internet and social media security. outline statistics facebook hacking and security data encryption...
TRANSCRIPT
Internet and Social Media Security
Outline
• Statistics
• Facebook Hacking and Security
• Data Encryption
• Cell Phone Hacking
Statistics
Statistics Cont.
Facebook Hacking Video
• http://www.youtube.com/watch?v=zBZrynmd7cU
Facebook Scammers
• Phishing: An attempt to obtain personal or financial information using fraudulent means, usually by posing as a legitimate website
• Results of phishing– Spyware: Technology that tracks your online
activity and collects information.– Viruses– Spam/Spamming your friends– Obtaining email login information etc.
Facebook Phishing Examples
Avoiding Facebook Scams
• Avoiding Facebook scams:– Having up to date web browser– Avoid suspicious wall postings and
messages.– If your logged into Facebook, don’t login again
if prompted.– Use Facebook Security Tools– Log out when your done.
Mrs. McKinney’s Facebook
Consequences•Access to the McKinney Family•Access to friended students•Information about Mrs. McKinney’s location, workplace, and future plans
Facebook Security Features
Basics of Protecting a Facebook Account
• Think before you click• Only friend people you know• Authentication: i.e. login names and passwords
– 8 characters– Letters, characters, numbers– Don’t use one password for all of your logins– Change it regularly– Don’t share it with friends
• Be careful what you post, it is there forever and can be stolen.
The Facebook Motto
• Stop– Before you click on something
• Think – Where did the posting, message, or link come
from– Can it be trusted?– What might the consequences be?
• Connect
Data Encryption
• Process of scrambling a message between two users in such a way that eavesdroppers or hackers can’t read it.
• Consists of:– Message/Data– Key
• http://www.youtube.com/watch?v=8fFhG6Pp0Uw
Data Encryption (cont.)
Basic Encryption Example
Encrypted Message
j o p j z h f k k b v o l z h p
Encryption Keya b c d e f g h i j k l m n o p q r s t u v w x y zx y z a b c d e f g h i j k l m n o p q r s t u v w
Decrypted Message
M r s M c k i n n e y R o c k s
HTTPS
• Hypertext Transfer Protocol Secure
• Computers use a “code” to scramble messages so no one can read them and keeps your information safe.
• When you see “https” in your web address, that site is secure and data encrypted.
HTTPS (cont.)
Cell Phone Hacking
• Steal/Find your cell phone
• Install an app with a virus that
captures all your data.
• Connect to an unsecure WIFI where someone can capture and read everything that is sent across the web
A Hacker can…
• Listen to your phone calls• Read your text messages• Follow your internet browsing• Pinpoint your location• View your photos, videos, and contacts.• Ability access to your email account.• Log onto personal websites and view or change
all of your account info.• Transmit audio and video when your phone is off
Cell Phone Hacking Prevention• Treat your phone like you
would a computer
• Don’t install untrusted apps
• Use different passwords for different services
• Use the built in pass lock on your phone.– Use something random and hard!
Questions
Thanks for your attention!!!