Download presentation
Presentation is loading. Please wait.
Published byCaroline Sutton Modified over 9 years ago
1
Social Networking and Protecting Your Identity
2
Popular Social Networks Myspace Facebook Youtube Twitter
3
Question: What type of information do people typically post on these sites?
4
Too Much Information? Name Address Phone Number Birthday Email Address School Likes/Dislikes Tagged Photos Status Updates Upcoming Events
5
Question: Who has access to this information?
6
Answer: Almost anyone with access to the internet: Peers Parents Potential Employers Predators College Admissions Coaches
7
Examples in the News McKinney North High School in Texas Cheerleaders posted inappropriate pictures on MySpace All of the cheerleaders were kicked off of the team
8
Examples in the News Eisenhower High School in New Berlin Anthony Stancl posed as a girl on Facebook 31 of his classmates sent him inappropriate pictures Many of the students who sent pictures were blackmailed by Stancl
9
Online Game: Fakebook http://www.smokescreengame.com/missio n/tmi/http://www.smokescreengame.com/missio n/tmi/
10
Question What is the definition of Phishing?
11
Answer: Phishing is a form of social engineering in which an attacker attempts to fraudulently acquire sensitive information from a victim by impersonating a trustworthy third party.
12
Social Phishing Attackers can exploit Social Networking Sites “Circle of friends” provides plenty of victims
13
Example of Phishing Scam
14
What Should You Do? Do not put information on your profile that you wouldn’t want your mother to see Control your privacy settings Do not “friend” people you do not know
15
Identity Theft Occurs when someone uses your personal identifying information. –Name –Address –Date of Birth –Social Security number –License Number –Credit card number
16
Identity Theft Cont. Federal Trade Commission (FTC) estimates as many as 9 million Americans are victims each year. Hundreds of dollars can be spent repairing damages to your good name or credit record. http://www.youtube.com/watch?v=Iy5jiYW uNKohttp://www.youtube.com/watch?v=Iy5jiYW uNKo
17
Different methods of Identity theft Non Technical –Dumpster Diving –Skimming –Changing Your Address –Old-Fashioned Stealing Technical –Phishing –Hacking –Malware –Password Cracking
18
Information Websites 123people.com Zaba search Maltego Domain Tools
19
Identity Theft Victims Should: –Place a fraud alert on your credit reports, and review your credit reports –Close the accounts that you know, or believe, have been tampered with or opened fraudulently –File a complaint with the Federal Trade Commission –File a report with your local police or the police in the community where the identity theft took place
20
JEOPARDY GAME!!! jeopardylabs.com/play/jeopardy2467
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.