Download presentation
Presentation is loading. Please wait.
Published byOswald Ambrose Rose Modified over 8 years ago
1
Social Networking Practices
2
Information Security Purpose is to protect your information’s Confidentiality Integrity Availability
3
Platforms for Social Interaction Smart Phones Tablets Home PC Public PC Video Game Portal
4
Platforms for Social Interaction Blogs Chat Rooms Social Networks Online Gaming Text messaging
5
Examples of Social Networks Facebook Instagram Twitter Google+ MySpace Pinterest
6
Information Made Public Full Name Date of Birth Place of Birth Current Location Interests Phone Number Email Address Personal Pictures Relationships School information Can you think of any other information at risk?
7
Protecting Your Information
8
Ways to Protect Yourself Keep your information PRIVATE Be careful what you click on Use security software that updates automatically Create a secure password http://www.cnn.com/2009/CRIME/10/19/social.n etworking.crimes/index.html
9
Privacy Familiarize yourself with the security and privacy settings Limit the information available Don’t post your address and phone number Limit who can view your information Only Friends and Family
10
Privacy Be careful what you post Don’t accept friend requests from strangers Learn how to report a compromised account
11
www.facebook.com/hacked
12
Be Careful What You Click On Many links available include: –Links to Surveys –Links to Videos –Pages “liked” by your friends –Links suggested by your friends
13
Brain Teaser
14
Be Careful What You Click On Links can redirect you to inappropriate sites Links may contain viruses –Virus can: Destroy your computer Access and release your information Expensive hassle for your parents
15
Protecting Yourself from Viruses Run Security Updates/Scans Frequently Scans detect: –Viruses –Trojan horses –Spyware –Other malicious software
16
Protecting Yourself from Viruses Examples of Security Software –McAfee –Norton AntiVirus –AVG –SpyBot S&D
17
Have a Secure Password!
18
Change your passwords frequently Use more than 8 characters –More Characters = Stronger Passwords Include special characters –Ex. #, @, %, $, etc. Use both upper and lower case characters –Ex. AbCdeF Components of a Strong Password http://www.integritysrc.com/faqs/security- faqs/131-components-strong-password
19
Components of a Strong Password Avoid using “dictionary” words or stereotypical passwords such as “password” Avoid using important dates or other meaningful information in your password Try using a passphrase instead of a password –“I8burger4d!NER” (I ate burger for dinner) http://www.integritysrc.com/faqs/security- faqs/131-components-strong-password
21
Pop Quiz Name one device to access social networking sites.
22
Pop Quiz What are some examples of personal information that can be made available on social networking sites?
23
Pop Quiz Name two ways to protect your personal information on your social networking site.
24
Pop Quiz What are the dangers of clicking on random links?
25
Pop Quiz How can you protect yourself from viruses?
26
Pop Quiz What are characteristics of a strong password?
27
Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.