Social Networking Practices
Information Security Purpose is to protect your information’s Confidentiality Integrity Availability
Platforms for Social Interaction Smart Phones Tablets Home PC Public PC Video Game Portal
Platforms for Social Interaction Blogs Chat Rooms Social Networks Online Gaming Text messaging
Examples of Social Networks Facebook Instagram Twitter Google+ MySpace Pinterest
Information Made Public Full Name Date of Birth Place of Birth Current Location Interests Phone Number Address Personal Pictures Relationships School information Can you think of any other information at risk?
Protecting Your Information
Ways to Protect Yourself Keep your information PRIVATE Be careful what you click on Use security software that updates automatically Create a secure password etworking.crimes/index.html
Privacy Familiarize yourself with the security and privacy settings Limit the information available Don’t post your address and phone number Limit who can view your information Only Friends and Family
Privacy Be careful what you post Don’t accept friend requests from strangers Learn how to report a compromised account
Be Careful What You Click On Many links available include: –Links to Surveys –Links to Videos –Pages “liked” by your friends –Links suggested by your friends
Brain Teaser
Be Careful What You Click On Links can redirect you to inappropriate sites Links may contain viruses –Virus can: Destroy your computer Access and release your information Expensive hassle for your parents
Protecting Yourself from Viruses Run Security Updates/Scans Frequently Scans detect: –Viruses –Trojan horses –Spyware –Other malicious software
Protecting Yourself from Viruses Examples of Security Software –McAfee –Norton AntiVirus –AVG –SpyBot S&D
Have a Secure Password!
Change your passwords frequently Use more than 8 characters –More Characters = Stronger Passwords Include special characters –Ex. %, $, etc. Use both upper and lower case characters –Ex. AbCdeF Components of a Strong Password faqs/131-components-strong-password
Components of a Strong Password Avoid using “dictionary” words or stereotypical passwords such as “password” Avoid using important dates or other meaningful information in your password Try using a passphrase instead of a password –“I8burger4d!NER” (I ate burger for dinner) faqs/131-components-strong-password
Pop Quiz Name one device to access social networking sites.
Pop Quiz What are some examples of personal information that can be made available on social networking sites?
Pop Quiz Name two ways to protect your personal information on your social networking site.
Pop Quiz What are the dangers of clicking on random links?
Pop Quiz How can you protect yourself from viruses?
Pop Quiz What are characteristics of a strong password?
Questions?