SlideShare a Scribd company logo
social networking &
 internet security
 i t    t      it
  by: w2fdb (Frank Brunke)
What is a social net ork?
                 network?




   Evolution graph of a social network: Barabási model.
twitter
 t itter
user generated platform
@#
twitter
t itter
twitter
t itter
Linkedin - G t the most from Linkedin
           Get th     tf     Li k di

•   Make sure your profile is complete
•   List your current position, at least 2 previous
•   Add in education information
•   Edit Vanity URL (www.linkedin.com/in/frankdbrunke)
•   Use keywords
•   Leverage existing network
Internet Security
         Sec rit
Internet Security
         Sec rit




     I am the king of 160!
Internet Security
          Sec rit
Antivirus - (not set it and forget it )
                                   it.)
 Make sure it is up-to-date and running.

Put in the time, to secure yourself

  Play and iTunes applications are not 100%
  safe.
    f

  You are in charge of your security!
Thank you
        o
Questions?

147.300
147 300

cq@w2fdb.com

w2fdb.com for a link to this presentation.

More Related Content

What's hot

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
Aaron Vick
 
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security PresentationJoe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Bruce Johnson
 
Pivotal tracker
Pivotal trackerPivotal tracker
Pivotal tracker
Mike Silvis
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
EC-Council
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
tonyh1
 
10 rules to be safe on internet
10 rules to be safe on internet10 rules to be safe on internet
10 rules to be safe on internet
Constanza Godoy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
App State ITC Program
 
Post-it notes: The banner that makes you like banners
Post-it notes: The banner that makes you like bannersPost-it notes: The banner that makes you like banners
Post-it notes: The banner that makes you like banners
World Brand Academy
 
Jitsi meet
Jitsi meetJitsi meet
Jitsi meet
Jorge Luis Sierra
 
Swap2010 twitter minining using semantic web technologies and linked data
Swap2010 twitter minining using semantic web technologies and linked dataSwap2010 twitter minining using semantic web technologies and linked data
Swap2010 twitter minining using semantic web technologies and linked data
Selver Softic
 
Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?
Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?
Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?
Ivanti
 
1
11
Fido U2F Security Key
Fido U2F Security KeyFido U2F Security Key
Fido U2F Security Key
GoTrust ID
 
Fido Security Key
Fido Security KeyFido Security Key
Fido Security Key
GoTrust ID
 
We Don't Need No Stinking Badges
We Don't Need No Stinking BadgesWe Don't Need No Stinking Badges
We Don't Need No Stinking Badges
Deep Focus
 
How to See People Who Block You on Twitter
How to See People Who Block You on TwitterHow to See People Who Block You on Twitter
How to See People Who Block You on Twitter
Bernard Goldbach
 

What's hot (16)

7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
 
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security PresentationJoe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
 
Pivotal tracker
Pivotal trackerPivotal tracker
Pivotal tracker
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
10 rules to be safe on internet
10 rules to be safe on internet10 rules to be safe on internet
10 rules to be safe on internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Post-it notes: The banner that makes you like banners
Post-it notes: The banner that makes you like bannersPost-it notes: The banner that makes you like banners
Post-it notes: The banner that makes you like banners
 
Jitsi meet
Jitsi meetJitsi meet
Jitsi meet
 
Swap2010 twitter minining using semantic web technologies and linked data
Swap2010 twitter minining using semantic web technologies and linked dataSwap2010 twitter minining using semantic web technologies and linked data
Swap2010 twitter minining using semantic web technologies and linked data
 
Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?
Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?
Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?
 
1
11
1
 
Fido U2F Security Key
Fido U2F Security KeyFido U2F Security Key
Fido U2F Security Key
 
Fido Security Key
Fido Security KeyFido Security Key
Fido Security Key
 
We Don't Need No Stinking Badges
We Don't Need No Stinking BadgesWe Don't Need No Stinking Badges
We Don't Need No Stinking Badges
 
How to See People Who Block You on Twitter
How to See People Who Block You on TwitterHow to See People Who Block You on Twitter
How to See People Who Block You on Twitter
 

Viewers also liked

SQL212.3 Introduction to SQL using Oracle Module 3
SQL212.3 Introduction to SQL using Oracle Module 3SQL212.3 Introduction to SQL using Oracle Module 3
SQL212.3 Introduction to SQL using Oracle Module 3
Dan D'Urso
 
How to find new Music
How to find new MusicHow to find new Music
How to find new Music
Travis Dahle
 
Samantha Resume
Samantha ResumeSamantha Resume
Samantha Resume
Samantha Rauscher
 
CI
CICI
CI
CICI
Being Caught Stealing (Con La Mano En El Pastel)
Being Caught Stealing (Con La Mano En El Pastel)Being Caught Stealing (Con La Mano En El Pastel)
Being Caught Stealing (Con La Mano En El Pastel)
flakinho
 
Lips & Mouth
Lips & MouthLips & Mouth
Lips & Mouth
fondas vakalis
 
Nice Travel
Nice TravelNice Travel
Nice Travel
fondas vakalis
 
SQL202 SQL Server SQL Manual
SQL202 SQL Server SQL ManualSQL202 SQL Server SQL Manual
SQL202 SQL Server SQL Manual
Dan D'Urso
 
Rockets
RocketsRockets
Rockets
Harvey Utech
 
Lean Fables from Adland
Lean Fables from AdlandLean Fables from Adland
Lean Fables from Adland
The Difference Engine
 
ifilms Company Profile
ifilms Company Profileifilms Company Profile
ifilms Company Profile
Tarek Fahim
 
Dahle Communication Group
Dahle Communication GroupDahle Communication Group
Dahle Communication Group
Travis Dahle
 
From Neo to Trinity: The Matrix Reinvented
From Neo to Trinity: The Matrix ReinventedFrom Neo to Trinity: The Matrix Reinvented
From Neo to Trinity: The Matrix Reinvented
The Difference Engine
 
Social enter strategic planning
Social enter strategic planningSocial enter strategic planning
Social enter strategic planning
Tarek Fahim
 
úLoha 11
úLoha 11úLoha 11
úLoha 11
guest96d5
 
X Ray Views
X Ray ViewsX Ray Views
X Ray Views
fondas vakalis
 
Allemand
AllemandAllemand
Allemand
Mathewshbk
 

Viewers also liked (19)

SQL212.3 Introduction to SQL using Oracle Module 3
SQL212.3 Introduction to SQL using Oracle Module 3SQL212.3 Introduction to SQL using Oracle Module 3
SQL212.3 Introduction to SQL using Oracle Module 3
 
How to find new Music
How to find new MusicHow to find new Music
How to find new Music
 
Samantha Resume
Samantha ResumeSamantha Resume
Samantha Resume
 
CI
CICI
CI
 
CI
CICI
CI
 
Being Caught Stealing (Con La Mano En El Pastel)
Being Caught Stealing (Con La Mano En El Pastel)Being Caught Stealing (Con La Mano En El Pastel)
Being Caught Stealing (Con La Mano En El Pastel)
 
Lips & Mouth
Lips & MouthLips & Mouth
Lips & Mouth
 
Nice Travel
Nice TravelNice Travel
Nice Travel
 
SQL202 SQL Server SQL Manual
SQL202 SQL Server SQL ManualSQL202 SQL Server SQL Manual
SQL202 SQL Server SQL Manual
 
Cute Animals
Cute AnimalsCute Animals
Cute Animals
 
Rockets
RocketsRockets
Rockets
 
Lean Fables from Adland
Lean Fables from AdlandLean Fables from Adland
Lean Fables from Adland
 
ifilms Company Profile
ifilms Company Profileifilms Company Profile
ifilms Company Profile
 
Dahle Communication Group
Dahle Communication GroupDahle Communication Group
Dahle Communication Group
 
From Neo to Trinity: The Matrix Reinvented
From Neo to Trinity: The Matrix ReinventedFrom Neo to Trinity: The Matrix Reinvented
From Neo to Trinity: The Matrix Reinvented
 
Social enter strategic planning
Social enter strategic planningSocial enter strategic planning
Social enter strategic planning
 
úLoha 11
úLoha 11úLoha 11
úLoha 11
 
X Ray Views
X Ray ViewsX Ray Views
X Ray Views
 
Allemand
AllemandAllemand
Allemand
 

Similar to Social networking and internet security

Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
AVEVA
 
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnDEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
Felipe Prado
 
FFLA 2012 pre conference 2012
FFLA 2012 pre conference 2012FFLA 2012 pre conference 2012
FFLA 2012 pre conference 2012
World Language Technology Consultants
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
Andy Smith
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint Encryption
Matt Dawdy
 
Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...
Priyanka Aash
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Mazin Ahmed
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
TechSoup
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
MILANOP1
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
swathiravishankar3
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
Executive Management Solutions
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
Patricia M Watson
 
Cyber Security
Cyber SecurityCyber Security
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric ImpInnovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
ProgrammableWeb
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
pcsafe
 
Internet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi FormatInternet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi Format
Health Education Library for People
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
Vi Tính Hoàng Nam
 

Similar to Social networking and internet security (20)

Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsnDEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
 
FFLA 2012 pre conference 2012
FFLA 2012 pre conference 2012FFLA 2012 pre conference 2012
FFLA 2012 pre conference 2012
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint Encryption
 
Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...Weaponizing data science for social engineering: automate E2E spear phishing ...
Weaponizing data science for social engineering: automate E2E spear phishing ...
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
 
cyber security
cyber securitycyber security
cyber security
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
MINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptxMINI PROJECT 2023 deepfake detection.pptx
MINI PROJECT 2023 deepfake detection.pptx
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric ImpInnovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Internet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi FormatInternet Changing Life Of Seniors Multi Format
Internet Changing Life Of Seniors Multi Format
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 

Social networking and internet security

  • 1. social networking & internet security i t t it by: w2fdb (Frank Brunke)
  • 2.
  • 3. What is a social net ork? network? Evolution graph of a social network: Barabási model.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. twitter t itter user generated platform @#
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Linkedin - G t the most from Linkedin Get th tf Li k di • Make sure your profile is complete • List your current position, at least 2 previous • Add in education information • Edit Vanity URL (www.linkedin.com/in/frankdbrunke) • Use keywords • Leverage existing network
  • 36. Internet Security Sec rit
  • 37. Internet Security Sec rit I am the king of 160!
  • 38. Internet Security Sec rit Antivirus - (not set it and forget it ) it.) Make sure it is up-to-date and running. Put in the time, to secure yourself Play and iTunes applications are not 100% safe. f You are in charge of your security!
  • 39. Thank you o Questions? 147.300 147 300 cq@w2fdb.com w2fdb.com for a link to this presentation.