Internet Safety
-
Upload
suresh-sood -
Category
Documents
-
view
784 -
download
0
description
Transcript of Internet Safety
Social Networks, Digital Breadcrumbs & Privacy
Geektoid Mangala
www.linkedin.com/in/sureshsood
twitter.com/soody
www.facebook.com/sureshsood
ssood
www.bravenewtalent.com/talent/suresh_sood
Hero5!
scuzzy55
soody
GreatMystery14
Agenda
0. Inappropriate Content and Contact 1. Online Social Networks 101, “FaceBook to Dogster” 2. TV 3.0 - The Future of Social Networks3. How should I organise my security settings?4. Where does Twitter Fit?5. Digital Breadcrumbs6. Steps to Avoid Social Engineering Attacks 7. The Australian Government Resources for Safety on the Internet8. Parents – What Should We Do?
5
Inappropriate Content
6
Linguistic Inquiry & Word Count : “junk words” in content http://www.liwc.net/liwcresearch07.php
Cognitive complexity = zexcl + ztentat + znegate + zdiscrep zinclDepression = zI + zphyscal + znegemo – zposemoLiar = – zself – zother – zexcl + znegemo or Honesty = zself + zother + zexcl - znegemo - zmotionFemale = zself – zsixltr +z other + znegate – zarticle – zpreps + zcertain + zsocial + zpresent – zspace – zoccup + zhome – zmoneyAging = zposemo – zI + zsixltr + zcogmech + zexcl + zfuture – zpast – ztimePresidential = zsixltr – zwps – zunique – zpronoun – zself – zyou – zother – znegate + zarticle + zprep
Slatcher, R.B., Chung, C.K., Pennebaker, J.W., & Stone, L.D. (2007), Winning words: Individual differences in linguistic style among U.S. presidential and vice presidential candidates, Journal of Research in Personality, 41, 63-75.
95
5
0.1
99.8
0.2
0.003
99
1
0
Lurking A Fact of Life Online
http://namechk.com/
Social Media
• Blog
– reflect, read, write and comment e.g. WordPress, LiveJournal,
• Microblogging
– brief notes, messages, comments e.g. Twitter, Tumblr
• Social Network– connect, communicate, and sharee.g. Facebook, Ning, MySpace, etc
• Generate content – upload content to share with others, comment or tag or reuse the
content e.g. YouTube, Vimeo, Flickr, Slideshare
Social Networking Sites
• Parse through friends activities forwards & reverse as well as own social gestures
• Allow users to:
– Create personal profiles inclusive of location information – Write status updates (postings to friends) c.f. blog entries– Friends specify updates they like – Post photographs, videos, and audio clips– Send and receive private messages – Link to the pages of friends
Share with friends.Boxee makes it easy for friends to share their favorite movies, TV Shows, and songs with each other, on Boxee or on social networks like Facebook and Twitter.
Livestation
All your channels in one placeSurf and email while you watchInstant, live chat with others watching LivestationDesktop alerts bring you breaking news and Livestation updates
TV 3.0
World Map of Social Networkswww.incos.it
Facebook is My Newspaper(Susie Wilkening, http://reachadvisors.typepad.com/
OneRiot.com: Search the realtime web
16 million people in the UK accessed Internet via mobile phones in December 2009. Total of 6.7 billion pages and 4.8 billion minutes online during the month. Top 10 sites accounted for 70 per cent of both total pages viewed and total time spent online
Australia Leads Average Time Spent per Person on Social Media Sites in December 2009
Facebook• Founded in 2004, primarily catering to students
• Over 400M active members worldwide with 2011 predictions for 1 billion users (Gartner)
• Facebook has communities,users,applications & albums
• Over 10 Billion photos in Oct 2008 and adds over 3Billion monthly
• Australian 8.1 M users in October2009 had uploaded 80 million pictures and written 32 million "wall posts" and 45 million "status updates". (Nielsen Online)
• Australians are spending 29% of all time browsing the internet on Facebook alone (Nielsen)
• Applications run on Facebook platform
• True names encouraged but not guaranteed
• Privacy model is highly granular
– present different information to different groups or individual users
• Messaging includes mail, real-time chat, "wall"
• Now used in private background checks
20
Inappropriate Contact with Strangers and Bullies
Public info: Name, Profile Picture, Current City, Gender, Networks,Friend List and Pages.
Facebook Tips - Privacy
• Friends Lists
• Facebook Search & Google
• Photo Tag Mishaps
• Relationship Changes
• Contact Info
• Wall Postings
• Market leader in "micro-blogging" • Began in mid-2006 as "status message" service• Ubiquity and ease of updating, but limited space • Breaking news, real-time updates: USAir, Iran • Most multimedia handled by 3d party links • Simplified privacy model: updates public or private • Most Twitter content is public • Private messages kept until user deletes them• Direct messages are private; sender can delete • Short URLs used to serve malicious links and code
Digital Breadcrumbs
Social Engineering Attacks
• Malicious software (malware) is installed into a computer fixed or mobile − to collect personal information over time.
• Computers or mobile devices are hacked for personal data.
• Phishing – criminals use deceptive e-mails to get users to divulge personal information, includes luring them to fake bank and credit-cards
websites.
“Pharming”: using deceptive e-mail messages to redirect users from an authentic website to a fraudulent one, which replicates the original in appearance.
– “SMiShing”: sending text messages (“SMS”) to cell phone users that trick them into going to a website operated by the thieves. Messages typically say that unless users go to the website and cancel, they will be charged for services they never actually ordered.
– “Spear-phishing”: impersonating a company employee/employer via e- mail in order to steal colleagues’ passwords/usernames and gain access the company’s computer system. ID thieves misuse victims’ personal info.
What to Do – Elements of Strategy
Caution!
“Children never put off till tomorrow what will keep them from going to bed tonight”
(Anonymous)