Lecture Professional Practices in IT: Lecture 16

pdf
Số trang Lecture Professional Practices in IT: Lecture 16 16 Cỡ tệp Lecture Professional Practices in IT: Lecture 16 185 KB Lượt tải Lecture Professional Practices in IT: Lecture 16 0 Lượt đọc Lecture Professional Practices in IT: Lecture 16 1
Đánh giá Lecture Professional Practices in IT: Lecture 16
4.2 ( 5 lượt)
Nhấn vào bên dưới để tải tài liệu
Đang xem trước 10 trên tổng 16 trang, để tải xuống xem đầy đủ hãy nhấn vào bên trên
Chủ đề liên quan

Nội dung

Lecture 16 Secure Social Networking Overview • • • • What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children What is Social Networking? Wikipedia A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others. National Cyber Alert System “Social networking sites…build on the concept of traditional social networks where you are connected to new people through the people you already know.” “Friend of a Friend” More definitions  Web 2.0 – technology that “allows users to interact with others and to change website content, in contrast to non-interactive websites that are limited to passive viewing of information.” (Wikipedia) Examples: social networking sites, video sharing sites, blogs, etc.  Facebook & MySpace – free-access social networking websites  Twitter – “micro” blog – 140 characters or less  Blog – shared on-line journal  Video Sharing Sites – YouTube, Flikr  Podcast – audio broadcast that can be downloaded The Good, the bad and the Ugly • The Good – Networking – Communicating – Reconnecting with old friends – Keeping up with family – Business marketing and promotion • i.e., Facebook, Twitter – Entertaining and fun Virginia Tech example After shooting rampage in 2007, campus in lockdown mode, phone lines jammed, website overloaded – students, faculty, staff used “…MySpace and Facebook to get in touch with family and friends outside traditional channels.” Also used to “…send condolences, share memories and gain closure.” *SC Magazine, article “Social Anxiety”, page 21, August 2009. The Bad and the ugly Personal information could get in the wrong hands. Phishing scams, viruses and spyware may spread through social networks. Once you’ve posted something, others can copy it or it may exist in cache, so that even if you delete it, it may still exist and is out of your control. Anti-social? If you spend all your time on the computer. More bad and ugly • Internet provides sense on anonymity. • Lack of physical contact may give false sense of security. • People may post information for friends to read, forgetting that others may see it. Examples The case of a person asking for emergency money while impersonating a Facebook user to her friends. http://eliasbizannes.com/blog/2009/01/phishing-forfraud-on-facebook/ Also the British MI6 chief that was exposed by his wife’s Facebook pictures: http://www.dailymail.co.uk/news/article1197562/MI6-chief-blows-cover-wifes-Facebookaccount-reveals-family-holidays-showbiz-friends-linksDavid-Irving.html How can you protect yourself?  Keep private information private Do not post address, ssn, phone number, financial info, your schedule, full birth date Be careful not to display information used to answer security questions (e.g., favorite pet, mother’s maiden name)  Use caution when you click links  Be careful about installing extras on your site  Be wary of unknown friends (strangers)  Google yourself  Don’t blindly connect  Trust your gut instinct
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.