SlideShare a Scribd company logo
1 of 14
11/23/2019 1Prepared by: Nageen AbdulWaheed - 19011502-002
What is Social Media?
11/23/2019 2Prepared by: Nageen AbdulWaheed - 19011502-002
 Social media are computer based tools that
allow people, companies and other
organizations to create, share, or exchange
information, thoughts, ideas, and
pictures/videos through the virtual communities
and networks
 ◦ Basically, social media networking connects
people at low cost.
 ◦ Most social networking sites provide the
facility of messaging, chatting, e-mails, videos,
voice-chats, file sharing, blogging, discussion
groups and so on.
11/23/2019 3Prepared by: Nageen AbdulWaheed - 19011502-002
 Some social networking sites which have many privacy
issues but are very common:
 ◦ Facebook - 684,478 pieces of content are shared on
Facebook - Every minute
 ◦Twitter - 100,000 tweets are sent.
 ◦ Google - 2 million search queries are made on Google.
 ◦YouTube - 48 hours of video are uploaded toYouTube
 ◦ Instagram - 3,600 photos are shared on Instagram
 ◦Whatsapp -
 ◦IMO -
 ◦ Skype -
11/23/2019 4Prepared by: Nageen AbdulWaheed - 19011502-002
 1. Privacy Issues like Hacking, Phishing,
Scamming, and spamming are effecting
people very badly.
 2. After the November 2013, security breach
where hackers stole usernames and
passwords for nearly 2 million accounts at
Facebook, Google,Yahoo, LinkedIn,Twitter
and 93,000 other websites.
11/23/2019 5Prepared by: Nageen AbdulWaheed - 19011502-002
 Hacking - activities that breach defenses and
exploit weaknesses in a computer system or
network
 Phishing - fraudulent attempt to get sensitive
information e.g usernames, passwords in an
electronic communication
 Scamming - form of fraud, promising the victim a
significant share of a large sum of money
 spamming - send the same message
indiscriminately to (a large number of internet
users).
11/23/2019 6Prepared by: Nageen AbdulWaheed - 19011502-002
 Social sites like Facebook and twitter have the highest privacy
issues.
 ◦ Facebook:
 ◦ Facebook has over a billion active users
 ◦Teenagers of almost (18 to 35 age) are Facebook addicted.
 ◦ Fake Profile and ID's with fake names (like Angel Pari, Innoxent
Ali, Cute girl, Decent boy, etc...) is one of biggest problems on
Facebook.
 ◦ Strange people try to get into our profiles.
 ◦ Accounts can be easily hacked by using different hacking
websites.
 ◦ According to the news from PCWorld Business Center which was
published on April 22, 2010, we can know that a hacker named
Kirllos illegally stole and sold 1.5 million Facebook IDs to some
business companies who want to attract potential customers by
using advertisements on Facebook.
11/23/2019 7Prepared by: Nageen AbdulWaheed - 19011502-002
 Twitter:
 1.Twitter has mostly dodged privacy concerns. Facebook gets all
the bad press, but the bigger threat to your online privacy these
days might be yourTwitter account.
 2.Twitter allows people to share information with their followers.
Any messages that are not switched from the default privacy
setting are public, and thus can be viewed by anyone with a
Twitter account.
 3. Users can make their timelines private, but once a tweet is re-
tweeted by another user, it irreversibly becomes public.
 4. Another issue involving privacy onTwitter deals with users
unknowingly disclosing their information through tweets.Twitter
has location services attached to tweets, which some users don’t
even know are enabled. Many users tweet about being at home
and attach their location to their tweet, revealing their personal
home address.
11/23/2019 8Prepared by: Nageen AbdulWaheed - 19011502-002
 1. Become familiar with the privacy settings of any
social website you use.
 2. Don’t share your age, birthday, birthplace, address,
phone number, e-mail, and vacation plans,
 3. Beware of strangers requests.
 4. Always Logout your account on any social network.
 5. Use cautions when using third-party applications.
 6.Take additional precautions if you are the victim of
stalking, harassment or domestic violence.
11/23/2019 9Prepared by: Nageen AbdulWaheed - 19011502-002
 Limit personal information
  Use proper privacy settings
  Practice strong security
11/23/2019 10Prepared by: Nageen AbdulWaheed - 19011502-002
 Don’t friend people you don’t know!
  Never friend somebody more than once
(the 2nd is often a spoofed account)
  Limit posts to be viewable by only your
friends
  Limit sharing and photo tagging
  Limit 3rd party applications
  Remove location services
11/23/2019 11Prepared by: Nageen AbdulWaheed - 19011502-002
  Use strong passwords at least 8 characters,
using letters, numbers, and symbols.
  Enable two-factor authentication.
11/23/2019 12Prepared by: Nageen AbdulWaheed - 19011502-002
  Assume everything you post can be seen
by anybody, regardless of your settings.
 Either don’t share personal info at all, or use
your privacy settings to limit who can see it.
  Maiden names, date of birth, Kids dates of
birth, Schools, anything that correlates with
any security question never answer anybody
on or off-line.
11/23/2019 13Prepared by: Nageen AbdulWaheed - 19011502-002
11/23/2019 14Prepared by: Nageen AbdulWaheed - 19011502-002

More Related Content

Similar to Privacy & social media

Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much information
Shangli Jiang
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 

Similar to Privacy & social media (20)

What is social networking
What is social networkingWhat is social networking
What is social networking
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social Network
Social NetworkSocial Network
Social Network
 
Are you safe enough on Social Media?
Are you safe enough on Social Media?Are you safe enough on Social Media?
Are you safe enough on Social Media?
 
Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much information
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
 
Protect Your Identity During Social Networking
Protect Your Identity During Social NetworkingProtect Your Identity During Social Networking
Protect Your Identity During Social Networking
 
Surya
SuryaSurya
Surya
 
Facebook
FacebookFacebook
Facebook
 
vijayalaxmi.sn
vijayalaxmi.snvijayalaxmi.sn
vijayalaxmi.sn
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Social networks and their effects
Social  networks and their effectsSocial  networks and their effects
Social networks and their effects
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Users guide
Users guideUsers guide
Users guide
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Privacy & social media

  • 1. 11/23/2019 1Prepared by: Nageen AbdulWaheed - 19011502-002
  • 2. What is Social Media? 11/23/2019 2Prepared by: Nageen AbdulWaheed - 19011502-002
  • 3.  Social media are computer based tools that allow people, companies and other organizations to create, share, or exchange information, thoughts, ideas, and pictures/videos through the virtual communities and networks  ◦ Basically, social media networking connects people at low cost.  ◦ Most social networking sites provide the facility of messaging, chatting, e-mails, videos, voice-chats, file sharing, blogging, discussion groups and so on. 11/23/2019 3Prepared by: Nageen AbdulWaheed - 19011502-002
  • 4.  Some social networking sites which have many privacy issues but are very common:  ◦ Facebook - 684,478 pieces of content are shared on Facebook - Every minute  ◦Twitter - 100,000 tweets are sent.  ◦ Google - 2 million search queries are made on Google.  ◦YouTube - 48 hours of video are uploaded toYouTube  ◦ Instagram - 3,600 photos are shared on Instagram  ◦Whatsapp -  ◦IMO -  ◦ Skype - 11/23/2019 4Prepared by: Nageen AbdulWaheed - 19011502-002
  • 5.  1. Privacy Issues like Hacking, Phishing, Scamming, and spamming are effecting people very badly.  2. After the November 2013, security breach where hackers stole usernames and passwords for nearly 2 million accounts at Facebook, Google,Yahoo, LinkedIn,Twitter and 93,000 other websites. 11/23/2019 5Prepared by: Nageen AbdulWaheed - 19011502-002
  • 6.  Hacking - activities that breach defenses and exploit weaknesses in a computer system or network  Phishing - fraudulent attempt to get sensitive information e.g usernames, passwords in an electronic communication  Scamming - form of fraud, promising the victim a significant share of a large sum of money  spamming - send the same message indiscriminately to (a large number of internet users). 11/23/2019 6Prepared by: Nageen AbdulWaheed - 19011502-002
  • 7.  Social sites like Facebook and twitter have the highest privacy issues.  ◦ Facebook:  ◦ Facebook has over a billion active users  ◦Teenagers of almost (18 to 35 age) are Facebook addicted.  ◦ Fake Profile and ID's with fake names (like Angel Pari, Innoxent Ali, Cute girl, Decent boy, etc...) is one of biggest problems on Facebook.  ◦ Strange people try to get into our profiles.  ◦ Accounts can be easily hacked by using different hacking websites.  ◦ According to the news from PCWorld Business Center which was published on April 22, 2010, we can know that a hacker named Kirllos illegally stole and sold 1.5 million Facebook IDs to some business companies who want to attract potential customers by using advertisements on Facebook. 11/23/2019 7Prepared by: Nageen AbdulWaheed - 19011502-002
  • 8.  Twitter:  1.Twitter has mostly dodged privacy concerns. Facebook gets all the bad press, but the bigger threat to your online privacy these days might be yourTwitter account.  2.Twitter allows people to share information with their followers. Any messages that are not switched from the default privacy setting are public, and thus can be viewed by anyone with a Twitter account.  3. Users can make their timelines private, but once a tweet is re- tweeted by another user, it irreversibly becomes public.  4. Another issue involving privacy onTwitter deals with users unknowingly disclosing their information through tweets.Twitter has location services attached to tweets, which some users don’t even know are enabled. Many users tweet about being at home and attach their location to their tweet, revealing their personal home address. 11/23/2019 8Prepared by: Nageen AbdulWaheed - 19011502-002
  • 9.  1. Become familiar with the privacy settings of any social website you use.  2. Don’t share your age, birthday, birthplace, address, phone number, e-mail, and vacation plans,  3. Beware of strangers requests.  4. Always Logout your account on any social network.  5. Use cautions when using third-party applications.  6.Take additional precautions if you are the victim of stalking, harassment or domestic violence. 11/23/2019 9Prepared by: Nageen AbdulWaheed - 19011502-002
  • 10.  Limit personal information   Use proper privacy settings   Practice strong security 11/23/2019 10Prepared by: Nageen AbdulWaheed - 19011502-002
  • 11.  Don’t friend people you don’t know!   Never friend somebody more than once (the 2nd is often a spoofed account)   Limit posts to be viewable by only your friends   Limit sharing and photo tagging   Limit 3rd party applications   Remove location services 11/23/2019 11Prepared by: Nageen AbdulWaheed - 19011502-002
  • 12.   Use strong passwords at least 8 characters, using letters, numbers, and symbols.   Enable two-factor authentication. 11/23/2019 12Prepared by: Nageen AbdulWaheed - 19011502-002
  • 13.   Assume everything you post can be seen by anybody, regardless of your settings.  Either don’t share personal info at all, or use your privacy settings to limit who can see it.   Maiden names, date of birth, Kids dates of birth, Schools, anything that correlates with any security question never answer anybody on or off-line. 11/23/2019 13Prepared by: Nageen AbdulWaheed - 19011502-002
  • 14. 11/23/2019 14Prepared by: Nageen AbdulWaheed - 19011502-002