Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
What is identity theft, and how can you protect yourself from it?
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber Crimes.
About Facebook Facebook is a social networking service launched in February 2004, owned and operated by Facebook Inc. Facebook was founded by Mark Zuckerberg.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety.
An Introduction to Phishing and Viruses
Information Security.
Ways to protect yourself against hackers
Software Applications for end-users
Importance of Privacy Internet Safety
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Staying safe on the internet
Computer Security.
9 ways to avoid viruses and spyware
Bethesda Cybersecurity Club
Internet Safety – Social Media
Information Technology Services Education and Awareness Team
What is Phishing? Pronounced “Fishing”
G061 - Network Security.
Presentation transcript:

Internet and Social Media Security

Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking

Statistics

Statistics Cont.

Facebook Hacking Video md7cUhttp:// md7cU

Facebook Scammers Phishing: An attempt to obtain personal or financial information using fraudulent means, usually by posing as a legitimate website Results of phishing –Spyware: Technology that tracks your online activity and collects information. –Viruses –Spam/Spamming your friends –Obtaining login information etc.

Facebook Phishing Examples

Avoiding Facebook Scams Avoiding Facebook scams: –Having up to date web browser –Avoid suspicious wall postings and messages. –If your logged into Facebook, don’t login again if prompted. –Use Facebook Security Tools –Log out when your done.

Mrs. McKinney’s Facebook Consequences Access to the McKinney Family Access to friended students Information about Mrs. McKinney’s location, workplace, and future plans

Facebook Security Features

Basics of Protecting a Facebook Account Think before you click Only friend people you know Authentication: i.e. login names and passwords –8 characters –Letters, characters, numbers –Don’t use one password for all of your logins –Change it regularly –Don’t share it with friends Be careful what you post, it is there forever and can be stolen.

The Facebook Motto Stop –Before you click on something Think –Where did the posting, message, or link come from –Can it be trusted? –What might the consequences be? Connect

Data Encryption Process of scrambling a message between two users in such a way that eavesdroppers or hackers can’t read it. Consists of: –Message/Data –Key Pp0Uwhttp:// Pp0Uw

Data Encryption (cont.)

Basic Encryption Example Encrypted Message jopjzhfkkbvolzhp Encryption Key abcdefghijklmnopqrstuvwxyz xyzabcdefghijklmnopqrstuvw Decrypted Message MrsMckinneyRocks

HTTPS Hypertext Transfer Protocol Secure Computers use a “code” to scramble messages so no one can read them and keeps your information safe. When you see “https” in your web address, that site is secure and data encrypted.

HTTPS (cont.)

Cell Phone Hacking Steal/Find your cell phone Install an app with a virus that captures all your data. Connect to an unsecure WIFI where someone can capture and read everything that is sent across the web

A Hacker can… Listen to your phone calls Read your text messages Follow your internet browsing Pinpoint your location View your photos, videos, and contacts. Ability access to your account. Log onto personal websites and view or change all of your account info. Transmit audio and video when your phone is off

Cell Phone Hacking Prevention Treat your phone like you would a computer Don’t install untrusted apps Use different passwords for different services Use the built in pass lock on your phone. – Use something random and hard!

Questions Thanks for your attention!!!