SlideShare a Scribd company logo
Be secure, be aware.


Be Security Aware.

  Cyberstalking and
  Safety Tips for Social
  Networks
   B A H R A I N S E P T E M B E R 1 3 TH, 2 0 1 2




      Salah Khalifa @albinjassim
      Security Empowerment Consultant
AGENDA
AGENDA



   •Social Media
   •Cyberstalking
   •Social Media Safety Tips
   •QA.
SOCIAL MEDIA
SOCIAL MEDIA

• Social media is fun.
• Even though the service is free, there's
  the hidden cost of your privacy.
• While social networking sites may feel
  like an invitation-only gathering of
  friends, it's not necessarily a closed and
  safe universe.
• The impulse to share has caused many
  of us to unintentionally expose
  ourselves in ways that can compromise
  our safety and security.
• Cyber stalking ..
CYBERSTALKING
CYBERSTALKING

What is cyberstalking?

• It is technology-based “attack” on one person who has
  been targeted specifically for that attack for reasons of
  anger, revenge or control.
CYBERSTALKING
CYBERSTALKING CAN TAKE MANY FORMS


• Harassment, embarrassment and humiliation of the
  victim
• Harassing family, friends and employers to isolate the
  victim
• Scare tactics to instill fear and more.
CYBERSTALKING
 CYBERSTALKING IS NOT IDENTITY THEFT


• An identity thief, has a very specific goal in mind —
  financial gain.
• Identity thieves are unconcerned by the consequences of
  their behavior on the victim’s life,
• The actions of a cyberstalker are deliberate and focused
  on the consequences to the victim.
CYBERSTALKING
EFFECTS OF BEING CYBERSTALKED?

•   Angry
•   Annoyed
•   Anxious
•   Helpless
•   Depressed
•   Hopeless
•   Feelings of uncertainty and unpredictability
•   Trouble sleeping and concentrating
•   Weight instabilities (losing or gaining)
•   Loss of personal safety and security
SOCIAL NETWORKING SAFETY TIPS
Social Networking Safety Tips



•How do I Know You
•No Such Thing as Private
•Review Before Posting
•X Marks the Spot
•A Little Bird Told Me
•How Old Are You Now?
•Separate Work and Family
•It's Your Fault If It's Default
•You Play, You Pay...in Loss of Privacy

More Related Content

Viewers also liked

Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
Mar Soriano
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
2017 Dubai School Fees (Infographic)
2017 Dubai School Fees (Infographic)2017 Dubai School Fees (Infographic)
2017 Dubai School Fees (Infographic)
Edarabia.com
 
2017 Abu Dhabi School Fees (Infographic)
2017 Abu Dhabi School Fees (Infographic)2017 Abu Dhabi School Fees (Infographic)
2017 Abu Dhabi School Fees (Infographic)
Edarabia.com
 
Dampak negatif media sosial
Dampak negatif media sosialDampak negatif media sosial
Dampak negatif media sosialpha_phin
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 

Viewers also liked (7)

Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
2017 Dubai School Fees (Infographic)
2017 Dubai School Fees (Infographic)2017 Dubai School Fees (Infographic)
2017 Dubai School Fees (Infographic)
 
2017 Abu Dhabi School Fees (Infographic)
2017 Abu Dhabi School Fees (Infographic)2017 Abu Dhabi School Fees (Infographic)
2017 Abu Dhabi School Fees (Infographic)
 
Dampak negatif media sosial
Dampak negatif media sosialDampak negatif media sosial
Dampak negatif media sosial
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Similar to Cyberstalking and safety tips for social networks

Social Media Safety for K-8 audience
Social Media Safety for K-8 audienceSocial Media Safety for K-8 audience
Social Media Safety for K-8 audience
LiftPotential
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
Ljubica Ruzinska
 
2012 students-good internet choices
2012 students-good internet choices2012 students-good internet choices
2012 students-good internet choices
SchoolTechPolicies.com
 
2011 elementary students-making good choices online
2011 elementary students-making good choices online2011 elementary students-making good choices online
2011 elementary students-making good choices online
SchoolTechPolicies.com
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
Umasree Raghunath
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
2058cdtAryankrpal
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
LiftPotential
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
Royal Holloway, University of London
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
triciaayco
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!alexclark-efc
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
KnepperE
 
Cyberbullying - Murat Kaplan.pptx
Cyberbullying - Murat Kaplan.pptxCyberbullying - Murat Kaplan.pptx
Cyberbullying - Murat Kaplan.pptx
Murat Kaplan
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
Murat Kaplan
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
Santhosh Prabhu
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
Gisha Mathyari
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
remerosearcenal
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 

Similar to Cyberstalking and safety tips for social networks (20)

Social Media Safety for K-8 audience
Social Media Safety for K-8 audienceSocial Media Safety for K-8 audience
Social Media Safety for K-8 audience
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
 
2012 students-good internet choices
2012 students-good internet choices2012 students-good internet choices
2012 students-good internet choices
 
2011 elementary students-making good choices online
2011 elementary students-making good choices online2011 elementary students-making good choices online
2011 elementary students-making good choices online
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Cyberbullying - Murat Kaplan.pptx
Cyberbullying - Murat Kaplan.pptxCyberbullying - Murat Kaplan.pptx
Cyberbullying - Murat Kaplan.pptx
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

More from MarketingatBahrain

Social Media Strategic Planning Process
Social Media Strategic Planning ProcessSocial Media Strategic Planning Process
Social Media Strategic Planning Process
MarketingatBahrain
 
Getting started with social media strategic planning webinar
Getting started with social media strategic planning webinarGetting started with social media strategic planning webinar
Getting started with social media strategic planning webinar
MarketingatBahrain
 
Social Media Toolkit for Entrepreneurs
Social Media Toolkit for EntrepreneursSocial Media Toolkit for Entrepreneurs
Social Media Toolkit for Entrepreneurs
MarketingatBahrain
 
Social Media Strategies for Entrepreneurs
Social Media Strategies for EntrepreneursSocial Media Strategies for Entrepreneurs
Social Media Strategies for Entrepreneurs
MarketingatBahrain
 
The Evolution of Event Apps
The Evolution of Event AppsThe Evolution of Event Apps
The Evolution of Event Apps
MarketingatBahrain
 
Mobile for Business - This is the Q?
Mobile for Business - This is the Q?Mobile for Business - This is the Q?
Mobile for Business - This is the Q?
MarketingatBahrain
 
Utilizing Social Media for Events Marketing
Utilizing Social Media for Events MarketingUtilizing Social Media for Events Marketing
Utilizing Social Media for Events Marketing
MarketingatBahrain
 
Set up your Corporate Blo
Set up your Corporate BloSet up your Corporate Blo
Set up your Corporate Blo
MarketingatBahrain
 
Marketing your blog
Marketing your blogMarketing your blog
Marketing your blog
MarketingatBahrain
 
Content creation - Let us blog!
Content creation - Let us blog!Content creation - Let us blog!
Content creation - Let us blog!
MarketingatBahrain
 
Corporate blogging intro
Corporate blogging introCorporate blogging intro
Corporate blogging intro
MarketingatBahrain
 
Social Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business SeminarSocial Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business Seminar
MarketingatBahrain
 
The Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business SeminarThe Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business Seminar
MarketingatBahrain
 
Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar
MarketingatBahrain
 
Social Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business SeminarSocial Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business Seminar
MarketingatBahrain
 
Intro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business SeminarIntro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business Seminar
MarketingatBahrain
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
MarketingatBahrain
 
My love story
My love storyMy love story
My love story
MarketingatBahrain
 
Facebook & instagram case study in ksa
Facebook & instagram case study in ksaFacebook & instagram case study in ksa
Facebook & instagram case study in ksa
MarketingatBahrain
 
Growing Active Facebook Communities
Growing Active Facebook CommunitiesGrowing Active Facebook Communities
Growing Active Facebook Communities
MarketingatBahrain
 

More from MarketingatBahrain (20)

Social Media Strategic Planning Process
Social Media Strategic Planning ProcessSocial Media Strategic Planning Process
Social Media Strategic Planning Process
 
Getting started with social media strategic planning webinar
Getting started with social media strategic planning webinarGetting started with social media strategic planning webinar
Getting started with social media strategic planning webinar
 
Social Media Toolkit for Entrepreneurs
Social Media Toolkit for EntrepreneursSocial Media Toolkit for Entrepreneurs
Social Media Toolkit for Entrepreneurs
 
Social Media Strategies for Entrepreneurs
Social Media Strategies for EntrepreneursSocial Media Strategies for Entrepreneurs
Social Media Strategies for Entrepreneurs
 
The Evolution of Event Apps
The Evolution of Event AppsThe Evolution of Event Apps
The Evolution of Event Apps
 
Mobile for Business - This is the Q?
Mobile for Business - This is the Q?Mobile for Business - This is the Q?
Mobile for Business - This is the Q?
 
Utilizing Social Media for Events Marketing
Utilizing Social Media for Events MarketingUtilizing Social Media for Events Marketing
Utilizing Social Media for Events Marketing
 
Set up your Corporate Blo
Set up your Corporate BloSet up your Corporate Blo
Set up your Corporate Blo
 
Marketing your blog
Marketing your blogMarketing your blog
Marketing your blog
 
Content creation - Let us blog!
Content creation - Let us blog!Content creation - Let us blog!
Content creation - Let us blog!
 
Corporate blogging intro
Corporate blogging introCorporate blogging intro
Corporate blogging intro
 
Social Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business SeminarSocial Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business Seminar
 
The Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business SeminarThe Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business Seminar
 
Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar
 
Social Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business SeminarSocial Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business Seminar
 
Intro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business SeminarIntro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business Seminar
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
My love story
My love storyMy love story
My love story
 
Facebook & instagram case study in ksa
Facebook & instagram case study in ksaFacebook & instagram case study in ksa
Facebook & instagram case study in ksa
 
Growing Active Facebook Communities
Growing Active Facebook CommunitiesGrowing Active Facebook Communities
Growing Active Facebook Communities
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Cyberstalking and safety tips for social networks

  • 1. Be secure, be aware. Be Security Aware. Cyberstalking and Safety Tips for Social Networks B A H R A I N S E P T E M B E R 1 3 TH, 2 0 1 2 Salah Khalifa @albinjassim Security Empowerment Consultant
  • 2. AGENDA AGENDA •Social Media •Cyberstalking •Social Media Safety Tips •QA.
  • 3. SOCIAL MEDIA SOCIAL MEDIA • Social media is fun. • Even though the service is free, there's the hidden cost of your privacy. • While social networking sites may feel like an invitation-only gathering of friends, it's not necessarily a closed and safe universe. • The impulse to share has caused many of us to unintentionally expose ourselves in ways that can compromise our safety and security. • Cyber stalking ..
  • 4. CYBERSTALKING CYBERSTALKING What is cyberstalking? • It is technology-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control.
  • 5. CYBERSTALKING CYBERSTALKING CAN TAKE MANY FORMS • Harassment, embarrassment and humiliation of the victim • Harassing family, friends and employers to isolate the victim • Scare tactics to instill fear and more.
  • 6. CYBERSTALKING CYBERSTALKING IS NOT IDENTITY THEFT • An identity thief, has a very specific goal in mind — financial gain. • Identity thieves are unconcerned by the consequences of their behavior on the victim’s life, • The actions of a cyberstalker are deliberate and focused on the consequences to the victim.
  • 7. CYBERSTALKING EFFECTS OF BEING CYBERSTALKED? • Angry • Annoyed • Anxious • Helpless • Depressed • Hopeless • Feelings of uncertainty and unpredictability • Trouble sleeping and concentrating • Weight instabilities (losing or gaining) • Loss of personal safety and security
  • 8. SOCIAL NETWORKING SAFETY TIPS Social Networking Safety Tips •How do I Know You •No Such Thing as Private •Review Before Posting •X Marks the Spot •A Little Bird Told Me •How Old Are You Now? •Separate Work and Family •It's Your Fault If It's Default •You Play, You Pay...in Loss of Privacy