SlideShare a Scribd company logo
1 of 4
Download to read offline
 
 
 
 
 
 
 
 
 

 
 
 
 

facebook
 
 
 
 
 
 
 
 
 
 

Maya EL Kik 
Security  is  “the  state  of  being  free  from  danger  or  threat:  the  system  is  designed  to  provide 
maximum  security  against  toxic  spills”.  Nowadays,  we  always  need  to  be  the  most  secured 
especially on the internet. As we know, there are many social Medias that became a part of our 
life like Facebook, Twitter and Skype etc.  
Let’s see an example for being secured on Facebook: 
 
Code generator is like a password after logging in but only if we logged in from another device 
or computer. A message is directly sent to our mobile so Facebook can be assured that we are, 
personally, logging in. After sending the code on the mobile, we put it in the blank box and we 
continue normally. And if the mobile wasn’t with the user, a notification is automatically sent to 
him that determinates the region from which the hacker was trying to log in. 
How to find code generator? 
 
Step #1: Go to Settings and choose Account settings. 
Step #2: Once we see General Account Settings, look at the left of the page and choose Security. 
Step #3: Now that the Security page has opened, choose Code Generator and click on the right Edit. 
Step #4: Pick Enable and a small box appears in which we can see some instructions given by Facebook. 
After reading what’s written inside the box, click continue. 
Step  #5:  A  second  box  appears  on  the  screen  in  which  Facebook  asks  to  enter  the  security  code  that 
appears on the phone in the blank box. Once the code is placed, click confirm.  
At  this  moment  Code  Generator  is  enabled.  Everytime  you  log  in  from  another  mobile  or  computer, 
Facebook sends us a message on our own mobile to make sure that we are personally logging in. 
Here an example:  
1. Write your email and your password from another phone and click log in. 

My friend’s 
mobile 

My mobile 

                      

 
1 

 
2. A small box appears on the screen in which Facebook mentions that we will get shortly an SMS 
with a code. 

 
 
3. In a while, an SMS is received on our phone from Facebook that includes a code. 

 
 
 
 
 
2 
 
4. Place the code in the blank box and then Continue. 

 
5. Here you are logged in into your account, Safely. 

 
3 
 

More Related Content

What's hot

Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
Daniel Owens
 

What's hot (20)

Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
Ransomware - TAIT knowledge Series
Ransomware - TAIT knowledge SeriesRansomware - TAIT knowledge Series
Ransomware - TAIT knowledge Series
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Staying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘NetStaying Safe, Having Fun, And Cruising The ‘Net
Staying Safe, Having Fun, And Cruising The ‘Net
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 

Viewers also liked

Viewers also liked (20)

art des Foulards
art des Foulardsart des Foulards
art des Foulards
 
Marshmallow d' Elianore zgheib
Marshmallow d' Elianore zgheibMarshmallow d' Elianore zgheib
Marshmallow d' Elianore zgheib
 
People Suck! Pizza Understands!Pizza is here for you
People Suck! Pizza Understands!Pizza is here for youPeople Suck! Pizza Understands!Pizza is here for you
People Suck! Pizza Understands!Pizza is here for you
 
Apprendre c est aimer faire
Apprendre c est aimer faireApprendre c est aimer faire
Apprendre c est aimer faire
 
Saroukh Volant dans le ciel :Daniel farah
Saroukh Volant dans le ciel :Daniel farahSaroukh Volant dans le ciel :Daniel farah
Saroukh Volant dans le ciel :Daniel farah
 
Gâteau rayane chaaya
Gâteau rayane chaayaGâteau rayane chaaya
Gâteau rayane chaaya
 
Démarer une voiture
Démarer une voiture Démarer une voiture
Démarer une voiture
 
Une boite originale
Une boite originaleUne boite originale
Une boite originale
 
Cake pops
Cake pops Cake pops
Cake pops
 
Dansons ensemble Dabke par rana haddad
Dansons ensemble Dabke par rana haddadDansons ensemble Dabke par rana haddad
Dansons ensemble Dabke par rana haddad
 
Cadre original
Cadre originalCadre original
Cadre original
 
Gateau au Chocolat marbre de Vanille
Gateau au Chocolat marbre de VanilleGateau au Chocolat marbre de Vanille
Gateau au Chocolat marbre de Vanille
 
Hypertension
Hypertension Hypertension
Hypertension
 
Fish tail
Fish tail Fish tail
Fish tail
 
Le taboulé
Le taboulé Le taboulé
Le taboulé
 
All about drums
All about drumsAll about drums
All about drums
 
The Magical Pasta
The Magical PastaThe Magical Pasta
The Magical Pasta
 
Dessiner un visage
Dessiner un visageDessiner un visage
Dessiner un visage
 
Bougie en Boumalie
Bougie en BoumalieBougie en Boumalie
Bougie en Boumalie
 
FASHION SCARF TUTORIAL
FASHION SCARF TUTORIALFASHION SCARF TUTORIAL
FASHION SCARF TUTORIAL
 

Similar to Facebook Security

Part Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docxPart Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docx
write4
 
Looking at information security from different perspectives
Looking at information security from different perspectivesLooking at information security from different perspectives
Looking at information security from different perspectives
Edgard Chammas
 

Similar to Facebook Security (20)

CYBER AWARENESS.pptx cyber security ppt harika
CYBER AWARENESS.pptx cyber security ppt harikaCYBER AWARENESS.pptx cyber security ppt harika
CYBER AWARENESS.pptx cyber security ppt harika
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Two
TwoTwo
Two
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Protecting your pc in the new year
Protecting your pc in the new yearProtecting your pc in the new year
Protecting your pc in the new year
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Bi
BiBi
Bi
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Part Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docxPart Security Threats A Facebook data breach revealed more.docx
Part Security Threats A Facebook data breach revealed more.docx
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
How to use microsoft authenticator app
How to use microsoft authenticator appHow to use microsoft authenticator app
How to use microsoft authenticator app
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Looking at information security from different perspectives
Looking at information security from different perspectivesLooking at information security from different perspectives
Looking at information security from different perspectives
 

More from elianeycom

More from elianeycom (20)

Le secret de sa beaute (tresse) par Christina chalhoub
Le secret de sa beaute (tresse) par Christina chalhoubLe secret de sa beaute (tresse) par Christina chalhoub
Le secret de sa beaute (tresse) par Christina chalhoub
 
PumpKin by Angela ghanimeh
PumpKin by Angela ghanimehPumpKin by Angela ghanimeh
PumpKin by Angela ghanimeh
 
Cute dress for women by Tania ghanem
Cute dress for women by Tania ghanemCute dress for women by Tania ghanem
Cute dress for women by Tania ghanem
 
L’ART DES CHEVEUX! par Stephanie yazbeck
L’ART DES CHEVEUX! par Stephanie yazbeckL’ART DES CHEVEUX! par Stephanie yazbeck
L’ART DES CHEVEUX! par Stephanie yazbeck
 
How to be a fashion designer! by Sandra nassif
How to be a fashion designer! by Sandra nassifHow to be a fashion designer! by Sandra nassif
How to be a fashion designer! by Sandra nassif
 
Un Bon Goût de Tiramissou par Rachelle el khoury
Un Bon Goût de Tiramissou par Rachelle el khouryUn Bon Goût de Tiramissou par Rachelle el khoury
Un Bon Goût de Tiramissou par Rachelle el khoury
 
LE PETIT JERRY de Nadine bathich
LE PETIT JERRY de Nadine bathichLE PETIT JERRY de Nadine bathich
LE PETIT JERRY de Nadine bathich
 
CREPES JOY!
CREPES JOY!CREPES JOY!
CREPES JOY!
 
Fattouch de Jessica sfeir
Fattouch de Jessica sfeirFattouch de Jessica sfeir
Fattouch de Jessica sfeir
 
FOULARD ORIGINALE d' Elia lahoud
   FOULARD ORIGINALE d' Elia lahoud   FOULARD ORIGINALE d' Elia lahoud
FOULARD ORIGINALE d' Elia lahoud
 
Une Petite Boule Pour Un Bon Gout
Une Petite Boule Pour Un Bon GoutUne Petite Boule Pour Un Bon Gout
Une Petite Boule Pour Un Bon Gout
 
Apprendre la photographie
Apprendre la photographieApprendre la photographie
Apprendre la photographie
 
A cuisiner
A cuisinerA cuisiner
A cuisiner
 
Comment faire un tutoriel
Comment faire un tutoriel Comment faire un tutoriel
Comment faire un tutoriel
 
Crepe
CrepeCrepe
Crepe
 
La géante botte rouge de Noel
La géante botte rouge de NoelLa géante botte rouge de Noel
La géante botte rouge de Noel
 
UNE ENVELOPPE STYLE "ELISSA"
UNE ENVELOPPE STYLE "ELISSA"UNE ENVELOPPE STYLE "ELISSA"
UNE ENVELOPPE STYLE "ELISSA"
 
Sapin qu' om peut manger
Sapin qu' om peut mangerSapin qu' om peut manger
Sapin qu' om peut manger
 
Bracelets
Bracelets Bracelets
Bracelets
 
Box de Noel
Box de Noel Box de Noel
Box de Noel
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Facebook Security

  • 2. Security  is  “the  state  of  being  free  from  danger  or  threat:  the  system  is  designed  to  provide  maximum  security  against  toxic  spills”.  Nowadays,  we  always  need  to  be  the  most  secured  especially on the internet. As we know, there are many social Medias that became a part of our  life like Facebook, Twitter and Skype etc.   Let’s see an example for being secured on Facebook:    Code generator is like a password after logging in but only if we logged in from another device  or computer. A message is directly sent to our mobile so Facebook can be assured that we are,  personally, logging in. After sending the code on the mobile, we put it in the blank box and we  continue normally. And if the mobile wasn’t with the user, a notification is automatically sent to  him that determinates the region from which the hacker was trying to log in.  How to find code generator?    Step #1: Go to Settings and choose Account settings.  Step #2: Once we see General Account Settings, look at the left of the page and choose Security.  Step #3: Now that the Security page has opened, choose Code Generator and click on the right Edit.  Step #4: Pick Enable and a small box appears in which we can see some instructions given by Facebook.  After reading what’s written inside the box, click continue.  Step  #5:  A  second  box  appears  on  the  screen  in  which  Facebook  asks  to  enter  the  security  code  that  appears on the phone in the blank box. Once the code is placed, click confirm.   At  this  moment  Code  Generator  is  enabled.  Everytime  you  log  in  from  another  mobile  or  computer,  Facebook sends us a message on our own mobile to make sure that we are personally logging in.  Here an example:   1. Write your email and your password from another phone and click log in.  My friend’s  mobile  My mobile                           1