Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption...

Preview:

Citation preview

Internet and Social Media Security

Outline

• Statistics

• Facebook Hacking and Security

• Data Encryption

• Cell Phone Hacking

Statistics

Statistics Cont.

Facebook Hacking Video

• http://www.youtube.com/watch?v=zBZrynmd7cU

Facebook Scammers

• Phishing: An attempt to obtain personal or financial information using fraudulent means, usually by posing as a legitimate website

• Results of phishing– Spyware: Technology that tracks your online

activity and collects information.– Viruses– Spam/Spamming your friends– Obtaining email login information etc.

Facebook Phishing Examples

Avoiding Facebook Scams

• Avoiding Facebook scams:– Having up to date web browser– Avoid suspicious wall postings and

messages.– If your logged into Facebook, don’t login again

if prompted.– Use Facebook Security Tools– Log out when your done.

Mrs. McKinney’s Facebook

Consequences•Access to the McKinney Family•Access to friended students•Information about Mrs. McKinney’s location, workplace, and future plans

Facebook Security Features

Basics of Protecting a Facebook Account

• Think before you click• Only friend people you know• Authentication: i.e. login names and passwords

– 8 characters– Letters, characters, numbers– Don’t use one password for all of your logins– Change it regularly– Don’t share it with friends

• Be careful what you post, it is there forever and can be stolen.

The Facebook Motto

• Stop– Before you click on something

• Think – Where did the posting, message, or link come

from– Can it be trusted?– What might the consequences be?

• Connect

Data Encryption

• Process of scrambling a message between two users in such a way that eavesdroppers or hackers can’t read it.

• Consists of:– Message/Data– Key

• http://www.youtube.com/watch?v=8fFhG6Pp0Uw

Data Encryption (cont.)

Basic Encryption Example

Encrypted Message

j o p j z h f k k b v o l z h p

Encryption Keya b c d e f g h i j k l m n o p q r s t u v w x y zx y z a b c d e f g h i j k l m n o p q r s t u v w

Decrypted Message

M r s M c k i n n e y R o c k s

HTTPS

• Hypertext Transfer Protocol Secure

• Computers use a “code” to scramble messages so no one can read them and keeps your information safe.

• When you see “https” in your web address, that site is secure and data encrypted.

HTTPS (cont.)

Cell Phone Hacking

• Steal/Find your cell phone

• Install an app with a virus that

captures all your data.

• Connect to an unsecure WIFI where someone can capture and read everything that is sent across the web

A Hacker can…

• Listen to your phone calls• Read your text messages• Follow your internet browsing• Pinpoint your location• View your photos, videos, and contacts.• Ability access to your email account.• Log onto personal websites and view or change

all of your account info.• Transmit audio and video when your phone is off

Cell Phone Hacking Prevention• Treat your phone like you

would a computer

• Don’t install untrusted apps

• Use different passwords for different services

• Use the built in pass lock on your phone.–  Use something random and hard!

Questions

Thanks for your attention!!!

Recommended