SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Be secure, be aware.


Be Security Aware.

  Cyberstalking and
  Safety Tips for Social
  Networks
   B A H R A I N S E P T E M B E R 1 3 TH, 2 0 1 2




      Salah Khalifa @albinjassim
      Security Empowerment Consultant
AGENDA
AGENDA



   •Social Media
   •Cyberstalking
   •Social Media Safety Tips
   •QA.
SOCIAL MEDIA
SOCIAL MEDIA

• Social media is fun.
• Even though the service is free, there's
  the hidden cost of your privacy.
• While social networking sites may feel
  like an invitation-only gathering of
  friends, it's not necessarily a closed and
  safe universe.
• The impulse to share has caused many
  of us to unintentionally expose
  ourselves in ways that can compromise
  our safety and security.
• Cyber stalking ..
CYBERSTALKING
CYBERSTALKING

What is cyberstalking?

• It is technology-based “attack” on one person who has
  been targeted specifically for that attack for reasons of
  anger, revenge or control.
CYBERSTALKING
CYBERSTALKING CAN TAKE MANY FORMS


• Harassment, embarrassment and humiliation of the
  victim
• Harassing family, friends and employers to isolate the
  victim
• Scare tactics to instill fear and more.
CYBERSTALKING
 CYBERSTALKING IS NOT IDENTITY THEFT


• An identity thief, has a very specific goal in mind —
  financial gain.
• Identity thieves are unconcerned by the consequences of
  their behavior on the victim’s life,
• The actions of a cyberstalker are deliberate and focused
  on the consequences to the victim.
CYBERSTALKING
EFFECTS OF BEING CYBERSTALKED?

•   Angry
•   Annoyed
•   Anxious
•   Helpless
•   Depressed
•   Hopeless
•   Feelings of uncertainty and unpredictability
•   Trouble sleeping and concentrating
•   Weight instabilities (losing or gaining)
•   Loss of personal safety and security
SOCIAL NETWORKING SAFETY TIPS
Social Networking Safety Tips



•How do I Know You
•No Such Thing as Private
•Review Before Posting
•X Marks the Spot
•A Little Bird Told Me
•How Old Are You Now?
•Separate Work and Family
•It's Your Fault If It's Default
•You Play, You Pay...in Loss of Privacy

Mais conteúdo relacionado

Destaque

Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
Dampak negatif media sosial
Dampak negatif media sosialDampak negatif media sosial
Dampak negatif media sosial
pha_phin
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 

Destaque (7)

Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
2017 Dubai School Fees (Infographic)
2017 Dubai School Fees (Infographic)2017 Dubai School Fees (Infographic)
2017 Dubai School Fees (Infographic)
 
2017 Abu Dhabi School Fees (Infographic)
2017 Abu Dhabi School Fees (Infographic)2017 Abu Dhabi School Fees (Infographic)
2017 Abu Dhabi School Fees (Infographic)
 
Dampak negatif media sosial
Dampak negatif media sosialDampak negatif media sosial
Dampak negatif media sosial
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 

Semelhante a Cyberstalking and safety tips for social networks

How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
alexclark-efc
 

Semelhante a Cyberstalking and safety tips for social networks (20)

Social Media Safety for K-8 audience
Social Media Safety for K-8 audienceSocial Media Safety for K-8 audience
Social Media Safety for K-8 audience
 
Stay safe online
Stay safe onlineStay safe online
Stay safe online
 
2012 students-good internet choices
2012 students-good internet choices2012 students-good internet choices
2012 students-good internet choices
 
2011 elementary students-making good choices online
2011 elementary students-making good choices online2011 elementary students-making good choices online
2011 elementary students-making good choices online
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Stranger danger in social media
Stranger danger in social mediaStranger danger in social media
Stranger danger in social media
 
CYBER BULLYING.pptx
CYBER BULLYING.pptxCYBER BULLYING.pptx
CYBER BULLYING.pptx
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
1. goldsmiths short course the attention economy - 13th february
1. goldsmiths short course   the attention economy - 13th february1. goldsmiths short course   the attention economy - 13th february
1. goldsmiths short course the attention economy - 13th february
 
Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)Cyber bullying arcenal and ayco (1)
Cyber bullying arcenal and ayco (1)
 
How To Keep Safe On The Internet!
How To Keep Safe On The Internet!How To Keep Safe On The Internet!
How To Keep Safe On The Internet!
 
Digital citizenship.pptx
Digital citizenship.pptxDigital citizenship.pptx
Digital citizenship.pptx
 
Cyberbullying - Murat Kaplan.pptx
Cyberbullying - Murat Kaplan.pptxCyberbullying - Murat Kaplan.pptx
Cyberbullying - Murat Kaplan.pptx
 
Cyberbullying.pptx
Cyberbullying.pptxCyberbullying.pptx
Cyberbullying.pptx
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Cyber Bullying By Anamika
Cyber Bullying By AnamikaCyber Bullying By Anamika
Cyber Bullying By Anamika
 
Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1Cyber bullying arcenal_and_ayco1
Cyber bullying arcenal_and_ayco1
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

Mais de MarketingatBahrain

Mais de MarketingatBahrain (20)

Social Media Strategic Planning Process
Social Media Strategic Planning ProcessSocial Media Strategic Planning Process
Social Media Strategic Planning Process
 
Getting started with social media strategic planning webinar
Getting started with social media strategic planning webinarGetting started with social media strategic planning webinar
Getting started with social media strategic planning webinar
 
Social Media Toolkit for Entrepreneurs
Social Media Toolkit for EntrepreneursSocial Media Toolkit for Entrepreneurs
Social Media Toolkit for Entrepreneurs
 
Social Media Strategies for Entrepreneurs
Social Media Strategies for EntrepreneursSocial Media Strategies for Entrepreneurs
Social Media Strategies for Entrepreneurs
 
The Evolution of Event Apps
The Evolution of Event AppsThe Evolution of Event Apps
The Evolution of Event Apps
 
Mobile for Business - This is the Q?
Mobile for Business - This is the Q?Mobile for Business - This is the Q?
Mobile for Business - This is the Q?
 
Utilizing Social Media for Events Marketing
Utilizing Social Media for Events MarketingUtilizing Social Media for Events Marketing
Utilizing Social Media for Events Marketing
 
Set up your Corporate Blo
Set up your Corporate BloSet up your Corporate Blo
Set up your Corporate Blo
 
Marketing your blog
Marketing your blogMarketing your blog
Marketing your blog
 
Content creation - Let us blog!
Content creation - Let us blog!Content creation - Let us blog!
Content creation - Let us blog!
 
Corporate blogging intro
Corporate blogging introCorporate blogging intro
Corporate blogging intro
 
Social Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business SeminarSocial Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business Seminar
 
The Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business SeminarThe Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business Seminar
 
Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar
 
Social Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business SeminarSocial Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business Seminar
 
Intro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business SeminarIntro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business Seminar
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
My love story
My love storyMy love story
My love story
 
Facebook & instagram case study in ksa
Facebook & instagram case study in ksaFacebook & instagram case study in ksa
Facebook & instagram case study in ksa
 
Growing Active Facebook Communities
Growing Active Facebook CommunitiesGrowing Active Facebook Communities
Growing Active Facebook Communities
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Cyberstalking and safety tips for social networks

  • 1. Be secure, be aware. Be Security Aware. Cyberstalking and Safety Tips for Social Networks B A H R A I N S E P T E M B E R 1 3 TH, 2 0 1 2 Salah Khalifa @albinjassim Security Empowerment Consultant
  • 2. AGENDA AGENDA •Social Media •Cyberstalking •Social Media Safety Tips •QA.
  • 3. SOCIAL MEDIA SOCIAL MEDIA • Social media is fun. • Even though the service is free, there's the hidden cost of your privacy. • While social networking sites may feel like an invitation-only gathering of friends, it's not necessarily a closed and safe universe. • The impulse to share has caused many of us to unintentionally expose ourselves in ways that can compromise our safety and security. • Cyber stalking ..
  • 4. CYBERSTALKING CYBERSTALKING What is cyberstalking? • It is technology-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control.
  • 5. CYBERSTALKING CYBERSTALKING CAN TAKE MANY FORMS • Harassment, embarrassment and humiliation of the victim • Harassing family, friends and employers to isolate the victim • Scare tactics to instill fear and more.
  • 6. CYBERSTALKING CYBERSTALKING IS NOT IDENTITY THEFT • An identity thief, has a very specific goal in mind — financial gain. • Identity thieves are unconcerned by the consequences of their behavior on the victim’s life, • The actions of a cyberstalker are deliberate and focused on the consequences to the victim.
  • 7. CYBERSTALKING EFFECTS OF BEING CYBERSTALKED? • Angry • Annoyed • Anxious • Helpless • Depressed • Hopeless • Feelings of uncertainty and unpredictability • Trouble sleeping and concentrating • Weight instabilities (losing or gaining) • Loss of personal safety and security
  • 8. SOCIAL NETWORKING SAFETY TIPS Social Networking Safety Tips •How do I Know You •No Such Thing as Private •Review Before Posting •X Marks the Spot •A Little Bird Told Me •How Old Are You Now? •Separate Work and Family •It's Your Fault If It's Default •You Play, You Pay...in Loss of Privacy