agenda Equifax data hack Best Buy stops selling Kaspersky
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Online Safety.
Online safety workshop for parents
Year 10 ICT ECDL/ICDL IT Security.
Talking about modern agriculture and why it matters.
Information Security Footprint.
Risk of the Internet At Home
Cyber Security Experts
K. HAAS, J. HUISMAN, P. KAPOOR, T. SZOCS
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Internet Safety – Social Media
SAGE Lecture Spark [3/5/19] The Publisher of the Social Sciences.
SAGE Lecture Spark [9/4/18] The Publisher of the Social Sciences.
SAGE Lecture Spark [11/06/18] The Publisher of the Social Sciences.
The Rapid Loss of Privacy in the Era of the Internet
SAGE Lecture Spark The Publisher of the Social Sciences.
SAGE Lecture Spark [8/27/18] The Publisher of the Social Sciences.
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Digital Citizen.
SAGE Lecture Spark The Publisher of the Social Sciences.
SAGE Lecture Spark [1/10/19] The Publisher of the Social Sciences.
Vulnerabilities in Mobile Applications and Input Systems
SAGE Lecture Spark The Publisher of the Social Sciences.
SAGE Lecture Spark [9/25/18] The Publisher of the Social Sciences.
3 Do you monitor for unauthorized intrusion activity?
Company Name | Phone Number | Website | Address
Vulnerabilities in Mobile Applications and Input Systems
CQ Press Lecture Spark March 26, 2018
Modern benefits administration and HR software, supported by us.
3 Do you monitor for unauthorized intrusion activity?
October is National Cybersecurity Awareness Month
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

SAGE Lecture Spark [10/2/18] The Publisher of the Social Sciences

Facebook Admits Hack Exposed Other Apps A recent hack of Facebook puts 50 million users’ personal data at risk. “But it later said that the problem would also affect its "Facebook Login" service, which allows other apps to use people's Facebook account to login.” This means connected apps such as Instagram, Tinder, and Pinterest can be affected. https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-hack-instagram-tinder-login-account-privacy-security-data-a8560761.html

Hack Reveals the Perils of Using a Single Account Login “There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, and they also want the same systems to be easily accessible.” Having multiple passwords is not a solution, but a start towards better security. http://theconversation.com/facebook-hack-reveals-the-perils-of-using-a-single-account-to-log-in-to-other-services-104227

FB Hack Could Hasten Regulation Senator Mark Warren writes, “This is another sobering indicator that Congress needs to step up and take action to protect the privacy and security of social media users. As I’ve said before – the era of the Wild West in social media is over.” You can read his full statement in this article. https://techcrunch.com/2018/09/28/facebook-breach-warner/

Why the Hack is a Disaster for Internet Security “A company with the resources and power of Facebook can be robbed of keys that allow access to millions of accounts across the web.” “[This has] also irrevocably tarnished the trust between internet denizens and the companies they rely on to keep their online lives private.” https://www.forbes.com/sites/thomasbrewster/2018/09/29/how-facebook-was-hacked-and-why-its-a-disaster-for-internet-security/#10dff0722033

The Fate of Online Trust in the Next Decade Half of respondents in a recent survey believe “Trust [online] will strengthen because systems will improve and people will adapt to them and more broadly embrace them.” A number of polled experts believe “Trust will diminish because the internet is not secure and powerful forces threaten individuals’ rights.” http://www.pewinternet.org/2017/08/10/the-fate-of-online-trust-in-the-next-decade/

Key Concepts Security in the Age of Social Media: We regularly see security scares online as our information is spread to more corners of the internet, and it becomes more difficult for many to keep track of and keep safe.  Many take for granted that their internet presence and information is protected. Security and hacking are an arms race in technology and technique, but in the process, users/consumers suffer.

Assessment Writing: Why is internet security important? Why is the security of our information on social media important? Debate: Is it the responsibility of Facebook users or Facebook to manage information and keep it safe? Is it simply a risk we all take on when we engage in social media? Poll: Do you believe internet security will get better in the next decade? Yes or No Short Answer: How do you now view Facebook, in light of recent hacks? Current Events Quiz How many people does the Facebook hack directly affect? Name some of the other sites the hack affects. Some members of Congress are now arguing the hack means the internet needs___? This hack has ___ the trust between internet users and the companies that protect their data. Speaking about the next decade, a number of polled internet experts predict trust online will___? Answers 50 Million Instagram and Tinder More regulation 4. Tarnished 5. Diminish

Quiz Time! Current Events Quiz How many people does the Facebook hack directly affect? Name some of the other sites the hack affects. Some members of Congress are now arguing the hack means the internet needs___? What percentage of Americans polled agreed that “poor people ‘have it easy because they can get government benefits without doing anything in return”? The news media’s approach to reporting on homeless people can cause ___, which increase public support for policies that make it difficult for the homeless to pull themselves out of poverty and get off the street. Current Events Quiz How many people does the Facebook hack directly affect? Name some of the other sites the hack affects. Some members of Congress are now arguing the hack means the internet needs___? This hack has ___ the trust between internet users and the companies that protect their data. Speaking about the next decade, a number of polled internet experts predict trust online will___? Answers 50 Million Instagram and Tinder More regulation 4. Tarnished 5. Diminish

https://www.youtube.com/watch?v=fSErHToV8IU James Lyne: Everyday cybercrime -- and what you can do about it How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminals, who exploit both weak code and trusting human nature.

hthttps://youtu.be/erCAp_Bd0AQ Hackers: the internet's immune system | Keren Elazari The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad guys, but many are working to fight government corruption and advocate for our rights. By exposing vulnerabilities, they push the Internet to become stronger and healthier, wielding their power to create a better world.