SlideShare une entreprise Scribd logo
1  sur  18
Secure SocialSecure Social
NetworkingNetworkingWhat is it and how to protect yourself and your childrenWhat is it and how to protect yourself and your children
Osaid To’meh
OverviewOverview
• What is Social Networking?
• The Good, the Bad and the Ugly
• How to protect yourself
• How to protect your children
What is SocialWhat is Social
Networking?Networking?
 Wikipedia
 A social network service focuses on building online
communities of people who share interests and/or
activities, or who are interested in exploring the interests
and activities of others.
 National Cyber Alert System
 “Social networking sites…build on the concept of
traditional social networks where you are connected to
new people through the people you already know.”
 “Friend of a Friend”
More definitionsMore definitions
 Web 2.0 – technology that “allows users to interact
with others and to change website content, in
contrast to non-interactive websites that are limited
to passive viewing of information.” (Wikipedia)
 Examples: social networking sites, video sharing sites, blogs, etc.
 Facebook & MySpace – free-access social
networking websites
 Twitter – “micro” blog – 140 characters or less
 Blog – shared on-line journal
 Video Sharing Sites – YouTube, Flikr
 Podcast – audio broadcast that can be
downloaded
The Good, the bad andThe Good, the bad and
the Uglythe Ugly
• The Good
o Networking
o Communicating
o Reconnecting with old friends
o Keeping up with family
o Business marketing and promotion
• i.e., TCU on Facebook, Twitter
o Entertaining and fun
Virginia Tech exampleVirginia Tech example
 After shooting rampage in 2007, campus in
lockdown mode, phone lines jammed,
website overloaded – students, faculty, staff
used “…MySpace and Facebook to get in
touch with family and friends outside
traditional channels.”
 Also used to “…send condolences, share
memories and gain closure.”
*SC Magazine, article “Social Anxiety”, page 21,
August 2009.
The Bad and the uglyThe Bad and the ugly
 Personal information could get in the wrong
hands.
 Phishing scams, viruses and spyware may
spread through social networks.
 Once you’ve posted something, others can
copy it or it may exist in cache, so that even
if you delete it, it may still exist and is out of
your control.
 Anti-social? If you spend all your time on the
computer.
More bad and uglyMore bad and ugly
• Internet provides sense on anonymity.
• Lack of physical contact may give false
sense of security.
• People may post information for friends to
read, forgetting that others may see it.
ExamplesExamples
 The case of a person asking for
emergency money while impersonating
a Facebook user to her friends.
 http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on-
facebook/
 Also the British MI6 chief that was
exposed by his wife’s Facebook pictures:
 http://www.dailymail.co.uk/news/article-1197562/MI6-chief-
blows-cover-wifes-Facebook-account-reveals-family-holidays-
showbiz-friends-links-David-Irving.html
How can you protectHow can you protect
yourself?yourself?
 Keep private information private
 Do not post address, ssn, phone number, financial info, your
schedule, full birth date
 Be careful not to display information used to answer security
questions (e.g., favorite pet, mother’s maiden name)
 Use caution when you click links
 Be careful about installing extras on your site
 Be wary of unknown friends (strangers)
 Google yourself
 Don’t blindly connect
 Trust your gut instinct
Protect yourself continuedProtect yourself continued
 Use and maintain anti-virus software
 Use strong passwords
 Don’t use the same password for a social
networking site and for your email
 Remember - social networking sites are a public
resource – like a billboard in cyberspace
 Evaluate sites privacy settings
 Lock down your profile information to people you accept as a friend.
That way no one can read your personal information unless they are an
approved friend.
protect your childrenprotect your children
“It’s 10 p.m., do you know where your
children are?”
 “And who they are talking to online?”
Age limits on some social networking sites
Facebook and MySpace open to people 13 and older
Twitter open to all
Protect Your ChildrenProtect Your Children
(continued)(continued)
 Talk to children about online safety
 Tell them to keep personal information
private
 Explain what personal information is (address, ssn, phone
number, schedule, birth date, etc.)
 And to not share personal information of their family or
their friends either.
 Caution them about sharing information such as school
name, sports teams, where they work, hang out or other
info that can be used to identify or locate them offline.
Protect your childrenProtect your children
(continued)(continued)
 More talking points
 Warn them to only be “friends”
with people they actually know
and are friendly with in real life.
 Talk to them about bullying
 Remind them that once they post information online, just
because they delete it, it might not be really gone.
 Warn about dangers of flirting with strangers online. Warn
about online sex talk.
 Tell them to trust their gut if suspicious.
Protect your childrenProtect your children
(continued)(continued)
 Keep the computer in an
open area, like the kitchen
or family room.
 Use the Internet with your
kids.
 Create a Facebook or MySpace
profile
 Be one of their “friends”
 Let your kids know that you are there
 Teach them how to act as they
socialize online
Protect your childrenProtect your children
(continued)(continued)
• Check their profile
o Check the privacy settings
o Review their list of friends
o Make sure their screen name doesn’t say too
much about them. It may be dangerous to use
full name, age or hometown.
Any Question?
Thank you.

Contenu connexe

Tendances

Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for ParentsJamie Tubbs
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldProjectsByJen.com
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital erabns_library
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Pogled kroz prozor
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of NetiquetteACLC Antipolo
 
Internet Safety
Internet SafetyInternet Safety
Internet Safetymcgeet
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersLarry Magid
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07E Robertson
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint bgmartinez1971
 

Tendances (20)

Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Internet Safety Program for Parents
Internet Safety Program for ParentsInternet Safety Program for Parents
Internet Safety Program for Parents
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Raising A Christian Child In A Digital World
Raising A Christian Child In A Digital WorldRaising A Christian Child In A Digital World
Raising A Christian Child In A Digital World
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Keeping kids safe in the digital era
Keeping kids safe in the digital eraKeeping kids safe in the digital era
Keeping kids safe in the digital era
 
Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)Dan sigurnijeg interneta (prezentacija)
Dan sigurnijeg interneta (prezentacija)
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07Safe Surfing 4Paras/Clerical Feb 07
Safe Surfing 4Paras/Clerical Feb 07
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
 

En vedette

Update on health workforce agencies
Update on health workforce agenciesUpdate on health workforce agencies
Update on health workforce agenciesC4WI
 
198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimiS. Zenbilci
 
D4E1 leeshulp montageplan
D4E1 leeshulp montageplanD4E1 leeshulp montageplan
D4E1 leeshulp montageplanbrownsuga288
 
CfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsCfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsC4WI
 
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013C4WI
 
Types of databases based on data structure
Types of databases based on data structureTypes of databases based on data structure
Types of databases based on data structureOsaid To'meh
 
Insights into future skills and competences
Insights into future skills and competencesInsights into future skills and competences
Insights into future skills and competencesC4WI
 
Planning your workforce for future uncertainty
Planning your workforce for future uncertaintyPlanning your workforce for future uncertainty
Planning your workforce for future uncertaintyC4WI
 
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationCfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationC4WI
 
Trend analysis presentation
Trend analysis presentationTrend analysis presentation
Trend analysis presentationwiechmanna
 

En vedette (17)

Update on health workforce agencies
Update on health workforce agenciesUpdate on health workforce agencies
Update on health workforce agencies
 
198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi198379 bilgisayar destekli plastik kalip tasarimi
198379 bilgisayar destekli plastik kalip tasarimi
 
D4E1 leeshulp montageplan
D4E1 leeshulp montageplanD4E1 leeshulp montageplan
D4E1 leeshulp montageplan
 
Pennsylvania law
Pennsylvania lawPennsylvania law
Pennsylvania law
 
CfWI conference 2012 poster finalists
CfWI conference 2012 poster finalistsCfWI conference 2012 poster finalists
CfWI conference 2012 poster finalists
 
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
Jamie Rentoul, Department of Health, CfWI Annual Conference 2013
 
Hack.privacy
Hack.privacyHack.privacy
Hack.privacy
 
Types of databases based on data structure
Types of databases based on data structureTypes of databases based on data structure
Types of databases based on data structure
 
MBI inventario de burnout
MBI inventario de burnoutMBI inventario de burnout
MBI inventario de burnout
 
New first amendment
New first amendmentNew first amendment
New first amendment
 
Pandora
PandoraPandora
Pandora
 
Insights into future skills and competences
Insights into future skills and competencesInsights into future skills and competences
Insights into future skills and competences
 
Planning your workforce for future uncertainty
Planning your workforce for future uncertaintyPlanning your workforce for future uncertainty
Planning your workforce for future uncertainty
 
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash PresentationCfWI Annual conference 2013 - Sir Andrew Cash Presentation
CfWI Annual conference 2013 - Sir Andrew Cash Presentation
 
4th amendment
4th amendment4th amendment
4th amendment
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 
Trend analysis presentation
Trend analysis presentationTrend analysis presentation
Trend analysis presentation
 

Similaire à Secure social networking

Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Childcpitchford
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents PresentationToby Treacher
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 ParentsAaron Puley
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundStephanie Barnhart
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe onlineamulhall
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentationalexfinvle
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 

Similaire à Secure social networking (20)

CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Internet Safety for Your Child
Internet Safety for Your ChildInternet Safety for Your Child
Internet Safety for Your Child
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Kia Parents Presentation
Kia Parents PresentationKia Parents Presentation
Kia Parents Presentation
 
Digitize Me
Digitize MeDigitize Me
Digitize Me
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 Parents
 
Online Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber PlaygroundOnline Social Networking 101: Monitoring Your Child's Cyber Playground
Online Social Networking 101: Monitoring Your Child's Cyber Playground
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
Keeping your child safe online
Keeping your child safe onlineKeeping your child safe online
Keeping your child safe online
 
Know it All - Parents eSafety Presentation
Know it All - Parents eSafety PresentationKnow it All - Parents eSafety Presentation
Know it All - Parents eSafety Presentation
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Secure social networking

  • 1. Secure SocialSecure Social NetworkingNetworkingWhat is it and how to protect yourself and your childrenWhat is it and how to protect yourself and your children Osaid To’meh
  • 2. OverviewOverview • What is Social Networking? • The Good, the Bad and the Ugly • How to protect yourself • How to protect your children
  • 3. What is SocialWhat is Social Networking?Networking?  Wikipedia  A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others.  National Cyber Alert System  “Social networking sites…build on the concept of traditional social networks where you are connected to new people through the people you already know.”  “Friend of a Friend”
  • 4. More definitionsMore definitions  Web 2.0 – technology that “allows users to interact with others and to change website content, in contrast to non-interactive websites that are limited to passive viewing of information.” (Wikipedia)  Examples: social networking sites, video sharing sites, blogs, etc.  Facebook & MySpace – free-access social networking websites  Twitter – “micro” blog – 140 characters or less  Blog – shared on-line journal  Video Sharing Sites – YouTube, Flikr  Podcast – audio broadcast that can be downloaded
  • 5. The Good, the bad andThe Good, the bad and the Uglythe Ugly • The Good o Networking o Communicating o Reconnecting with old friends o Keeping up with family o Business marketing and promotion • i.e., TCU on Facebook, Twitter o Entertaining and fun
  • 6. Virginia Tech exampleVirginia Tech example  After shooting rampage in 2007, campus in lockdown mode, phone lines jammed, website overloaded – students, faculty, staff used “…MySpace and Facebook to get in touch with family and friends outside traditional channels.”  Also used to “…send condolences, share memories and gain closure.” *SC Magazine, article “Social Anxiety”, page 21, August 2009.
  • 7. The Bad and the uglyThe Bad and the ugly  Personal information could get in the wrong hands.  Phishing scams, viruses and spyware may spread through social networks.  Once you’ve posted something, others can copy it or it may exist in cache, so that even if you delete it, it may still exist and is out of your control.  Anti-social? If you spend all your time on the computer.
  • 8. More bad and uglyMore bad and ugly • Internet provides sense on anonymity. • Lack of physical contact may give false sense of security. • People may post information for friends to read, forgetting that others may see it.
  • 9. ExamplesExamples  The case of a person asking for emergency money while impersonating a Facebook user to her friends.  http://eliasbizannes.com/blog/2009/01/phishing-for-fraud-on- facebook/  Also the British MI6 chief that was exposed by his wife’s Facebook pictures:  http://www.dailymail.co.uk/news/article-1197562/MI6-chief- blows-cover-wifes-Facebook-account-reveals-family-holidays- showbiz-friends-links-David-Irving.html
  • 10. How can you protectHow can you protect yourself?yourself?  Keep private information private  Do not post address, ssn, phone number, financial info, your schedule, full birth date  Be careful not to display information used to answer security questions (e.g., favorite pet, mother’s maiden name)  Use caution when you click links  Be careful about installing extras on your site  Be wary of unknown friends (strangers)  Google yourself  Don’t blindly connect  Trust your gut instinct
  • 11. Protect yourself continuedProtect yourself continued  Use and maintain anti-virus software  Use strong passwords  Don’t use the same password for a social networking site and for your email  Remember - social networking sites are a public resource – like a billboard in cyberspace  Evaluate sites privacy settings  Lock down your profile information to people you accept as a friend. That way no one can read your personal information unless they are an approved friend.
  • 12. protect your childrenprotect your children “It’s 10 p.m., do you know where your children are?”  “And who they are talking to online?” Age limits on some social networking sites Facebook and MySpace open to people 13 and older Twitter open to all
  • 13. Protect Your ChildrenProtect Your Children (continued)(continued)  Talk to children about online safety  Tell them to keep personal information private  Explain what personal information is (address, ssn, phone number, schedule, birth date, etc.)  And to not share personal information of their family or their friends either.  Caution them about sharing information such as school name, sports teams, where they work, hang out or other info that can be used to identify or locate them offline.
  • 14. Protect your childrenProtect your children (continued)(continued)  More talking points  Warn them to only be “friends” with people they actually know and are friendly with in real life.  Talk to them about bullying  Remind them that once they post information online, just because they delete it, it might not be really gone.  Warn about dangers of flirting with strangers online. Warn about online sex talk.  Tell them to trust their gut if suspicious.
  • 15. Protect your childrenProtect your children (continued)(continued)  Keep the computer in an open area, like the kitchen or family room.  Use the Internet with your kids.  Create a Facebook or MySpace profile  Be one of their “friends”  Let your kids know that you are there  Teach them how to act as they socialize online
  • 16. Protect your childrenProtect your children (continued)(continued) • Check their profile o Check the privacy settings o Review their list of friends o Make sure their screen name doesn’t say too much about them. It may be dangerous to use full name, age or hometown.

Notes de l'éditeur

  1. Facebook has over 300 million users.