Social media threats. Warning! May contain mild peril.

Slides:



Advertisements
Similar presentations
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
Internet Safety & Awareness Dan Tomlinson 02/23/2013.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
Social Networking Safety. Dangers of online social networking Facebook Twitter Instagram.
Session # 52 Social Media: Manage the Security to Manage Your Experience Ross C. Hughes, U.S. Department of Education.
Kevin Mitnick Home Internet Security Course Today, Internet criminals are going after families. They try to guess your passwords and steal your credit.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Staying Safe Online A Practical Guide for Middle School Students.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
What is Spam? d min.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Digital Citizen Project By: Frances Murphey Technology and Education.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier.
Session # 52 Social Media: Manage the Security to Manage Your Experience Ross C. Hughes, U.S. Department of Education.
INTRODUCTION & QUESTIONS.
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Safety.
An Introduction to Phishing and Viruses
Information Security.
Social Media: What You Should Know
Lesson 2- Protecting Yourself Online
Cyberspace Risks and Defenses
Computer Security.
ICT Communications Lesson 3: Internet Life and Privacy
Session # 52 Social Media: Manage the Security to Manage Your Experience Ross C. Hughes, U.S. Department of Education.
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Communicating in the IT Industry
Presentation transcript:

Social media threats

Warning! May contain mild peril

What is social media? Risks associated with social media How the threats work Social media spam Social media phishing Social media malware Using social media safely Contents

What is social media?

Social media has arrived Social networking sites are now more popular than web-based

Allows users to become a member of an online community Key features are “Profiles” and “Friend lists” The most commonly used social network is still Facebook 2009 saw the rapid emergence of Twitter Also called social networking Social media – key features

Risks associated with social media

Users publishing information Social networking attacks Two main types of threat

Reveal sensitive information Defamation of others/school system This can be inadvertent or deliberate And the repercussions include: Reputation damage Fines Users publishing information

Hobby/ showing off Financially-motivated organized crime Social networking attacks

Social networking accounts are valuable to hackers They can use them to send spam, spread malware, steal identities... … in the quest to acquire personal information for financial gain Social networking attacks

Data = $$$ Steal your money directly Sell your data Trick your friends and family into supplying personal data Sell your identity Use your accounts to spread spam, malware and more data theft scams! Sell your school’s data or sensitive information Blackmail individuals and organizations

How the threats work

Spam Phishing Malware

Social networking spam

of social networking users report being hit by spam via the services 57% 70.6% That’s an increase of from a year ago Social networking spam

Social networking phishing

of social networking users report phishing attacks via the sites 30% 42.9% That’s an increase of from a year ago Social networking phishing

Social networking malware

Using social media safely

KNOW THE RULES - check your organization’s policy on social networking USE SECURE PASSWORDS - minimum 14 characters including non-letters CHECK THE DEFAULT SETTINGS - don’t providing personal information by default BE PICTURE PRUDENT - think before posting images that might cause embarrassment BEWARE OF BIG BROTHER - assume everyone can read your posts, including hackers! SECURE YOUR COMPUTERS - use up-to-date security software and firewalls THINK BEFORE YOU CLICK - if the looks dodgy it probably is STRANGER DANGER - beware of unsolicited invitations from spammers Top tips for staying secure

Financially-motivated criminals are increasingly using social media sites to steal identities, spread malware and send spam Social networks are getting better at protecting users against these threats – but there’s a long way to go The onus is on YOU to use social media sites safely – follow the top tips for staying secure Summary

Thank you