41
Donald E. Hester 19-Mar-2010 For audio call Toll Free 1-888-886-3951 and use PIN/code 956172 Social Media (Web 2.0) and Privacy

Donald E. Hester 19-Mar-2010 For audio call Toll Free 1 - 888-886-3951 and use PIN/code 956172

Embed Size (px)

Citation preview

Donald E. Hester19-Mar-2010

For audio call Toll Free 1-888-886-3951

and use PIN/code 956172

Social Media (Web 2.0) and PrivacySocial Media (Web 2.0) and Privacy

• Maximize your CCC Confer window.• Phone audio will be in presenter-only mode.• Ask questions and make comments using the chat window.

HousekeepingHousekeeping

Adjusting AudioAdjusting Audio

1) If you’re listening on your computer, adjust your volume using the speaker slider.

2) If you’re listening over the phone, click on phone headset.

Do not listen on both computer and phone.

Saving Files & Open/close CaptionsSaving Files & Open/close Captions

1. Save chat window with floppy disc icon

2. Open/close captioning window with CC icon

Emoticons and PollingEmoticons and Polling

1) Raise hand and Emoticons

2) Polling options

Donald E. Hester

Social Media (Web 2.0) and PrivacySocial Media (Web 2.0) and Privacy

TypesTypes

Social Networking Blogs Vlogs Podcasts Internet forums Wikis Groups Product reviews Virtual reality Micro blogging Media sharing

Social Media

Social Shopping

Social Gaming

Social Networking

Social Media (Web 2.0)Social Media (Web 2.0)

Services are extremely popular and usefulAlmost a must today, (if you are not in, you

are out)People post too much information about

themselves or their kidsBe aware of your aggregate informationThe key is to be aware of what you are

sharing

TypesTypes

Social Networking Blogs Vlogs Podcasts Internet forums Wikis Groups Product reviews Virtual reality Micro blogging Media sharing

Everyone is getting in on itEveryone is getting in on it

BenefitsBenefits

New ways of reaching customers (students) New ways of researching Meet people (students) were they are Get the message out faster to more people Democratization of media Relationships and conversation Increase transparency in government and

organizations Community, sharing, and connecting

(Collaboration)

The BadThe Bad

Unqualified opinions Massive amounts of content Consistent delivery Information overload Work/Life balance Mob opinion Anonymity Online Bullies Cyber-stalkers

Security v. PrivacySecurity v. Privacy

But security issues and privacy issues are entirely two different beasts. A security issue occurs when a hacker gains unauthorized access to a

website or your computer.• Hacking

• Virus, worm or malicious software Privacy issues involve the unwarranted access of private information.

• Typically information you put there but did not intend for everyone to see it

• Information about you posted by someone else

Can someone use what you post against you?Can someone use what you post against you?

PrivacyPrivacy

Would you invite a stranger into your house to look at your children's photo album?

Public v. Private Aggregate information

sources could give someone more information than intended.

PrivacyPrivacy

Do you have control of what is posted? Not all fame is good! People use anonymity to post stuff about

others! Embarrassing , loss of credibility

PrivacyPrivacy

Do I have control of what is posted about me?

Look yourself up! All but one of

these is about me.

One of these I was completely unaware of.

Even if you are not on the web, you may be on the web!

Do what you can to control what is out there.

PrivacyPrivacy

PrivacyPrivacy

Can someone use what you post against you?

SecuritySecurity

Scams • Applications gather information about you

• You may set your self up to being charged Fraud

• Identity theft

SecuritySecurity

Settings in FaceBookSettings in FaceBook

Settings in FaceBookSettings in FaceBook

Settings in FaceBookSettings in FaceBook

Settings in FaceBookSettings in FaceBook

Settings in FaceBookSettings in FaceBook

Settings in FaceBookSettings in FaceBook

Settings in FaceBookSettings in FaceBook

Settings in TwitterSettings in Twitter

Browser SecurityBrowser Security

Browser SecurityBrowser Security

General RulesGeneral Rules Limit the personal information you post. Your real friends should already

know. Review privacy statements of sites and applications. Be wary of application that need access to your information or profile. Remember aggregate information. Keep your posts on information on a professional level Don’t instant message, email, post, blog, podcast, share, tweet, upload or

otherwise leave anything on the Internet you wouldn’t want to see on the front page of the local paper.

Protect you computer, keep it up-to-date, install Anti-virus Use complex passwords, don’t share your passwords

ReferencesReferences

http://www.LearnSecurity.org http://www.onguardonline.gov http://www.ftc.gov/bcp/edu/microsites/idt

heft/ http://www.microsoft.com/protect/default.

mspx

Donald E. HesterCISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+

Maze & Associates

@One / San Diego City College

www.LearnSecurity.org

http://www.linkedin.com/in/donaldehester

http://www.facebook.com/group.php?gid=245570977486

Q&AQ&A

Evaluation Survey LinkEvaluation Survey Link

Help us improve our seminars by filing out a short online evaluation survey at:

http://www.surveymonkey.com/s/10SpSocialMedia

For upcoming events and links to recently archived seminars, check the @ONE Web site at:

http://onefortraining.org/

Social Media (Web 2.0) and PrivacyThanks for attending

Social Media (Web 2.0) and PrivacyThanks for attending