SlideShare a Scribd company logo
1 of 37
Social & 
Mobile Security 
Social & Mobile 
Security 
networkpaladin.org 
IT Security Director City of Chattanooga 
MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, 
Server+, A
Social Media is #1
CIRP Freshman Survey Results 
Cooperative Institutional Research Program 
 Toxic psychological impact of media 
 faux celebrities—lead actors in fictionalized life 
 F acebook “friends” 
 Block anyone 
 Only flattering, photos 
 Connect with famous 
Social & Mobile 
Security 
More students think they are exceptional or gifted than what they can actually perform
Youth vs Adult Reality 
•Parents feel better informed about teens’ online 
activity (29 point Gap) 
•How closely do your parents follow or monitor 
what you do online or on a cell phone? (45 point Gap ) 
•Social networking sites like Facebook (18 point Gap) 
•Twitter (24 point Gap) 
•Email, Youtube, Instagram (10 point Gap) 
•Two in five teens admit to having posted something 
online that they later regretted
Ensure Your Loved Ones 
Are Protected From 
Ongoing Threats By: 
(1) Educating Yourself 
(2) Setting Guidelines 
& 
(3) Installing Parental 
Control Software
Communicate Monitor Report 
COMMUNICATION
Establish rules for online life
Internet 10 Startling Trends 
Feelings similar to drug addiction craving, very anxious, antsy, miserable, jittery, crazy 
College students highly susceptible to Internet Dependence 
Students can’t go 24 
Students are surfing, 38% can’t go more than 10 minutes 
Internet use can physically change your brain 
Many students need intervention for addiction, 
Leads to depression 
Tech conditions can be dangerous to your health CTS, Headaches, Eyesight insomnia 
Social & Mobile 
Security
Social Media Challenges 
Fundamentally shifting how we communicate to: 
Sound bites laced with a dizzying array of fragments and acronyms 
Emoticons to expressing feelings 
Value frequent communication over meaningful communication 
We freely like or dislike anything 
Provide an array of details and images from our private lives Overshare a variety of information 
Social & Mobile 
Security
Social Media and Employment 
Social & Mobile 
Security
SM and Employee Rejection 
Social & Mobile 
Security
Spiritual Challenges 
‘Friending’ online nurtures shallow relationships 
Gives the illusion of knowing everyone 
Distracts people from existing relationships 
39% of adults are self-described ‘Facebook addicts 
57% of women 18 to 35 say they talk to people more online than face to face 
57% of young people believe their generation uses social networking sites for self-promotion, 
narcissism and attention seeking 
Trivialization of meaningful things 
Social & Mobile 
Security
Stay alert! Watch out for your great enemy, the devil. He prowls around like a roaring lion, looking 
for someone to devour. 
1 Peter 5:8 (NLT) 
Social & Mobile 
Security
FBI and Hulu+ 
Over 20% increase in Armored car robberies after “Armored” 
Social & Mobile 
Security 
TED Talk On Mirror Neurons 
We perceive we are doing what we see others doing
GEO TAGGING 
August of 2010, Adam Savage, of “MythBusters,” took a photo of his 
vehicle using his smartphone. He then posted the photo to his 
Twitter account including the phrase “off to work.” 
The image contained metadata reveling the exact geographical 
location the photo. 
Savage revealed the exact location of his home, the vehicle he drives 
and the time he leaves for work. 
Demo: Jeffrey's Exif Viewer 
http://regex.info/exifh.cgi 
Social & Mobile 
Security
Meta Data Images Hands on 
Go to 
Jeffrey's Exif Viewer 
http://regex.info/exif.cgi 
Photo 1 
photo.JPG 
Where was the photo taken of the Police office was the photographer on the sidewalk or somewhere else 
what kind of device was used to take the photo 
Second photo 
Who is in the photo besides the kids? 
What device was used to take the photo 
Social & Mobile 
Security
What does Your Phone Know? 
Text messages, even deleted ones 
Words in your personal dictionary 
Facebook contacts 
Tens of thousands of location 
pings 
Every website ever visited 
What locations you have mapped 
(SwiftKey - Personalization) 
Emails going back a month 
Your photos with Geolocation data attached – even if deleted 
How many times you have checked your email 
Any application ever installed on your device 
Social & Mobile 
Security
Mobile Issues /Demo 
Who is calling you 
Just going to a website one can steal all your info: 
Contacts, text messages, photos, videos, credit card information 
PIN security – secure or easy to do 1 handed 
Camera and mic can be turned on without permission 
Social & Mobile 
Security
TURN OFF GPS/WIFI Bluetooth when 
not in use 
Social & Mobile 
Security
Texting for fun and Profit 
•53% kids have ridden with someone texting 
•22% bullied via a text 
•46% message or picture that was sexual 
•75% Youth think friends are addicted (Not them) 
•40% parents haven’t talked about mobile 
safety 
•http://www.att.com/gen/press-room?pid=22917
Mobile Safety Tips 
Password-protect your Mobile device 
Cell Phone Repeaters 
Turn off your Wi-Fi and Bluetooth to avoid retail tracking 
AVG PrivacyFix or Tasker for Android "geofencing” 
Don't share your location information 
You never know who is calling you 
Review any unknown numbers or odd calls and texts 
Texting is viral — easily forwarded 
Never reveal mobile # or passwords online 
Not recommended to do baking on mobile device that leaves home 
Social & Mobile 
Security
Mobile Safety Tips Cont. 
Indicators of Hack mobile: 
Battery Life stinks 
Battery Temp 
Coded messages 
Background noise 
electrical interference when not getting txt/call 
Remember consequences of sexually explicit or provocative images or txt 
Use security settings that are available 
Can be triangulated even if the location services are off 
Use Don’t Track me https://www.abine.com/index.html 
Social & Mobile 
Security
Social / Mobile Exposure Demo 
Social & Mobile 
Security
Social Media Search Engines 
Kurrently offers the ability to search both Facebook and Twitter in real time 
Who’s Talkin It searches 60 social media gateways 
Socialmention Social Media Alerts : Like Google Alerts but for social media 
Your Open Book Looks at profile status updates 
Social & Mobile 
Security
Facebook Spying 
Facebook Visualizer -- 
Police can make profiles about a person such as where they would most likely go if they were in trouble, 
where they might hide, what friends they would turn to etc... 
http://www.lococitato.com/facebookvisualizer/ 
Generates animated, clickable maps of the relationships between Facebook users. 
Features include profile summaries, export of networks to csv files, fast search utility and storage of complete 
html code and download time 
They also have products for Myspace and YouTube. 
Social & Mobile 
Security
Social Media Tips 
Don't sign up for a new service using Facebook or another social networking account 
Lock down those social network privacy settings 
Think before you post 
Lie. About. Everything 
Use a password manager and two-factor authentication 
Disposable email DoNotTrackMe, and Yahoo disposable emails 
Use secure browser such as WhiteHat Aviator 
Create personal and professional personas 
Social & Mobile 
Security
Physical & Mental Issues 
80 percent of us spend three or more hours sitting during our leisure time 
long-reaching effects on our health: long-range obesity, heart problems, depression 
and diabetes 
Makes people feel anxious, moody or restless 
'Facebook depression’ see others as having fun feel left out 
Social & Mobile 
Security
Family Safety Suggestions 
Use different passwords / two Factor for google dropbox 
Turn off “Find My Mac.” Instead, encrypt your data 
Don’t use social media to logon to other sites 
Use a password manager LastPass 
Backup your data / Dropbox or crashplan 
Check your email accounts https://haveibeenpwned.com/ 
Lock your device mobile or portable 
Social & Mobile 
Security
Family Safety Suggestions 
TOS;DR Terms of service did not read extension / website 
Keep your system updated 
Use AV 
Filter home and mobile devices 
Shopping 
Check URLs 
Secure Connection 
Beware Express Check Out 
Avoid Express checkout 
Be careful of Apps 
Setup Alerts about self and Children GA #2 
Social & Mobile 
Security
Family Safety Suggestions 
Email 
Know your senders 
Beware of attachments 
Beware of Links 
Set Boundaries 
Open Communication is key 
Social & Mobile 
Security
Top 10 - Mobile controls 2014 
Social & Mobile 
Security
Passwords 
Social & Mobile 
Security
Social & Mobile 
Security 
Look Up Challenge
Geolocation tools 
http://www.bing.com/maps 
http://twittermap.appspot.com 
http://www.fourwhere.com/ 
http://ip2geolocation.com 
Cree.py 
Great tool for geolocating/tracking Twitter/Foursquare users. Not only pulls coordinates from the 
posts directly, but can grab them from the EXIF data in pictures they link to. 
http://ilektrojohn.github.com/creepy/ 
Social & Mobile 
Security
Scrubbing Meta Data 
Software 
Jpg and PNG metadata striper http://www.steelbytes.com/?mid=30 
BatchPurifier LITE 
http://www.digitalconfidence.com/downloads.html 
Doc Scrubber 
http://www.javacoolsoftware.com/dsdownload.html 
Websites 
http://regex.info/exif.cgi 
Social & Mobile 
Security
Cyberstalking Sites 
Lullar 
Search for a person using email name or user name http://com.lullar.com/ 
Spokeo 
Searches lots of public Records to find information about someone http://www.spokeo.com 
KnowEm 
Claims to check over 500 sites to see if a given user name is taken 
http://knowem.com 
Peek You old but still full of good info about someone 
http://www.peekyou.com 
Social & Mobile 
Security
Google Yourself 
What personal information of yours is available online? 
http://www.pipl.com 
http://www.peekyou.com 
http://yoname.com 
www.myfamily.com 
www.zoominfo.com 
www.alltheweb.com 
www.zabasearch.com 
Social & Mobile 
Security

More Related Content

What's hot

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
Vtc2013 digital citizenship
Vtc2013 digital citizenshipVtc2013 digital citizenship
Vtc2013 digital citizenshipClint Hamada
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013Brian Downey
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 

What's hot (20)

September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Users guide
Users guideUsers guide
Users guide
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Vtc2013 digital citizenship
Vtc2013 digital citizenshipVtc2013 digital citizenship
Vtc2013 digital citizenship
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 

Similar to Social & mobile security

Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safetyErnest Staats
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parentsamelialouise
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13mwilson518
 

Similar to Social & mobile security (20)

Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Facebook for Parents
Facebook for ParentsFacebook for Parents
Facebook for Parents
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
You Sure That's Secure?
You Sure That's Secure?You Sure That's Secure?
You Sure That's Secure?
 
techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13techKNOW leadership for JefCoEd Tech Camp 7.11.13
techKNOW leadership for JefCoEd Tech Camp 7.11.13
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 

More from Ernest Staats

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Ernest Staats
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementErnest Staats
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Cy safe 2.0_workbook
Cy safe 2.0_workbookCy safe 2.0_workbook
Cy safe 2.0_workbookErnest Staats
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challengeErnest Staats
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parentingErnest Staats
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionErnest Staats
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized Ernest Staats
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical OverviewErnest Staats
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students Ernest Staats
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Ernest Staats
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your DeviceErnest Staats
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsErnest Staats
 

More from Ernest Staats (20)

Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion Information security trends and steps for (OSAC) Middle East divsion
Information security trends and steps for (OSAC) Middle East divsion
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Cy safe 2.0_workbook
Cy safe 2.0_workbookCy safe 2.0_workbook
Cy safe 2.0_workbook
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Parenting and the media challenge
Parenting and the media challengeParenting and the media challenge
Parenting and the media challenge
 
How to use technology in ministry & parenting
How to use technology in ministry & parentingHow to use technology in ministry & parenting
How to use technology in ministry & parenting
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
 
Data Detox Kit Optimized
Data Detox Kit Optimized Data Detox Kit Optimized
Data Detox Kit Optimized
 
GDPR Benefits and a Technical Overview
GDPR  Benefits and a Technical OverviewGDPR  Benefits and a Technical Overview
GDPR Benefits and a Technical Overview
 
Compter Forensics Intro for Students
Compter Forensics Intro for Students Compter Forensics Intro for Students
Compter Forensics Intro for Students
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
 
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tipsBorder crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
 

Recently uploaded

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 

Recently uploaded (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 

Social & mobile security

  • 1. Social & Mobile Security Social & Mobile Security networkpaladin.org IT Security Director City of Chattanooga MS Information Assurance, CISSP, CEH, CWNA, Security+, MCSE, CNA, I-Net+, Network+, Server+, A
  • 3. CIRP Freshman Survey Results Cooperative Institutional Research Program  Toxic psychological impact of media  faux celebrities—lead actors in fictionalized life  F acebook “friends”  Block anyone  Only flattering, photos  Connect with famous Social & Mobile Security More students think they are exceptional or gifted than what they can actually perform
  • 4. Youth vs Adult Reality •Parents feel better informed about teens’ online activity (29 point Gap) •How closely do your parents follow or monitor what you do online or on a cell phone? (45 point Gap ) •Social networking sites like Facebook (18 point Gap) •Twitter (24 point Gap) •Email, Youtube, Instagram (10 point Gap) •Two in five teens admit to having posted something online that they later regretted
  • 5. Ensure Your Loved Ones Are Protected From Ongoing Threats By: (1) Educating Yourself (2) Setting Guidelines & (3) Installing Parental Control Software
  • 7. Establish rules for online life
  • 8. Internet 10 Startling Trends Feelings similar to drug addiction craving, very anxious, antsy, miserable, jittery, crazy College students highly susceptible to Internet Dependence Students can’t go 24 Students are surfing, 38% can’t go more than 10 minutes Internet use can physically change your brain Many students need intervention for addiction, Leads to depression Tech conditions can be dangerous to your health CTS, Headaches, Eyesight insomnia Social & Mobile Security
  • 9. Social Media Challenges Fundamentally shifting how we communicate to: Sound bites laced with a dizzying array of fragments and acronyms Emoticons to expressing feelings Value frequent communication over meaningful communication We freely like or dislike anything Provide an array of details and images from our private lives Overshare a variety of information Social & Mobile Security
  • 10. Social Media and Employment Social & Mobile Security
  • 11. SM and Employee Rejection Social & Mobile Security
  • 12. Spiritual Challenges ‘Friending’ online nurtures shallow relationships Gives the illusion of knowing everyone Distracts people from existing relationships 39% of adults are self-described ‘Facebook addicts 57% of women 18 to 35 say they talk to people more online than face to face 57% of young people believe their generation uses social networking sites for self-promotion, narcissism and attention seeking Trivialization of meaningful things Social & Mobile Security
  • 13. Stay alert! Watch out for your great enemy, the devil. He prowls around like a roaring lion, looking for someone to devour. 1 Peter 5:8 (NLT) Social & Mobile Security
  • 14. FBI and Hulu+ Over 20% increase in Armored car robberies after “Armored” Social & Mobile Security TED Talk On Mirror Neurons We perceive we are doing what we see others doing
  • 15. GEO TAGGING August of 2010, Adam Savage, of “MythBusters,” took a photo of his vehicle using his smartphone. He then posted the photo to his Twitter account including the phrase “off to work.” The image contained metadata reveling the exact geographical location the photo. Savage revealed the exact location of his home, the vehicle he drives and the time he leaves for work. Demo: Jeffrey's Exif Viewer http://regex.info/exifh.cgi Social & Mobile Security
  • 16. Meta Data Images Hands on Go to Jeffrey's Exif Viewer http://regex.info/exif.cgi Photo 1 photo.JPG Where was the photo taken of the Police office was the photographer on the sidewalk or somewhere else what kind of device was used to take the photo Second photo Who is in the photo besides the kids? What device was used to take the photo Social & Mobile Security
  • 17. What does Your Phone Know? Text messages, even deleted ones Words in your personal dictionary Facebook contacts Tens of thousands of location pings Every website ever visited What locations you have mapped (SwiftKey - Personalization) Emails going back a month Your photos with Geolocation data attached – even if deleted How many times you have checked your email Any application ever installed on your device Social & Mobile Security
  • 18. Mobile Issues /Demo Who is calling you Just going to a website one can steal all your info: Contacts, text messages, photos, videos, credit card information PIN security – secure or easy to do 1 handed Camera and mic can be turned on without permission Social & Mobile Security
  • 19. TURN OFF GPS/WIFI Bluetooth when not in use Social & Mobile Security
  • 20. Texting for fun and Profit •53% kids have ridden with someone texting •22% bullied via a text •46% message or picture that was sexual •75% Youth think friends are addicted (Not them) •40% parents haven’t talked about mobile safety •http://www.att.com/gen/press-room?pid=22917
  • 21. Mobile Safety Tips Password-protect your Mobile device Cell Phone Repeaters Turn off your Wi-Fi and Bluetooth to avoid retail tracking AVG PrivacyFix or Tasker for Android "geofencing” Don't share your location information You never know who is calling you Review any unknown numbers or odd calls and texts Texting is viral — easily forwarded Never reveal mobile # or passwords online Not recommended to do baking on mobile device that leaves home Social & Mobile Security
  • 22. Mobile Safety Tips Cont. Indicators of Hack mobile: Battery Life stinks Battery Temp Coded messages Background noise electrical interference when not getting txt/call Remember consequences of sexually explicit or provocative images or txt Use security settings that are available Can be triangulated even if the location services are off Use Don’t Track me https://www.abine.com/index.html Social & Mobile Security
  • 23. Social / Mobile Exposure Demo Social & Mobile Security
  • 24. Social Media Search Engines Kurrently offers the ability to search both Facebook and Twitter in real time Who’s Talkin It searches 60 social media gateways Socialmention Social Media Alerts : Like Google Alerts but for social media Your Open Book Looks at profile status updates Social & Mobile Security
  • 25. Facebook Spying Facebook Visualizer -- Police can make profiles about a person such as where they would most likely go if they were in trouble, where they might hide, what friends they would turn to etc... http://www.lococitato.com/facebookvisualizer/ Generates animated, clickable maps of the relationships between Facebook users. Features include profile summaries, export of networks to csv files, fast search utility and storage of complete html code and download time They also have products for Myspace and YouTube. Social & Mobile Security
  • 26. Social Media Tips Don't sign up for a new service using Facebook or another social networking account Lock down those social network privacy settings Think before you post Lie. About. Everything Use a password manager and two-factor authentication Disposable email DoNotTrackMe, and Yahoo disposable emails Use secure browser such as WhiteHat Aviator Create personal and professional personas Social & Mobile Security
  • 27. Physical & Mental Issues 80 percent of us spend three or more hours sitting during our leisure time long-reaching effects on our health: long-range obesity, heart problems, depression and diabetes Makes people feel anxious, moody or restless 'Facebook depression’ see others as having fun feel left out Social & Mobile Security
  • 28. Family Safety Suggestions Use different passwords / two Factor for google dropbox Turn off “Find My Mac.” Instead, encrypt your data Don’t use social media to logon to other sites Use a password manager LastPass Backup your data / Dropbox or crashplan Check your email accounts https://haveibeenpwned.com/ Lock your device mobile or portable Social & Mobile Security
  • 29. Family Safety Suggestions TOS;DR Terms of service did not read extension / website Keep your system updated Use AV Filter home and mobile devices Shopping Check URLs Secure Connection Beware Express Check Out Avoid Express checkout Be careful of Apps Setup Alerts about self and Children GA #2 Social & Mobile Security
  • 30. Family Safety Suggestions Email Know your senders Beware of attachments Beware of Links Set Boundaries Open Communication is key Social & Mobile Security
  • 31. Top 10 - Mobile controls 2014 Social & Mobile Security
  • 32. Passwords Social & Mobile Security
  • 33. Social & Mobile Security Look Up Challenge
  • 34. Geolocation tools http://www.bing.com/maps http://twittermap.appspot.com http://www.fourwhere.com/ http://ip2geolocation.com Cree.py Great tool for geolocating/tracking Twitter/Foursquare users. Not only pulls coordinates from the posts directly, but can grab them from the EXIF data in pictures they link to. http://ilektrojohn.github.com/creepy/ Social & Mobile Security
  • 35. Scrubbing Meta Data Software Jpg and PNG metadata striper http://www.steelbytes.com/?mid=30 BatchPurifier LITE http://www.digitalconfidence.com/downloads.html Doc Scrubber http://www.javacoolsoftware.com/dsdownload.html Websites http://regex.info/exif.cgi Social & Mobile Security
  • 36. Cyberstalking Sites Lullar Search for a person using email name or user name http://com.lullar.com/ Spokeo Searches lots of public Records to find information about someone http://www.spokeo.com KnowEm Claims to check over 500 sites to see if a given user name is taken http://knowem.com Peek You old but still full of good info about someone http://www.peekyou.com Social & Mobile Security
  • 37. Google Yourself What personal information of yours is available online? http://www.pipl.com http://www.peekyou.com http://yoname.com www.myfamily.com www.zoominfo.com www.alltheweb.com www.zabasearch.com Social & Mobile Security