Social Networking Student # 97106283. The History Over the past 15 to 20 social networking sites have increased due to popularity. Today over 350 sites.

Slides:



Advertisements
Similar presentations
Is This You? Internet Safety Day
Advertisements

Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Privacy: Facebook, Twitter
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
Social Media Basic Phil Abraham 3/20/15. TITLE | 2 BIO.
Teenagers and The Internet Ms Julie Clune Saint Ignatius’ College.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
1 Web 2.0 Presenter: Katie Cunningham Date: February 11, 2009 National Aeronautics and Space Administration
HICSS Socialware - Cathy Dwyer1 Social networking site for the general public Cathy Dwyer Pace University
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Chapter 1 Communicating in Your Life
Digital Self Defense How well do YOU know Information Security? How well do YOU know Information Security?
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Information Assurance Outreach. Overview Survey Results Password Security Safety Internet Privacy Social Media Privacy and Safety Technology Demonstration.
Social Networking – The Ways and Means Rosey Broderick May 2011.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
+ The Future of Social Media By Abigail Boghurst.
Trevor Harris Safe T Training and Consultancy. Adults often have anxieties about new technology but… Everything that’s already in the world when you’re.
Introduction Our Topic: Mobile Security Why is mobile security important?
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Jennifer Carter RCMS Spring 2012 COWBOY CIRCUIT: Electronic Safety & Your Teen.
St Meryl School e-Safety Presentation for Parents 16 th June 2015 Mr Davies (Computing Subject Leader)
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
By Ksenia Primizenkina 8K
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
This Presentation Evening is designed to inform you about any potential threats that your children could find themselves when online. At no point is it.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Social Networks Cyberbullying Techno Addiction Digital footprint Spam Internet shopping The positive side Netiquette.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Aware the Effect of Social Network For 1 Malaysia’s Safety Towards A Healthy Virtual Socialization.
Cyber Bullying By Sarah Chaouk and Astede Woldegebriel.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.

Amanda Lenhart, Senior Researcher, Director of Teens & Technology Mary Madden, Senior Researcher Pew Research Center Family Online Safety Institute November.
 Introduction to Computing  Computer Programming  Terrorisom.
Should employers have access to your social feeds?
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Helping your family to stay in control Living with technology.
Social Media Facebook and Twitter. UEL3N7FDS&SAFE=ACTIVE The Social Media Revolution.
+ The Cincinnati Herald Social Media Strategies Lauren Justice.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Presented By: Sambaran Basu & Ankita Ghosh. Social NetworkING.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Technology Tips and Safety for Teens. Social Networks Social Networks are internet applications which are used to facilitate communication between users.
Dial For Twitter Support Number. How to Join Twitter to Use for Business and Marketing? While the registered users can post and share tweets,
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
WELCOME TO POPPY ROAD’S SAFER INTERNET DAY
Creating your online identity
Social Media Attacks.
What does your digital footprint say about you?
Information Security.
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
Sharing on the Internet
Cybersecurity Am I concerned?
4.6 Me Online I know that popular culture, the media and peer pressure can influence how I feel about myself and the impact this may have on my actions.
Internet Safety – Social Media
WELCOME AOI Tech Solutions Get Instant Tech Help & Support.
WELCOME AOI Tech Solutions - Network Security.
SLIDE DECK 5: Informed Citizenship.
Presentation transcript:

Social Networking Student #

The History Over the past 15 to 20 social networking sites have increased due to popularity. Today over 350 sites exist which cover ever topical interest. New web technologies allow for user interaction.

Combining element of web 2.0 User Generated Many to many relationships Distributed Digital Media

Types of Users Many of the methods discussed out line that users may be aware but are unwilling to break with peer pressure and often fall into specific user categories. Users who choose social networking sites to socialise and meet others Attention seekers are individuals who often seek the attentions of others and make comments towards other so that they will get noticed venture into SNS in order to keep up with what going on amongst their friends and associates but never really contribute to what is taking place but watch from a distance. Reacquaint themselves with friends from their past that they have lost contact with Not being particularly interested in the social networking sites themselves, but their membership is the result of peer pressure

Have you read the Terms of use with in the chosen social networking site Users should always read the terms and conditions before getting involved with social networking and other sites as this allows them to see what happens to their confidential information. User awareness

Users personal information D.O.B, location, Name, Gender and Mobile number, etc

User Vulnerabilities 2 versions of the Facebook Photography programs affected Hacker Croll – May 2009 obtains the details from the wife's twitter account High profile Britney Spears, Barack Obama, Rick Sanchez, Fake information sent to users to capture various user information SQL Injection, which accounted for 19% of the total incidents JavaScript-based, Samy worm, Kamkar to attain more than one million "friends" in 24 hours on my space

User Safeguards The user can safeguard them selves from the social networking vulnerabilities in many ways. Having updates assist with the protection of the users computer and protected them from common malware Having the system set to update its self with the latest critical and moderate patches will make sure the system stays clean from vulnerabilities that could otherwise be allowed to affect an unpatched system. Making sure authorisation of passwords for the account is paramount to the security. breaches here will often allow the person to gain access into other areas or sites so a combination of different charters, numbers and symbols should be used Only post information into these sites that you believe will not have an adverse affect to your personal life and safety as an individual The posting of photographic information should be kept to minimum and only shown to individuals that are friends, images that were not intended for the internet should never be placed onto these sites. Making sure that only friends who are true friends are allowed to view information within social networking site. Adding others friends with in social networking site without knowing them may lead to many types of social networking attacks.

Any Questions Please