Are you safe enough on Social Media?

Preview:

Citation preview

ARE WE SECURE ENOUGH?

WHAT WE SHOULDN’T DO ON SOCIAL MEDIA

By -Piumi Niwanthika Herath

WHAT WE ARE GOING TO LOOK AT

▸ Define Social Media▸ Discuss what we do ethically

wrong in posting▸ A wider look into the security of

our social media accounts.

2

WHAT SOCIAL MEDIA EXACTLY IS...

Social media is the use of electronic and Internet tools for the purpose of sharing and discussing information and experiences with other human beings.

Eg: Facebook, twitter, Google+, LinkedIn, Reddit, Snapchat

-Wikipedia

3

4

https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/

WHERE WOULD WE GO WRONG?

● In your posts● In maintaining your

image● In managing your

privacy● In managing

security of your data

5

▸ Post everything about you, your relationships, interests on social media. TMI

▸ Let just anybody mention or tag you in the posts.

▸ Brag about your accomplishments, victories.

▸ Post any content which are offensive, politically or religiously biased.

▸ Post images or quotes with copyright issues.

▸ Believe everything on social media.

▸ Use offensive language when commenting on others posts.

These will ruin your IMAGE

6

SECURITY AND PRIVACYWhile non ethical social media usage ruin your reputation the unhandled security breaches may ruin your whole life and valuables.

7

600,000Facebook accounts are COMPROMISED every single day!

https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/ 8

▸ Like-jacking: occurs when criminals post fake Facebook “like” buttons to webpages. Users who click the button don’t “like” the page, but instead download malware.

▸ Link-jacking: this is a practice used to redirect a website’s links to another which hackers use to redirect users from trusted websites to malware infected websites that hide drive-by downloads or other types of infections.

▸ Phishing: the attempt to acquire sensitive information such as usernames, passwords, and credit card details by disguising itself as a trustworthy entity in a Facebook message or Tweet.

▸ Social spam: is unwanted spam content appearing on social networks and any website with user-generated content

9

▸ Never ignore the explained privacy policies and enabled customized privacy settings of Social Media

▸ To get rid of any annoying followers, friends we all are provided with options like MUTE, BLOCK or REPORT in almost every social network site.

▸ At any instance you find your account is hacked or you are being cheated and your reputation is at stake seek legal support immediately.

10

How to protect ourselves,

The Cyber Security

Acts

PARLIAMENT OF THE DEMOCRATIC SOCIALIST REPUBLIC OF SRI LANKA has taken legislative actions to the cyber crimes.

Computer Crime (Act, No.24 of 2007)Certified on 09th July 2007

11

CONCLUSIVELY,Social Media was a revolutionary idea with a very bright future with further scope for advancements. The opportunities provided from this media are immense.

Yet,

It has bad effects too. We have to take the responsibility of our safety and integrity. We need to be cautious in each and every second.

12

THANK YOU FOR YOUR VALUABLE TIME!

13

Recommended