Internet and Social Media Security
Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking
Statistics
Statistics Cont.
Facebook Hacking Video md7cUhttp:// md7cU
Facebook Scammers Phishing: An attempt to obtain personal or financial information using fraudulent means, usually by posing as a legitimate website Results of phishing –Spyware: Technology that tracks your online activity and collects information. –Viruses –Spam/Spamming your friends –Obtaining login information etc.
Facebook Phishing Examples
Avoiding Facebook Scams Avoiding Facebook scams: –Having up to date web browser –Avoid suspicious wall postings and messages. –If your logged into Facebook, don’t login again if prompted. –Use Facebook Security Tools –Log out when your done.
Mrs. McKinney’s Facebook Consequences Access to the McKinney Family Access to friended students Information about Mrs. McKinney’s location, workplace, and future plans
Facebook Security Features
Basics of Protecting a Facebook Account Think before you click Only friend people you know Authentication: i.e. login names and passwords –8 characters –Letters, characters, numbers –Don’t use one password for all of your logins –Change it regularly –Don’t share it with friends Be careful what you post, it is there forever and can be stolen.
The Facebook Motto Stop –Before you click on something Think –Where did the posting, message, or link come from –Can it be trusted? –What might the consequences be? Connect
Data Encryption Process of scrambling a message between two users in such a way that eavesdroppers or hackers can’t read it. Consists of: –Message/Data –Key Pp0Uwhttp:// Pp0Uw
Data Encryption (cont.)
Basic Encryption Example Encrypted Message jopjzhfkkbvolzhp Encryption Key abcdefghijklmnopqrstuvwxyz xyzabcdefghijklmnopqrstuvw Decrypted Message MrsMckinneyRocks
HTTPS Hypertext Transfer Protocol Secure Computers use a “code” to scramble messages so no one can read them and keeps your information safe. When you see “https” in your web address, that site is secure and data encrypted.
HTTPS (cont.)
Cell Phone Hacking Steal/Find your cell phone Install an app with a virus that captures all your data. Connect to an unsecure WIFI where someone can capture and read everything that is sent across the web
A Hacker can… Listen to your phone calls Read your text messages Follow your internet browsing Pinpoint your location View your photos, videos, and contacts. Ability access to your account. Log onto personal websites and view or change all of your account info. Transmit audio and video when your phone is off
Cell Phone Hacking Prevention Treat your phone like you would a computer Don’t install untrusted apps Use different passwords for different services Use the built in pass lock on your phone. – Use something random and hard!
Questions Thanks for your attention!!!