SlideShare a Scribd company logo
1 of 9
By
Auwalu Adamu
DP/IT/13/041A
• Malware distribution
• Cyber-bullying
• Shelf-life of information (lives forever in
cyberspace)
• Privacy concerns
– Information about you that you post
– Information about you that others post
– Information about you the social networking sites
collect and share with others
• Can result in social engineering, identity theft, financial fraud,
infected computers, stalking, child abuse, sexual predation,
defamation, lawsuits, mad boyfriend/girlfriend/spouse/parent,
unwanted legacy, embarrassment, …
 Similar to other threats that can lead to
downloading/installing malware
 Malicious ads
 Clickjacking
 Wall posts, inbox or chat messages with malicious
links from Friends (hijacked user account)
 “My wallet was stolen and I’m stuck in London.
Please send me cash now.”
 Spam email pretending to be from Facebook admins
• Friends & family
• Friends of friends & family
• Parents
• Employers and co-workers
• Customers
• Universities
• Marketing companies & vendors
• Criminals & hackers
• Government agencies (IRS, SRS!)
• EVERYONE ELSE
• Does your University have a policy? Is incidental personal
use allowed? At what point does it exceed “incidental”?
Discuss it with your supervisor
• Faculty and staff posting work-related information without
authorization, or posting work-related information on
personal pages
• K-State units should use Facebook Pages or groups rather
than setting up a user profile; latter violates FB policy
• Should also be conscious of branding, making it clear
whether the page is an official institutional page
• See Social Media Guidelines from K-State’s Media Relations
www.k-state.edu/media/socialmedia/
• Possible data loss (inadvertent or malicious)
• Damage to reputation (personal or institutional)
• Regulatory compliance issues (e.g., FERPA, HIPAA)
• Personal rights issues (free speech, academic freedom)
1. Use a strong, unique password (don’t use the same
password on multiple sites; don’t use same ID
password on social networking sites)
2. Provide as little personal information as possible –
avoid revealing birth date, address, etc.
3. Understand and customize the privacy settings in all of
your social networking accounts
4. Don’t allow 3rd party applications to access
your information (if possible)
5. Be careful about what you post
a. Photos of self or others
b. Opinions on controversial topics
c. Don’t rip classmates, professors, coworkers,
employers, etc. – it WILL come back to haunt you
6. Don’t post anything related to your
employer (unless you’re authorized)
7. Supervise your kids’ use of social
networking sites
8. Be suspicious of friend and follow requests, ads,
3rd party applications, chat messages, etc.
9. Minimize exploration – don’t carelessly click on
lots of ads, videos, games, etc.
10. Use built-in and add-on features in web browsers
to warn you of malicious sites
a. Anti-phishing filters in IE and Firefox
b. Web of Trust
c. No Script
d. Ad block Plus
e. Preview features of bit.ly, TinyURL
11. Trend Micro Web Reputations
Services is your friend
12. Google yourself and scrutinize results
13. Think before you click!!
Power Point Presentation by Auwalu Adamu

More Related Content

What's hot

Cruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointCruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointscc0523
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet SafetyJVGAJJAR
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking SafetyJEM JEM
 
The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsDiana Benner
 
Plagiarism student handout
Plagiarism student handoutPlagiarism student handout
Plagiarism student handoutthinkict
 
hello world: the 2010 web and the enterprise
hello world:  the 2010 web and the enterprisehello world:  the 2010 web and the enterprise
hello world: the 2010 web and the enterpriseDenise Howell
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Digital Divide
Digital DivideDigital Divide
Digital Dividecronegeek
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet SafetyMark Deming
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentationlhurd01
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentationegregory
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015Staci Trekles
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...Frederick Lane
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesMs. D
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for EducatorsFrederick Lane
 

What's hot (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpointCruz s professional ethics student lesson powerpoint
Cruz s professional ethics student lesson powerpoint
 
Your Internet Safety
Your Internet SafetyYour Internet Safety
Your Internet Safety
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
The Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School DistrictsThe Top Five Legal Pitfalls of Social Media for School Districts
The Top Five Legal Pitfalls of Social Media for School Districts
 
Plagiarism student handout
Plagiarism student handoutPlagiarism student handout
Plagiarism student handout
 
hello world: the 2010 web and the enterprise
hello world:  the 2010 web and the enterprisehello world:  the 2010 web and the enterprise
hello world: the 2010 web and the enterprise
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Digital Divide
Digital DivideDigital Divide
Digital Divide
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Christian Middle School Internet Safety
Christian Middle School Internet SafetyChristian Middle School Internet Safety
Christian Middle School Internet Safety
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Hurd, lindse slide share presentation
Hurd, lindse slide share presentationHurd, lindse slide share presentation
Hurd, lindse slide share presentation
 
Information Literacy Presentation
Information Literacy PresentationInformation Literacy Presentation
Information Literacy Presentation
 
Safely Traveling the Web 2015
Safely Traveling the Web 2015Safely Traveling the Web 2015
Safely Traveling the Web 2015
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-27 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
2014-08-25 Cybertraps for Educators: The Professional Perils of 24/7 Communic...
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators2015-02-13 Cybertraps for Educators
2015-02-13 Cybertraps for Educators
 

Similar to Power Point Presentation by Auwalu Adamu

Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles schoolesksaints
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxDIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxvanessacabang2
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08E Robertson
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingmribera87
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Six Tenets of Digital Citizenship
Six Tenets of Digital CitizenshipSix Tenets of Digital Citizenship
Six Tenets of Digital Citizenshipblog4itech
 

Similar to Power Point Presentation by Auwalu Adamu (20)

2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet safety for middles school
Internet safety for middles schoolInternet safety for middles school
Internet safety for middles school
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Students I Safety
Students I SafetyStudents I Safety
Students I Safety
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptxDIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
DIGITAL-CITIZENSHIP-AND-ONLINE-SAFETY.pptx
 
Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08Playing It Safe On The Web Updated08
Playing It Safe On The Web Updated08
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
Six Tenets of Digital Citizenship
Six Tenets of Digital CitizenshipSix Tenets of Digital Citizenship
Six Tenets of Digital Citizenship
 

Recently uploaded

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

Power Point Presentation by Auwalu Adamu

  • 2. • Malware distribution • Cyber-bullying • Shelf-life of information (lives forever in cyberspace) • Privacy concerns – Information about you that you post – Information about you that others post – Information about you the social networking sites collect and share with others
  • 3. • Can result in social engineering, identity theft, financial fraud, infected computers, stalking, child abuse, sexual predation, defamation, lawsuits, mad boyfriend/girlfriend/spouse/parent, unwanted legacy, embarrassment, …
  • 4.  Similar to other threats that can lead to downloading/installing malware  Malicious ads  Clickjacking  Wall posts, inbox or chat messages with malicious links from Friends (hijacked user account)  “My wallet was stolen and I’m stuck in London. Please send me cash now.”  Spam email pretending to be from Facebook admins
  • 5. • Friends & family • Friends of friends & family • Parents • Employers and co-workers • Customers • Universities • Marketing companies & vendors • Criminals & hackers • Government agencies (IRS, SRS!) • EVERYONE ELSE
  • 6. • Does your University have a policy? Is incidental personal use allowed? At what point does it exceed “incidental”? Discuss it with your supervisor • Faculty and staff posting work-related information without authorization, or posting work-related information on personal pages • K-State units should use Facebook Pages or groups rather than setting up a user profile; latter violates FB policy • Should also be conscious of branding, making it clear whether the page is an official institutional page • See Social Media Guidelines from K-State’s Media Relations www.k-state.edu/media/socialmedia/ • Possible data loss (inadvertent or malicious) • Damage to reputation (personal or institutional) • Regulatory compliance issues (e.g., FERPA, HIPAA) • Personal rights issues (free speech, academic freedom)
  • 7. 1. Use a strong, unique password (don’t use the same password on multiple sites; don’t use same ID password on social networking sites) 2. Provide as little personal information as possible – avoid revealing birth date, address, etc. 3. Understand and customize the privacy settings in all of your social networking accounts 4. Don’t allow 3rd party applications to access your information (if possible) 5. Be careful about what you post a. Photos of self or others b. Opinions on controversial topics c. Don’t rip classmates, professors, coworkers, employers, etc. – it WILL come back to haunt you 6. Don’t post anything related to your employer (unless you’re authorized) 7. Supervise your kids’ use of social networking sites
  • 8. 8. Be suspicious of friend and follow requests, ads, 3rd party applications, chat messages, etc. 9. Minimize exploration – don’t carelessly click on lots of ads, videos, games, etc. 10. Use built-in and add-on features in web browsers to warn you of malicious sites a. Anti-phishing filters in IE and Firefox b. Web of Trust c. No Script d. Ad block Plus e. Preview features of bit.ly, TinyURL 11. Trend Micro Web Reputations Services is your friend 12. Google yourself and scrutinize results 13. Think before you click!!

Editor's Notes

  1. I’m only going to deal with security issues, not sociological or cultural implications (addictions, wasting time, mindless drivel, distraction from studying, myth of multitasking)
  2. RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.”over the past few years — and negligently stored them in plaintext in an incompetently protected database.RockYou’s official bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw , or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account.Read more: http://techcrunch.com/2009/12/27/privacy-theater/#ixzz0oaNyV1XL
  3. RockYou can stash 32 million passwords in the clear; when RapLeaf can index 600 million email accounts; and when Intelius can go public by buying100 million profile pages; then our social networks have traded away our privacy for mere “privacy theater.”over the past few years — and negligently stored them in plaintext in an incompetently protected database.RockYou’sofficial bluster about “illegal intrusion” should fool no one: blaming Imperva, the firm who exposed the flaw , or accusing the hacker(s) of being the identity thieves is misdirection: it was actually RockYou who stole those credentials, and RockYou should be held to account.Read more: http://techcrunch.com/2009/12/27/privacy-theater/#ixzz0oaNyV1XL