search
Login | Signup | Support
  • 0
  • ×

    Add as FriendSocial media threats

    by: Rogers

    Current Rating : Rate It :

    197

    Views

    Download
     
    1 : Social media threats
    2 : Warning! May contain mild peril
    3 : What is social media? Risks associated with social media How the threats work Social media spam Social media phishing Social media malware Using social media safely Contents
    4 : What is social media?
    5 : Social media has arrived Social networking sites are now more popular than web-based email
    6 : Allows users to become a member of an online community Key features are “Profiles” and “Friend lists” The most commonly used social network is still Facebook 2009 saw the rapid emergence of Twitter Also called social networking Social media – key features
    7 : Risks associated with social media
    8 : Users publishing information Social networking attacks Two main types of threat
    9 : Reveal sensitive information Defamation of others/school system This can be inadvertent or deliberate And the repercussions include: Reputation damage Fines Users publishing information
    10 : Hobby/ showing off Financially-motivated organized crime Social networking attacks
    11 : Social networking accounts are valuable to hackers They can use them to send spam, spread malware, steal identities... … in the quest to acquire personal information for financial gain Social networking attacks
    12 : Data = $$$ Steal your money directly Sell your data Trick your friends and family intosupplying personal data Sell your identity Use your accounts to spread spam, malware and more data theft scams! Sell your school’s data or sensitive information Blackmail individuals and organizations
    13 : How the threats work
    14 : How the threats work Spam Phishing Malware
    15 : Social networking spam
    16 : Social networking spam
    17 : Social networking spam
    18 : Social networking spam
    19 : Social networking spam
    20 : Social networking spam
    :
    22 : Social networking phishing
    23 : Social networking phishing
    24 : Social networking phishing
    25 : Social networking phishing
    :
    27 : Social networking malware
    28 : Social networking malware
    29 : Social networking malware
    30 : Social networking malware
    31 : Social networking malware
    32 : Social networking malware
    33 : Using social media safely
    34 : KNOW THE RULES - check your organization’s policy on social networking USE SECURE PASSWORDS - minimum 14 characters including non-letters CHECK THE DEFAULT SETTINGS - don’t providing personal information by default BE PICTURE PRUDENT - think before posting images that might cause embarrassment BEWARE OF BIG BROTHER - assume everyone can read your posts, including hackers! SECURE YOUR COMPUTERS - use up-to-date security software and firewalls THINK BEFORE YOU CLICK - if the email looks dodgy it probably is  STRANGER DANGER - beware of unsolicited invitations from spammers Top tips for staying secure
    35 : Financially-motivated criminals are increasingly using social media sites to steal identities, spread malware and send spam Social networks are getting better at protecting users against these threats – but there’s a long way to go The onus is on YOU to use social media sites safely – follow the top tips for staying secure Summary
    36 : Thank you

    Presentation Tags

    Copyright © 2019 www.slideworld.com. All rights reserved.