SlideShare uma empresa Scribd logo
1 de 20
Technological Awareness for
Teens and Young Adults
What is Social Networking?
• Social Networking is a social structure
made of individuals who are tied by
specific types of relationships.
– Facebook
– Myspace
– Twitter
– Flickr
– Youtube
What Not to Share
• Anything you wouldn’t be comfortable
having your family see
– Inappropriate photos
– Offensive comments or language
– Personal Information
• Birth Date
• Home Address
• Vacation Plans
• Favorite Activities
• Information that could be used to answer security questions
10 things NOT to do on social
networking sites
1. Post your full name
2. Post your date of birth
3. Post contact Information: phone, email or address
4. Post pictures you don’t want everyone to see
5. Assume any communication here is private
6. Post information about your school or work
7. Talk about places and times of where your going to be
8. Post information about new purchases
9. Add friends you don’t really know
10. DO enable privacy on your accounts
Who Does this Apply to?
• Everybody
– Even if you don’t have a social networking account
you can be impacted by what others post about you
• Student Athletes are in the spotlight more then
average students
– Held to a higher standard
– Upheld to a student athlete code of conduct
– Some colleges have added restrictions to social
networking in code of conduct contracts
– Role models for other students
Consequences of Inappropriate Use
• College Admissions Decisions
– 1 in 10 college admissions officers routinely
check applicants social networking pages
• 38% found information that reflected poorly on the
students http://youngadults.about.com/od/legalissues/a/facebookcaveat.htm
• Employment Decisions
– 34% of hiring managers have chosen not to
hire a candidate based on information in their
social network profiles
http://www.cnn.com/2008/LIVING/worklife/11/05/cb.social.networking/index.html
Consequences of Inappropriate Use
• Suspension/Expulsion of athletic privileges
– Two Nebraska wrestlers kicked off team over inappropriate photos
http://www.nowpublic.com/sports/two-nebraska-wrestlers-kicked-team-over-nude-internet-photos
– Michael Phelps suspended from competition for 3 months over photos
depicting illegal drug use http://abcnews.go.com/Sports/wireStory?id=6816007
• Legal Consequences
– Pictures from Facebook were used to cite violators of university alcohol
policy at North Carolina State University
http://web.archive.org/web/20051031084848/http://www.wral.com/news/5204275/detail.html
– Murder suspect Dwayne Stancill of Oakland California was identified
through a gangs MySpace web page http://mashable.com/2007/10/25/murder-suspect-caught-
through-myspace/
• Higher risk of being robbed
– Recent new article states that burglars use Twitter, MySpace and other
sites to case homes http://maribyrnong-leader.whereilive.com.au/news/story/burglars-use-facebook-twitter-
to-target-empty-homes
Inappropriate Use of Electronic
Communication
• Don’t assume text message and emails are private
communication
– Assume anything sent through these methods is permanent
– Software can be installed on phones that alert a third party to
content being sent and received on the phone including photos
and text messages http://www.icarecoalition.org/parentalcontrols.asp
• Most employers use software to monitor email and
internet activity
• Chris Brown Rihanna incident started over a text
message from another woman
http://www.mtv.com/news/articles/1625680/20091106/rihanna.jhtml
• UNM recently published email strings from the Locksley
scandal www.kob.com
Text Messaging
• Sexting is sending nude pictures via text
message
– 20% of teenagers admit to engaging in sexting
http://www.associatedcontent.com/article/1390743/sexting_teens_charged_with_child_pornography.html
• Messages can be forwarded to unintended
recipients
• Could be embarrassing if pictures were seen by
unintended parties
• 6 Pennsylvania teenagers charged with child
pornography as a result of sexting
http://www.associatedcontent.com/article/1390743/sexting_teens_charged_with_child_pornography.html
Online Information Protection
• Transition from high school to adult lives
involves greater use of online accounts
– Financial Information
– Registering for College
– Job Applications
– Shopping
Password Selection
• Complex passwords are harder to crack
– Include capital and lowercase letters
– Include numbers
– Include special characters
• Change passwords regularly
• Don’t share passwords with ANYONE
• Use different passwords for different
accounts
Password Strength
• Most commonly used password: “password”
– How long would it take to crack this 8 character
password that only uses lower case letters?
• Approximately 348 minutes http://www.lockdown.co.uk/?pg=combi
• A better alternative: “P@ssw0rd”
– How long would it take to crack this 8 character
password that uses lower and upper case
letters, numbers, and special symbols?
• Approximately 23 years http://www.lockdown.co.uk/?pg=combi
Hacker Techniques
• Phishing
– Emails asking you to verify account or personal
information for security
• Banks and financial institutions will never ask you to
do this over the internet
– Social networking messages
• Is that really you in this video?
– Text Messages
• Your account has been compromised. Please call
(999)999-9999
Hacker Techniques
• Social Engineering
– People can probe you for information that can
lead to your security being compromised
• Be careful what information you give out to whom
– Mothers maiden name?
– Where you were born?
– What was your favorite pets name?
– Retrieving information from social networking
profiles
Hacker Techniques
• Dictionary Attacks
– Programs that check passwords against
commonly used passwords
• Spyware and Viruses
– Programs that are installed on you computer
without your knowledge
• Monitor keystrokes
• Track internet activity
• Compromise, corrupt, or destroy data
Computer and Document
Protection
• Threats to your computer
– Theft
– Hardware Failure
– Data Corruption
– Virus/Spyware
– User Access Controls
How to Protect your Computer
• Use and frequently update antivirus software
• Install software updates when they become
available
• Only install reputable and licensed software
• Check the source of emails before
downloading attachments
• Don’t follow links in emails. Instead use you
internet browser to navigate to the site
• http://www.mgt.unm.edu/technology/security.asp
How to Protect your Computer
• Avoid questionable websites
• Require password protection when starting
computer
• Use Strong Passwords
• Lock the screen or logout when you walk
away from your computer
• Don’t leave your computer unattended in
public places
• Back up important files on external media
• http://www.mgt.unm.edu/technology/security.asp
Best Practices
• Always use virus software on your PC
• Don’t assume electronic communication is private
• Use strong passwords and change them regularly
• Don’t share your passwords
• Use discretion on social networking sites
• Be cautious when making purchases online
• Only visit reputable websites
• Back up important data in a second location
• Don’t give out unnecessary personal information
Questions?

Mais conteúdo relacionado

Semelhante a Technological Awareness for Teens and Young Adults.ppt

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Rajesh Soundararajan
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart ParentBarry Caplin
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlineLane Sutton
 
Internet safety for parents
Internet safety for parentsInternet safety for parents
Internet safety for parentsKaren Brooks
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentationSarah Sell
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigationsCreepSquash
 

Semelhante a Technological Awareness for Teens and Young Adults.ppt (20)

Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
2.InternetSafety.ppt
2.InternetSafety.ppt2.InternetSafety.ppt
2.InternetSafety.ppt
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Computer / Internet Security WHPL
Computer / Internet Security WHPLComputer / Internet Security WHPL
Computer / Internet Security WHPL
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart Parent
 
eSmart Libraries social media presentation 2015
eSmart Libraries social media presentation 2015eSmart Libraries social media presentation 2015
eSmart Libraries social media presentation 2015
 
Pod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself onlinePod camp boston 2011 locking up yourself online
Pod camp boston 2011 locking up yourself online
 
Internet safety for parents
Internet safety for parentsInternet safety for parents
Internet safety for parents
 
Tec207 -final presentation
Tec207 -final presentationTec207 -final presentation
Tec207 -final presentation
 
Digital footprints & criminal investigations
Digital footprints & criminal investigationsDigital footprints & criminal investigations
Digital footprints & criminal investigations
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 

Último

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 

Último (20)

ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 

Technological Awareness for Teens and Young Adults.ppt

  • 2. What is Social Networking? • Social Networking is a social structure made of individuals who are tied by specific types of relationships. – Facebook – Myspace – Twitter – Flickr – Youtube
  • 3. What Not to Share • Anything you wouldn’t be comfortable having your family see – Inappropriate photos – Offensive comments or language – Personal Information • Birth Date • Home Address • Vacation Plans • Favorite Activities • Information that could be used to answer security questions
  • 4. 10 things NOT to do on social networking sites 1. Post your full name 2. Post your date of birth 3. Post contact Information: phone, email or address 4. Post pictures you don’t want everyone to see 5. Assume any communication here is private 6. Post information about your school or work 7. Talk about places and times of where your going to be 8. Post information about new purchases 9. Add friends you don’t really know 10. DO enable privacy on your accounts
  • 5. Who Does this Apply to? • Everybody – Even if you don’t have a social networking account you can be impacted by what others post about you • Student Athletes are in the spotlight more then average students – Held to a higher standard – Upheld to a student athlete code of conduct – Some colleges have added restrictions to social networking in code of conduct contracts – Role models for other students
  • 6. Consequences of Inappropriate Use • College Admissions Decisions – 1 in 10 college admissions officers routinely check applicants social networking pages • 38% found information that reflected poorly on the students http://youngadults.about.com/od/legalissues/a/facebookcaveat.htm • Employment Decisions – 34% of hiring managers have chosen not to hire a candidate based on information in their social network profiles http://www.cnn.com/2008/LIVING/worklife/11/05/cb.social.networking/index.html
  • 7. Consequences of Inappropriate Use • Suspension/Expulsion of athletic privileges – Two Nebraska wrestlers kicked off team over inappropriate photos http://www.nowpublic.com/sports/two-nebraska-wrestlers-kicked-team-over-nude-internet-photos – Michael Phelps suspended from competition for 3 months over photos depicting illegal drug use http://abcnews.go.com/Sports/wireStory?id=6816007 • Legal Consequences – Pictures from Facebook were used to cite violators of university alcohol policy at North Carolina State University http://web.archive.org/web/20051031084848/http://www.wral.com/news/5204275/detail.html – Murder suspect Dwayne Stancill of Oakland California was identified through a gangs MySpace web page http://mashable.com/2007/10/25/murder-suspect-caught- through-myspace/ • Higher risk of being robbed – Recent new article states that burglars use Twitter, MySpace and other sites to case homes http://maribyrnong-leader.whereilive.com.au/news/story/burglars-use-facebook-twitter- to-target-empty-homes
  • 8. Inappropriate Use of Electronic Communication • Don’t assume text message and emails are private communication – Assume anything sent through these methods is permanent – Software can be installed on phones that alert a third party to content being sent and received on the phone including photos and text messages http://www.icarecoalition.org/parentalcontrols.asp • Most employers use software to monitor email and internet activity • Chris Brown Rihanna incident started over a text message from another woman http://www.mtv.com/news/articles/1625680/20091106/rihanna.jhtml • UNM recently published email strings from the Locksley scandal www.kob.com
  • 9. Text Messaging • Sexting is sending nude pictures via text message – 20% of teenagers admit to engaging in sexting http://www.associatedcontent.com/article/1390743/sexting_teens_charged_with_child_pornography.html • Messages can be forwarded to unintended recipients • Could be embarrassing if pictures were seen by unintended parties • 6 Pennsylvania teenagers charged with child pornography as a result of sexting http://www.associatedcontent.com/article/1390743/sexting_teens_charged_with_child_pornography.html
  • 10. Online Information Protection • Transition from high school to adult lives involves greater use of online accounts – Financial Information – Registering for College – Job Applications – Shopping
  • 11. Password Selection • Complex passwords are harder to crack – Include capital and lowercase letters – Include numbers – Include special characters • Change passwords regularly • Don’t share passwords with ANYONE • Use different passwords for different accounts
  • 12. Password Strength • Most commonly used password: “password” – How long would it take to crack this 8 character password that only uses lower case letters? • Approximately 348 minutes http://www.lockdown.co.uk/?pg=combi • A better alternative: “P@ssw0rd” – How long would it take to crack this 8 character password that uses lower and upper case letters, numbers, and special symbols? • Approximately 23 years http://www.lockdown.co.uk/?pg=combi
  • 13. Hacker Techniques • Phishing – Emails asking you to verify account or personal information for security • Banks and financial institutions will never ask you to do this over the internet – Social networking messages • Is that really you in this video? – Text Messages • Your account has been compromised. Please call (999)999-9999
  • 14. Hacker Techniques • Social Engineering – People can probe you for information that can lead to your security being compromised • Be careful what information you give out to whom – Mothers maiden name? – Where you were born? – What was your favorite pets name? – Retrieving information from social networking profiles
  • 15. Hacker Techniques • Dictionary Attacks – Programs that check passwords against commonly used passwords • Spyware and Viruses – Programs that are installed on you computer without your knowledge • Monitor keystrokes • Track internet activity • Compromise, corrupt, or destroy data
  • 16. Computer and Document Protection • Threats to your computer – Theft – Hardware Failure – Data Corruption – Virus/Spyware – User Access Controls
  • 17. How to Protect your Computer • Use and frequently update antivirus software • Install software updates when they become available • Only install reputable and licensed software • Check the source of emails before downloading attachments • Don’t follow links in emails. Instead use you internet browser to navigate to the site • http://www.mgt.unm.edu/technology/security.asp
  • 18. How to Protect your Computer • Avoid questionable websites • Require password protection when starting computer • Use Strong Passwords • Lock the screen or logout when you walk away from your computer • Don’t leave your computer unattended in public places • Back up important files on external media • http://www.mgt.unm.edu/technology/security.asp
  • 19. Best Practices • Always use virus software on your PC • Don’t assume electronic communication is private • Use strong passwords and change them regularly • Don’t share your passwords • Use discretion on social networking sites • Be cautious when making purchases online • Only visit reputable websites • Back up important data in a second location • Don’t give out unnecessary personal information