Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.

Similar presentations


Presentation on theme: "Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking."— Presentation transcript:

1 Internet and Social Media Security

2 Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking

3 Statistics

4 Statistics Cont.

5

6 Facebook Hacking Video http://www.youtube.com/watch?v=zBZryn md7cUhttp://www.youtube.com/watch?v=zBZryn md7cU

7 Facebook Scammers Phishing: An attempt to obtain personal or financial information using fraudulent means, usually by posing as a legitimate website Results of phishing –Spyware: Technology that tracks your online activity and collects information. –Viruses –Spam/Spamming your friends –Obtaining email login information etc.

8 Facebook Phishing Examples

9 Avoiding Facebook Scams Avoiding Facebook scams: –Having up to date web browser –Avoid suspicious wall postings and messages. –If your logged into Facebook, don’t login again if prompted. –Use Facebook Security Tools –Log out when your done.

10 Mrs. McKinney’s Facebook Consequences Access to the McKinney Family Access to friended students Information about Mrs. McKinney’s location, workplace, and future plans

11 Facebook Security Features

12 Basics of Protecting a Facebook Account Think before you click Only friend people you know Authentication: i.e. login names and passwords –8 characters –Letters, characters, numbers –Don’t use one password for all of your logins –Change it regularly –Don’t share it with friends Be careful what you post, it is there forever and can be stolen.

13 The Facebook Motto Stop –Before you click on something Think –Where did the posting, message, or link come from –Can it be trusted? –What might the consequences be? Connect

14 Data Encryption Process of scrambling a message between two users in such a way that eavesdroppers or hackers can’t read it. Consists of: –Message/Data –Key http://www.youtube.com/watch?v=8fFhG6 Pp0Uwhttp://www.youtube.com/watch?v=8fFhG6 Pp0Uw

15 Data Encryption (cont.)

16 Basic Encryption Example Encrypted Message jopjzhfkkbvolzhp Encryption Key abcdefghijklmnopqrstuvwxyz xyzabcdefghijklmnopqrstuvw Decrypted Message MrsMckinneyRocks

17 HTTPS Hypertext Transfer Protocol Secure Computers use a “code” to scramble messages so no one can read them and keeps your information safe. When you see “https” in your web address, that site is secure and data encrypted.

18 HTTPS (cont.)

19 Cell Phone Hacking Steal/Find your cell phone Install an app with a virus that captures all your data. Connect to an unsecure WIFI where someone can capture and read everything that is sent across the web

20 A Hacker can… Listen to your phone calls Read your text messages Follow your internet browsing Pinpoint your location View your photos, videos, and contacts. Ability access to your email account. Log onto personal websites and view or change all of your account info. Transmit audio and video when your phone is off

21 Cell Phone Hacking Prevention Treat your phone like you would a computer Don’t install untrusted apps Use different passwords for different services Use the built in pass lock on your phone. – Use something random and hard!

22 Questions Thanks for your attention!!!


Download ppt "Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking."

Similar presentations


Ads by Google