technological awareness for teens and young adults n.
Download
Skip this Video
Download Presentation
Technological Awareness for Teens and Young Adults

Loading in 2 Seconds...

play fullscreen
1 / 20

Technological Awareness for Teens and Young Adults - PowerPoint PPT Presentation


  • 126 Views
  • Uploaded on

Technological Awareness for Teens and Young Adults. What is Social Networking?. Social Networking is a social structure made of individuals who are tied by specific types of relationships. Facebook Myspace Twitter Flickr Youtube. What Not to Share.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Technological Awareness for Teens and Young Adults' - marshall-monroe


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
what is social networking
What is Social Networking?
  • Social Networking is a social structure made of individuals who are tied by specific types of relationships.
    • Facebook
    • Myspace
    • Twitter
    • Flickr
    • Youtube
what not to share
What Not to Share
  • Anything you wouldn’t be comfortable having your family see
    • Inappropriate photos
    • Offensive comments or language
    • Personal Information
      • Birth Date
      • Home Address
      • Vacation Plans
      • Favorite Activities
      • Information that could be used to answer security questions
10 things not to do on social networking sites
10 things NOT to do on social networking sites
  • Post your full name
  • Post your date of birth
  • Post contact Information: phone, email or address
  • Post pictures you don’t want everyone to see
  • Assume any communication here is private
  • Post information about your school or work
  • Talk about places and times of where your going to be
  • Post information about new purchases
  • Add friends you don’t really know
  • DO enable privacy on your accounts
who does this apply to
Who Does this Apply to?
  • Everybody
    • Even if you don’t have a social networking account you can be impacted by what others post about you
  • Student Athletes are in the spotlight more then average students
    • Held to a higher standard
    • Upheld to a student athlete code of conduct
    • Some colleges have added restrictions to social networking in code of conduct contracts
    • Role models for other students
consequences of inappropriate use
Consequences of Inappropriate Use
  • College Admissions Decisions
    • 1 in 10 college admissions officers routinely check applicants social networking pages
      • 38% found information that reflected poorly on the students http://youngadults.about.com/od/legalissues/a/facebookcaveat.htm
  • Employment Decisions
    • 34% of hiring managers have chosen not to hire a candidate based on information in their social network profiles http://www.cnn.com/2008/LIVING/worklife/11/05/cb.social.networking/index.html
consequences of inappropriate use1
Consequences of Inappropriate Use
  • Suspension/Expulsion of athletic privileges
    • Two Nebraska wrestlers kicked off team over inappropriate photos http://www.nowpublic.com/sports/two-nebraska-wrestlers-kicked-team-over-nude-internet-photos
    • Michael Phelps suspended from competition for 3 months over photos depicting illegal drug usehttp://abcnews.go.com/Sports/wireStory?id=6816007
  • Legal Consequences
    • Pictures from Facebook were used to cite violators of university alcohol policy at North Carolina State University http://web.archive.org/web/20051031084848/http://www.wral.com/news/5204275/detail.html
    • Murder suspect Dwayne Stancill of Oakland California was identified through a gangs MySpace web pagehttp://mashable.com/2007/10/25/murder-suspect-caught-through-myspace/
  • Higher risk of being robbed
    • Recent new article states that burglars use Twitter, MySpace and other sites to case homes http://maribyrnong-leader.whereilive.com.au/news/story/burglars-use-facebook-twitter-to-target-empty-homes
inappropriate use of electronic communication
Inappropriate Use of Electronic Communication
  • Don’t assume text message and emails are private communication
    • Assume anything sent through these methods is permanent
    • Software can be installed on phones that alert a third party to content being sent and received on the phone including photos and text messageshttp://www.icarecoalition.org/parentalcontrols.asp
  • Most employers use software to monitor email and internet activity
  • Chris Brown Rihanna incident started over a text message from another woman http://www.mtv.com/news/articles/1625680/20091106/rihanna.jhtml
  • UNM recently published email strings from the Locksley scandalwww.kob.com
text messaging
Text Messaging
  • Sexting is sending nude pictures via text message
    • 20% of teenagers admit to engaging in sexting http://www.associatedcontent.com/article/1390743/sexting_teens_charged_with_child_pornography.html
      • Messages can be forwarded to unintended recipients
      • Could be embarrassing if pictures were seen by unintended parties
      • 6 Pennsylvania teenagers charged with child pornography as a result of sexting http://www.associatedcontent.com/article/1390743/sexting_teens_charged_with_child_pornography.html
online information protection
Online Information Protection
  • Transition from high school to adult lives involves greater use of online accounts
    • Financial Information
    • Registering for College
    • Job Applications
    • Shopping
password selection
Password Selection
  • Complex passwords are harder to crack
    • Include capital and lowercase letters
    • Include numbers
    • Include special characters
  • Change passwords regularly
  • Don’t share passwords with ANYONE
  • Use different passwords for different accounts
password strength
Password Strength
  • Most commonly used password: “password”
    • How long would it take to crack this 8 character password that only uses lower case letters?
      • Approximately 348 minutes http://www.lockdown.co.uk/?pg=combi
  • A better alternative: “P@ssw0rd”
    • How long would it take to crack this 8 character password that uses lower and upper case letters, numbers, and special symbols?
      • Approximately 23 years http://www.lockdown.co.uk/?pg=combi
hacker techniques
Hacker Techniques
  • Phishing
    • Emails asking you to verify account or personal information for security
      • Banks and financial institutions will never ask you to do this over the internet
    • Social networking messages
      • Is that really you in this video?
    • Text Messages
      • Your account has been compromised. Please call (999)999-9999
hacker techniques1
Hacker Techniques
  • Social Engineering
    • People can probe you for information that can lead to your security being compromised
      • Be careful what information you give out to whom
        • Mothers maiden name?
        • Where you were born?
        • What was your favorite pets name?
    • Retrieving information from social networking profiles
hacker techniques2
Hacker Techniques
  • Dictionary Attacks
    • Programs that check passwords against commonly used passwords
  • Spyware and Viruses
    • Programs that are installed on you computer without your knowledge
      • Monitor keystrokes
      • Track internet activity
      • Compromise, corrupt, or destroy data
computer and document protection
Computer and Document Protection
  • Threats to your computer
    • Theft
    • Hardware Failure
    • Data Corruption
    • Virus/Spyware
    • User Access Controls
how to protect your computer
How to Protect your Computer
  • Use and frequently update antivirus software
  • Install software updates when they become available
  • Only install reputable and licensed software
  • Check the source of emails before downloading attachments
  • Don’t follow links in emails. Instead use you internet browser to navigate to the site
  • http://www.mgt.unm.edu/technology/security.asp
how to protect your computer1
How to Protect your Computer
  • Avoid questionable websites
  • Require password protection when starting computer
  • Use Strong Passwords
  • Lock the screen or logout when you walk away from your computer
  • Don’t leave your computer unattended in public places
  • Back up important files on external media
  • http://www.mgt.unm.edu/technology/security.asp
best practices
Best Practices
  • Always use virus software on your PC
  • Don’t assume electronic communication is private
  • Use strong passwords and change them regularly
  • Don’t share your passwords
  • Use discretion on social networking sites
  • Be cautious when making purchases online
  • Only visit reputable websites
  • Back up important data in a second location
  • Don’t give out unnecessary personal information