Presentation is loading. Please wait.

Presentation is loading. Please wait.

Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.

Similar presentations


Presentation on theme: "Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability."— Presentation transcript:

1 Social Networking Practices

2 Information Security Purpose is to protect your information’s Confidentiality Integrity Availability

3 Platforms for Social Interaction Smart Phones Tablets Home PC Public PC Video Game Portal

4 Platforms for Social Interaction Blogs Chat Rooms Social Networks Online Gaming Text messaging

5 Examples of Social Networks Facebook Instagram Twitter Google+ MySpace Pinterest

6 Information Made Public Full Name Date of Birth Place of Birth Current Location Interests Phone Number Email Address Personal Pictures Relationships School information Can you think of any other information at risk?

7 Protecting Your Information

8 Ways to Protect Yourself Keep your information PRIVATE Be careful what you click on Use security software that updates automatically Create a secure password http://www.cnn.com/2009/CRIME/10/19/social.n etworking.crimes/index.html

9 Privacy Familiarize yourself with the security and privacy settings Limit the information available Don’t post your address and phone number Limit who can view your information Only Friends and Family

10 Privacy Be careful what you post Don’t accept friend requests from strangers Learn how to report a compromised account

11 www.facebook.com/hacked

12 Be Careful What You Click On Many links available include: –Links to Surveys –Links to Videos –Pages “liked” by your friends –Links suggested by your friends

13 Brain Teaser

14 Be Careful What You Click On Links can redirect you to inappropriate sites Links may contain viruses –Virus can: Destroy your computer Access and release your information Expensive hassle for your parents

15 Protecting Yourself from Viruses Run Security Updates/Scans Frequently Scans detect: –Viruses –Trojan horses –Spyware –Other malicious software

16 Protecting Yourself from Viruses Examples of Security Software –McAfee –Norton AntiVirus –AVG –SpyBot S&D

17 Have a Secure Password!

18 Change your passwords frequently Use more than 8 characters –More Characters = Stronger Passwords Include special characters –Ex. #, @, %, $, etc. Use both upper and lower case characters –Ex. AbCdeF Components of a Strong Password http://www.integritysrc.com/faqs/security- faqs/131-components-strong-password

19 Components of a Strong Password Avoid using “dictionary” words or stereotypical passwords such as “password” Avoid using important dates or other meaningful information in your password Try using a passphrase instead of a password –“I8burger4d!NER” (I ate burger for dinner) http://www.integritysrc.com/faqs/security- faqs/131-components-strong-password

20

21 Pop Quiz Name one device to access social networking sites.

22 Pop Quiz What are some examples of personal information that can be made available on social networking sites?

23 Pop Quiz Name two ways to protect your personal information on your social networking site.

24 Pop Quiz What are the dangers of clicking on random links?

25 Pop Quiz How can you protect yourself from viruses?

26 Pop Quiz What are characteristics of a strong password?

27 Questions?


Download ppt "Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability."

Similar presentations


Ads by Google