Download presentation
Presentation is loading. Please wait.
Published byStephanie Singleton Modified over 8 years ago
1
Technological Awareness for Teens and Young Adults
2
What is Social Networking? Social Networking is a social structure made of individuals who are tied by specific types of relationships. –Facebook –Myspace –Twitter –Flickr –Youtube
3
What Not to Share Anything you wouldn’t be comfortable having your family see –Inappropriate photos –Offensive comments or language –Personal Information Birth Date Home Address Vacation Plans Favorite Activities Information that could be used to answer security questions
4
Who Does this Apply to? Everybody –Even if you don’t have a social networking account you can be impacted by what others post about you Student Athletes are in the spotlight more then average students –Held to a higher standard –Role models for other students
5
Consequences of Inappropriate Use College Admissions Decisions –1 in 10 college admissions officers routinely check applicants social networking pages 38% found information that reflected poorly on the students Employment Decisions –34% of hiring managers have chosen not to hire a candidate based on information in their social network profiles
6
Consequences of Inappropriate Use Suspension/Expulsion of athletic privileges –Two Nebraska wrestlers kicked off team over inappropriate photos –Michael Phelps suspended from competition for 3 months over photos depicting illegal drug use Legal Consequences –pictures from Facebook were used to cite violators of university alcohol policy at North Carolina State University
7
Inappropriate Use of Electronic Communication Don’t assume text message and emails are private communication –Anything sent through the methods is permanent –Software can be installed on phones that alert a third party to content being sent and received on the phone including photos and text messages
8
Text Messaging Sexting is send nude pictures via text message –20% of teenagers admit to engaging in sexting Messages can be forwarded to unintended recipients 6 Pennsylvania teenagers charged with child pornography as a result of sexting
9
Online Information Protection Transition from high school to adult lives involves greater use of online accounts –Financial Information –Registering for College –Job Applications –Shopping
10
Password Selection Complex passwords are harder to guess –Include capital and lowercase letters –Include numbers –Include special characters Change passwords regularly Don’t share passwords with ANYONE Used different passwords for different accounts
11
Password Strength Most commonly used password: “password” –How long would it take to guess this password that only uses lower case letters? A better alternative: “P@ssw0rd” –How long would it take to guess this password that uses lower and upper case letters, numbers, and special symbols?
12
Hacker Techniques Phishing –Emails asking you to verify account or personal information Banks and financial institutions will never ask you to do this over the internet Social Engineering –People can probe you for information that can lead to your account being compromised –Retrieving information from social networking profiles
13
Hacker Techniques Dictionary Attacks –Programs that check passwords that are commonly used Spyware and Viruses –Programs that be installed on you computer without your knowledge Monitor keystrokes Track internet activity
14
Computer and Document Protection Threats to your computer –Theft –Hardware Failure –Data Corruption –Virus/Spyware –User Access Controls
15
How to Protect your Computer Use and frequently update antivirus software Install windows updates and software updates when they become available Only install reputable and licensed software Check the source of emails before downloading attachments Avoid questionable websites
16
How to Protect your Computer Require password protection when starting computer Use Strong Passwords Lock the screen or logout when you walk away from your computer Back up important files on external media
17
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.