SlideShare a Scribd company logo
Breakfast at the Desk
   Facebook

   Twitter

   LinkedIn

   MySpace
   The internet provides a sense of
    anonymity

   The lack of physical interaction
    provides a false sense of security

   Those on social media tailor the
    information for their friends to
    read, forgetting that others may see it

   Social medial users want to offer
    insights to impress potential friends
    or associates
   As the popularity of these social sites
    grows, so do the risks of using them. Traffic
    is always followed by:

    ◦   Hackers
    ◦   Spammers
    ◦   Virus writers
    ◦   Identity thieves
    ◦   Other criminals
   Would you post your credit card number
    online?

   How about your bank account number?

   Would you respond to a stranger's e-mail
    request with your current address?

   What about your pets name?
   Psych

   Speed dating

   Thief would ask
    seemingly innocent
    questions
   Scientific American Article
    ◦ Herbert H. Thompson

   Broke into an acquaintance's account
    ◦   Internet Mining
    ◦   Online Resume
    ◦   Blog
    ◦   “Forgot Password”
   Good
    ◦ Where were you when you heard about 9/11?
    ◦ What was your childhood nickname?
    ◦ What was the name of your first stuffed
      animal?

   Fair
    ◦ What time of the day were you born?
    ◦ What was the first concert you attended?

   Poor
    ◦ In what year was your father born?
    ◦ What is your mother's maiden name?
    ◦ What color is your hair?
   You’re Identity Is Completely Safe…

   Is that all you have to worry about?

   What else is there?
WHAT ABOUT YOUR HOME?????
   Nearly 80% of burglars use
    Facebook, Foursquare, or Twitter to target
    houses

   75% use Google Street to stake out
    neighborhoods without actually being there
   Set your privacy status properly

   Only add actual “friends”

   Do not post vacation information

   Do not post photos of expensive items

   Do not post photos that reveal your
    address
   Beware of TMI

   Customize Your Privacy

   Limit Work History
    ◦ Sarah Palin!

   Don’t Trust… Verify!
   http://www.us-cert.gov/cas/tips/ST06-
    003.html

   http://msisac.cisecurity.org/newsletters/201
    1-12.cfm

   http://www.msnbc.msn.com/id/42322614/n
    s/technology_and_science-security/t/steps-
    staying-safe-social-networks/
Safety on social media

More Related Content

Viewers also liked

Windows 7 upgrade things to know
Windows 7 upgrade things to knowWindows 7 upgrade things to know
Windows 7 upgrade things to know
Chas Stephens
 
Welcome To The Wonderful World Of Google+ (Revisioned)
Welcome To The Wonderful World Of Google+ (Revisioned)Welcome To The Wonderful World Of Google+ (Revisioned)
Welcome To The Wonderful World Of Google+ (Revisioned)
Zack Ui
 
assignment
assignmentassignment
assignment
s1190098
 
Music Magazine Evaluation Powerpoint
Music Magazine Evaluation PowerpointMusic Magazine Evaluation Powerpoint
Music Magazine Evaluation Powerpoint10021174
 
JUNKO_WelcomeParty_2012
JUNKO_WelcomeParty_2012JUNKO_WelcomeParty_2012
JUNKO_WelcomeParty_2012
Thanh T. Nguyen
 
assignment
assignmentassignment
assignment
s1190098
 
assignment
assignmentassignment
assignment
s1190098
 
What will you do for privacy?
What will you do for privacy?What will you do for privacy?
What will you do for privacy?
tashamartin13
 
How we produced the front cover of our digipak
How we produced the front cover of our digipakHow we produced the front cover of our digipak
How we produced the front cover of our digipak
ben_mallins
 
Assignment
AssignmentAssignment
Assignment
s1190098
 
Outlook tips and tricks
Outlook tips and tricksOutlook tips and tricks
Outlook tips and tricks
Chas Stephens
 
Zingiber officinale
Zingiber officinaleZingiber officinale
Zingiber officinale
Adel Al-Rubaiey
 
Welcome To The Wonderful World Google+
Welcome To The Wonderful World Google+Welcome To The Wonderful World Google+
Welcome To The Wonderful World Google+
Zack Ui
 
Gypsies in hungary
Gypsies in hungaryGypsies in hungary
Gypsies in hungary
Gabriella Berényi
 
Law Enforcement
Law EnforcementLaw Enforcement
Law Enforcement
Cameron12
 
Matéria: Vício em Internet
Matéria: Vício em InternetMatéria: Vício em Internet
Matéria: Vício em Internet
Camila Tremea
 
Myth
MythMyth
Myth
tracyk94
 
Looking at the lyrics
Looking at the lyricsLooking at the lyrics
Looking at the lyrics
ben_mallins
 
Native Land, ChII
Native Land, ChIINative Land, ChII
Native Land, ChIItracyk94
 
Moolelo kaao
Moolelo kaaoMoolelo kaao
Moolelo kaao
tracyk94
 

Viewers also liked (20)

Windows 7 upgrade things to know
Windows 7 upgrade things to knowWindows 7 upgrade things to know
Windows 7 upgrade things to know
 
Welcome To The Wonderful World Of Google+ (Revisioned)
Welcome To The Wonderful World Of Google+ (Revisioned)Welcome To The Wonderful World Of Google+ (Revisioned)
Welcome To The Wonderful World Of Google+ (Revisioned)
 
assignment
assignmentassignment
assignment
 
Music Magazine Evaluation Powerpoint
Music Magazine Evaluation PowerpointMusic Magazine Evaluation Powerpoint
Music Magazine Evaluation Powerpoint
 
JUNKO_WelcomeParty_2012
JUNKO_WelcomeParty_2012JUNKO_WelcomeParty_2012
JUNKO_WelcomeParty_2012
 
assignment
assignmentassignment
assignment
 
assignment
assignmentassignment
assignment
 
What will you do for privacy?
What will you do for privacy?What will you do for privacy?
What will you do for privacy?
 
How we produced the front cover of our digipak
How we produced the front cover of our digipakHow we produced the front cover of our digipak
How we produced the front cover of our digipak
 
Assignment
AssignmentAssignment
Assignment
 
Outlook tips and tricks
Outlook tips and tricksOutlook tips and tricks
Outlook tips and tricks
 
Zingiber officinale
Zingiber officinaleZingiber officinale
Zingiber officinale
 
Welcome To The Wonderful World Google+
Welcome To The Wonderful World Google+Welcome To The Wonderful World Google+
Welcome To The Wonderful World Google+
 
Gypsies in hungary
Gypsies in hungaryGypsies in hungary
Gypsies in hungary
 
Law Enforcement
Law EnforcementLaw Enforcement
Law Enforcement
 
Matéria: Vício em Internet
Matéria: Vício em InternetMatéria: Vício em Internet
Matéria: Vício em Internet
 
Myth
MythMyth
Myth
 
Looking at the lyrics
Looking at the lyricsLooking at the lyrics
Looking at the lyrics
 
Native Land, ChII
Native Land, ChIINative Land, ChII
Native Land, ChII
 
Moolelo kaao
Moolelo kaaoMoolelo kaao
Moolelo kaao
 

Similar to Safety on social media

Internet Safety
Internet SafetyInternet Safety
Internet Safety
Leslie Witten
 
102009
102009102009
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Jackie McMahon
 
102008 A
102008 A102008 A
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
alexclark-efc
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
markkreiter
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
Michael Richards
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
cassielaut
 
022010
022010022010
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
Larry Magid
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
truddentechnology
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
truddentechnology
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
truddentechnology
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
truddentechnology
 
102010a
102010a102010a
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
Eric Castro
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
Tony L
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
Apostolos Syropoulos
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
KanelandSvihlik
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
Marian Merritt
 

Similar to Safety on social media (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
102009
102009102009
102009
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
102008 A
102008 A102008 A
102008 A
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
6 8 safety ppt final copy
6 8 safety ppt final copy6 8 safety ppt final copy
6 8 safety ppt final copy
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Cy Q Good One
Cy Q Good OneCy Q Good One
Cy Q Good One
 
022010
022010022010
022010
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
Pres Internet Safety Presentation
Pres Internet Safety PresentationPres Internet Safety Presentation
Pres Internet Safety Presentation
 
102010a
102010a102010a
102010a
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
The World Wide Web
The World Wide WebThe World Wide Web
The World Wide Web
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 

Safety on social media

  • 2. Facebook  Twitter  LinkedIn  MySpace
  • 3.
  • 4. The internet provides a sense of anonymity  The lack of physical interaction provides a false sense of security  Those on social media tailor the information for their friends to read, forgetting that others may see it  Social medial users want to offer insights to impress potential friends or associates
  • 5. As the popularity of these social sites grows, so do the risks of using them. Traffic is always followed by: ◦ Hackers ◦ Spammers ◦ Virus writers ◦ Identity thieves ◦ Other criminals
  • 6. Would you post your credit card number online?  How about your bank account number?  Would you respond to a stranger's e-mail request with your current address?  What about your pets name?
  • 7. Psych  Speed dating  Thief would ask seemingly innocent questions
  • 8. Scientific American Article ◦ Herbert H. Thompson  Broke into an acquaintance's account ◦ Internet Mining ◦ Online Resume ◦ Blog ◦ “Forgot Password”
  • 9. Good ◦ Where were you when you heard about 9/11? ◦ What was your childhood nickname? ◦ What was the name of your first stuffed animal?  Fair ◦ What time of the day were you born? ◦ What was the first concert you attended?  Poor ◦ In what year was your father born? ◦ What is your mother's maiden name? ◦ What color is your hair?
  • 10. You’re Identity Is Completely Safe…  Is that all you have to worry about?  What else is there?
  • 11. WHAT ABOUT YOUR HOME?????
  • 12. Nearly 80% of burglars use Facebook, Foursquare, or Twitter to target houses  75% use Google Street to stake out neighborhoods without actually being there
  • 13. Set your privacy status properly  Only add actual “friends”  Do not post vacation information  Do not post photos of expensive items  Do not post photos that reveal your address
  • 14. Beware of TMI  Customize Your Privacy  Limit Work History ◦ Sarah Palin!  Don’t Trust… Verify!
  • 15. http://www.us-cert.gov/cas/tips/ST06- 003.html  http://msisac.cisecurity.org/newsletters/201 1-12.cfm  http://www.msnbc.msn.com/id/42322614/n s/technology_and_science-security/t/steps- staying-safe-social-networks/