Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption...
-
Upload
derrick-morgan -
Category
Documents
-
view
216 -
download
0
Transcript of Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption...
![Page 1: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/1.jpg)
Internet and Social Media Security
![Page 2: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/2.jpg)
Outline
• Statistics
• Facebook Hacking and Security
• Data Encryption
• Cell Phone Hacking
![Page 3: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/3.jpg)
Statistics
![Page 4: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/4.jpg)
Statistics Cont.
![Page 5: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/5.jpg)
![Page 6: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/6.jpg)
Facebook Hacking Video
• http://www.youtube.com/watch?v=zBZrynmd7cU
![Page 7: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/7.jpg)
Facebook Scammers
• Phishing: An attempt to obtain personal or financial information using fraudulent means, usually by posing as a legitimate website
• Results of phishing– Spyware: Technology that tracks your online
activity and collects information.– Viruses– Spam/Spamming your friends– Obtaining email login information etc.
![Page 8: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/8.jpg)
Facebook Phishing Examples
![Page 9: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/9.jpg)
Avoiding Facebook Scams
• Avoiding Facebook scams:– Having up to date web browser– Avoid suspicious wall postings and
messages.– If your logged into Facebook, don’t login again
if prompted.– Use Facebook Security Tools– Log out when your done.
![Page 10: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/10.jpg)
Mrs. McKinney’s Facebook
Consequences•Access to the McKinney Family•Access to friended students•Information about Mrs. McKinney’s location, workplace, and future plans
![Page 11: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/11.jpg)
Facebook Security Features
![Page 12: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/12.jpg)
Basics of Protecting a Facebook Account
• Think before you click• Only friend people you know• Authentication: i.e. login names and passwords
– 8 characters– Letters, characters, numbers– Don’t use one password for all of your logins– Change it regularly– Don’t share it with friends
• Be careful what you post, it is there forever and can be stolen.
![Page 13: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/13.jpg)
The Facebook Motto
• Stop– Before you click on something
• Think – Where did the posting, message, or link come
from– Can it be trusted?– What might the consequences be?
• Connect
![Page 14: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/14.jpg)
Data Encryption
• Process of scrambling a message between two users in such a way that eavesdroppers or hackers can’t read it.
• Consists of:– Message/Data– Key
• http://www.youtube.com/watch?v=8fFhG6Pp0Uw
![Page 15: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/15.jpg)
Data Encryption (cont.)
![Page 16: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/16.jpg)
Basic Encryption Example
Encrypted Message
j o p j z h f k k b v o l z h p
Encryption Keya b c d e f g h i j k l m n o p q r s t u v w x y zx y z a b c d e f g h i j k l m n o p q r s t u v w
Decrypted Message
M r s M c k i n n e y R o c k s
![Page 17: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/17.jpg)
HTTPS
• Hypertext Transfer Protocol Secure
• Computers use a “code” to scramble messages so no one can read them and keeps your information safe.
• When you see “https” in your web address, that site is secure and data encrypted.
![Page 18: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/18.jpg)
HTTPS (cont.)
![Page 19: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/19.jpg)
Cell Phone Hacking
• Steal/Find your cell phone
• Install an app with a virus that
captures all your data.
• Connect to an unsecure WIFI where someone can capture and read everything that is sent across the web
![Page 20: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/20.jpg)
A Hacker can…
• Listen to your phone calls• Read your text messages• Follow your internet browsing• Pinpoint your location• View your photos, videos, and contacts.• Ability access to your email account.• Log onto personal websites and view or change
all of your account info.• Transmit audio and video when your phone is off
![Page 21: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/21.jpg)
Cell Phone Hacking Prevention• Treat your phone like you
would a computer
• Don’t install untrusted apps
• Use different passwords for different services
• Use the built in pass lock on your phone.– Use something random and hard!
![Page 22: Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.](https://reader036.fdocuments.in/reader036/viewer/2022062423/56649ece5503460f94bdab73/html5/thumbnails/22.jpg)
Questions
Thanks for your attention!!!