Social Networking Systems: Education Awareness Briefing.

Slides:



Advertisements
Similar presentations
Instant Messages: I am bored. Social Networks: Facebook, Myspace.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Developed by Technology Services 1:1 Laptop Initiative
Primary Threats to Computer Security
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
The Internet.
1 Identity Theft and Phishing: What You Need to Know.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
The Internet = A World of Opportunities
What do I need to know?.   Instant Messages  Social Networking.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Protecting Our Personal Space Security in a Virtual World.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Donette Mullinix ED 505 UWA Clipart:
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Julie Latham Digital Citizenship: An Informational Guide.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Internet Safety.
Fraud Protection.
Fraud protection.
Lesson 2- Protecting Yourself Online
CYBERSAFETY & Personal information
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Presentation transcript:

Social Networking Systems: Education Awareness Briefing

The Internet has changed the way we communicate. Increasingly, individuals are looking to the web as their primary source of news and information. Emerging Internet-based Social Networking Systems offer both opportunities and risks that need to be balanced in ways that provide an information advantage for our people and mission partners.

Briefing Subjects: Introduction to Social Networking Managing Your Social Network Profile Identity Theft Other IT Risks & Threats Best Practices to lower your risks Q&A Session

Introduction to Social Networking What is Social Networking? Picking the right Social Network What is a blog? (Twitter – Linked-In – MySpace, etc.) Blogs & Blogging: Tips & Best Practices Understand the Rules of Engagement Review

Picking the right Social Network

What is a blog? Web log = Blog It’s Spontaneous! Dated Entries Online Journals Thoughts and comments Archiving **Be careful what you post** - records remain on servers even after deleting entries

Communicate safely Maintain confidentiality – address, mobile numbers can be seen publicly if profile settings are not set correctly Market yourself intelligently Know what others are saying about you Establish thought leadership Gaining credibility & readability – your employer may check on you before or after an interview and make a decision based on what they read about you Tips and Best Practices when Blogging

Managing Your Social Network Profile

Understand the Rules of Engagement Everything you do is public. (and remains public e.g. historical websites) Appropriate profile pictures. Research the other SNS features. You don’t know who you are talking with so, keep conversations light. Not everyone is your friend. Know the difference between public and private. o Public: Allows everyone to read your conversation with a friend or chat on their profile/wall. o Private: Saves it as private message between you and your friend. If you receive a group , only reply to the person who sent it. Never open an attachment unless you know who it is from.

An Example of Posting too much Information

Be safe...be smart Not everyone is your friend Know the rules Understand the dangers Don’t give out too much information Report misuse immediately Review the terms and conditions of the Social Network site before you register and commit to their site Be extremely cautious as to whom you allow access to your profile Security Guidelines & Principles

What is Personally Identifiable Information (PII)? Personally Identifiable Information is pieces of information that can be used to distinguish or trace someone’s identity. Some examples of PII include: Social Security Number Home/office phone numbers Age Biometric Military rank or civilian grade Personnel information Marital status Medical information Race Financial information SalaryOther demographic information

Identity Check Mechanisms Knowledge Based Dynamic Knowledge Based Out of Bounds (OOB)

How Identity Theft Happens Too Much Information on Social Networking Sites Dumpster Diving Various Man-In-The-Middle Attacks Cookies and Phishing Attacks Social Engineering Responding to Spam

Social Engineering

Examples of dangerous spam

Examples of dangerous Spam When you hover over link it shows

Examples of dangerous spam

Consequences of Identity Theft Opening credit card accounts in your name using a false address Establishing phone or wireless service in your name Opening bank accounts and write bad checks in your name Taking out loans in your name Or worse…

Avoid sharing too much information on the Internet Shred or tear up ALL unneeded receipts Order a copy of your credit report annually and review it Minimize your Risk

Know when to keep conversations light Know when to ask “why” when someone requests information from you Remember “Need to Know” and “Non Disclosure” principles Private conversations are not always “private” Be careful what you say in a public forum on a SN site Understand the Principles of Confidentiality

Other IT Security Risks Virus / Worms / Trojans Keyloggers USB Security Risks Wifi Bluetooth VoIP

Practice Internet Behavior That Lowers Your Risk Delete spam without opening it Advise: Never reply to spam Technology can help you identify spam so you can delete it o Antispyware o Antivirus software Many Internet providers delete it for you

Signs that can alert you to scams: Alarming messages and threats of account closures Promises of big bucks for little effort Deals that sound too good to be true Misspellings and grammatical errors Practice Internet Behavior That Lowers Your Risk cont…

Delete s that request personal information Do not use or instant messages to share personal information Manage Personal Information Carefully

Use Technology to Reduce Nuisances, and Raise the Alarm When Appropriate Use strong passwords o Create passwords that are hard to crack. o Use at least eight characters, and combine letters, numbers, and symbols. Advise: Never share your passwords with anyone Advise: Never passwords Smartcards Use biometrics

Turn on you System’s firewall Keep your operating system up to date Install and maintain antivirus software Install and maintain antispyware software Ways to protect your personal computer

Back up your files regularly Think before you click Read website privacy statements Close pop-ups using red “X” Ways to protect your personal computer cont…

Questions?