Technological awareness for teens and young adults
1 / 20

Technological Awareness for Teens and Young Adults - PowerPoint PPT Presentation

  • Uploaded on

Technological Awareness for Teens and Young Adults. What is Social Networking?. Social Networking is a social structure made of individuals who are tied by specific types of relationships. Facebook Myspace Twitter Flickr Youtube. What Not to Share.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about ' Technological Awareness for Teens and Young Adults' - marshall-monroe

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

What is social networking
What is Social Networking?

  • Social Networking is a social structure made of individuals who are tied by specific types of relationships.

    • Facebook

    • Myspace

    • Twitter

    • Flickr

    • Youtube

What not to share
What Not to Share

  • Anything you wouldn’t be comfortable having your family see

    • Inappropriate photos

    • Offensive comments or language

    • Personal Information

      • Birth Date

      • Home Address

      • Vacation Plans

      • Favorite Activities

      • Information that could be used to answer security questions

10 things not to do on social networking sites
10 things NOT to do on social networking sites

  • Post your full name

  • Post your date of birth

  • Post contact Information: phone, email or address

  • Post pictures you don’t want everyone to see

  • Assume any communication here is private

  • Post information about your school or work

  • Talk about places and times of where your going to be

  • Post information about new purchases

  • Add friends you don’t really know

  • DO enable privacy on your accounts

Who does this apply to
Who Does this Apply to?

  • Everybody

    • Even if you don’t have a social networking account you can be impacted by what others post about you

  • Student Athletes are in the spotlight more then average students

    • Held to a higher standard

    • Upheld to a student athlete code of conduct

    • Some colleges have added restrictions to social networking in code of conduct contracts

    • Role models for other students

Consequences of inappropriate use
Consequences of Inappropriate Use

  • College Admissions Decisions

    • 1 in 10 college admissions officers routinely check applicants social networking pages

      • 38% found information that reflected poorly on the students

  • Employment Decisions

    • 34% of hiring managers have chosen not to hire a candidate based on information in their social network profiles

Consequences of inappropriate use1
Consequences of Inappropriate Use

  • Suspension/Expulsion of athletic privileges

    • Two Nebraska wrestlers kicked off team over inappropriate photos

    • Michael Phelps suspended from competition for 3 months over photos depicting illegal drug use

  • Legal Consequences

    • Pictures from Facebook were used to cite violators of university alcohol policy at North Carolina State University

    • Murder suspect Dwayne Stancill of Oakland California was identified through a gangs MySpace web page

  • Higher risk of being robbed

    • Recent new article states that burglars use Twitter, MySpace and other sites to case homes

Inappropriate use of electronic communication
Inappropriate Use of Electronic Communication

  • Don’t assume text message and emails are private communication

    • Assume anything sent through these methods is permanent

    • Software can be installed on phones that alert a third party to content being sent and received on the phone including photos and text messages

  • Most employers use software to monitor email and internet activity

  • Chris Brown Rihanna incident started over a text message from another woman

  • UNM recently published email strings from the Locksley

Text messaging
Text Messaging

  • Sexting is sending nude pictures via text message

    • 20% of teenagers admit to engaging in sexting

      • Messages can be forwarded to unintended recipients

      • Could be embarrassing if pictures were seen by unintended parties

      • 6 Pennsylvania teenagers charged with child pornography as a result of sexting

Online information protection
Online Information Protection

  • Transition from high school to adult lives involves greater use of online accounts

    • Financial Information

    • Registering for College

    • Job Applications

    • Shopping

Password selection
Password Selection

  • Complex passwords are harder to crack

    • Include capital and lowercase letters

    • Include numbers

    • Include special characters

  • Change passwords regularly

  • Don’t share passwords with ANYONE

  • Use different passwords for different accounts

Password strength
Password Strength

  • Most commonly used password: “password”

    • How long would it take to crack this 8 character password that only uses lower case letters?

      • Approximately 348 minutes

  • A better alternative: “[email protected]

    • How long would it take to crack this 8 character password that uses lower and upper case letters, numbers, and special symbols?

      • Approximately 23 years

Hacker techniques
Hacker Techniques

  • Phishing

    • Emails asking you to verify account or personal information for security

      • Banks and financial institutions will never ask you to do this over the internet

    • Social networking messages

      • Is that really you in this video?

    • Text Messages

      • Your account has been compromised. Please call (999)999-9999

Hacker techniques1
Hacker Techniques

  • Social Engineering

    • People can probe you for information that can lead to your security being compromised

      • Be careful what information you give out to whom

        • Mothers maiden name?

        • Where you were born?

        • What was your favorite pets name?

    • Retrieving information from social networking profiles

Hacker techniques2
Hacker Techniques

  • Dictionary Attacks

    • Programs that check passwords against commonly used passwords

  • Spyware and Viruses

    • Programs that are installed on you computer without your knowledge

      • Monitor keystrokes

      • Track internet activity

      • Compromise, corrupt, or destroy data

Computer and document protection
Computer and Document Protection

  • Threats to your computer

    • Theft

    • Hardware Failure

    • Data Corruption

    • Virus/Spyware

    • User Access Controls

How to protect your computer
How to Protect your Computer

  • Use and frequently update antivirus software

  • Install software updates when they become available

  • Only install reputable and licensed software

  • Check the source of emails before downloading attachments

  • Don’t follow links in emails. Instead use you internet browser to navigate to the site


How to protect your computer1
How to Protect your Computer

  • Avoid questionable websites

  • Require password protection when starting computer

  • Use Strong Passwords

  • Lock the screen or logout when you walk away from your computer

  • Don’t leave your computer unattended in public places

  • Back up important files on external media


Best practices
Best Practices

  • Always use virus software on your PC

  • Don’t assume electronic communication is private

  • Use strong passwords and change them regularly

  • Don’t share your passwords

  • Use discretion on social networking sites

  • Be cautious when making purchases online

  • Only visit reputable websites

  • Back up important data in a second location

  • Don’t give out unnecessary personal information