Transcript Slide 1
Technological Awareness for Teens and Young Adults What is Social Networking? • Social Networking is a social structure made of individuals who are tied by specific types of relationships. – Facebook – Myspace – Twitter – Flickr – Youtube What Not to Share • Anything you wouldn’t be comfortable having your family see – Inappropriate photos – Offensive comments or language – Personal Information • • • • • Birth Date Home Address Vacation Plans Favorite Activities Information that could be used to answer security questions Who Does this Apply to? • Everybody – Even if you don’t have a social networking account you can be impacted by what others post about you • Student Athletes are in the spotlight more then average students – Held to a higher standard – Role models for other students Consequences of Inappropriate Use • College Admissions Decisions – 1 in 10 college admissions officers routinely check applicants social networking pages • 38% found information that reflected poorly on the students • Employment Decisions – 34% of hiring managers have chosen not to hire a candidate based on information in their social network profiles Consequences of Inappropriate Use • Suspension/Expulsion of athletic privileges – Two Nebraska wrestlers kicked off team over inappropriate photos – Michael Phelps suspended from competition for 3 months over photos depicting illegal drug use • Legal Consequences – pictures from Facebook were used to cite violators of university alcohol policy at North Carolina State University Inappropriate Use of Electronic Communication • Don’t assume text message and emails are private communication – Anything sent through the methods is permanent – Software can be installed on phones that alert a third party to content being sent and received on the phone including photos and text messages Text Messaging • Sexting is send nude pictures via text message – 20% of teenagers admit to engaging in sexting • Messages can be forwarded to unintended recipients • 6 Pennsylvania teenagers charged with child pornography as a result of sexting Online Information Protection • Transition from high school to adult lives involves greater use of online accounts – Financial Information – Registering for College – Job Applications – Shopping Password Selection • Complex passwords are harder to guess – Include capital and lowercase letters – Include numbers – Include special characters • Change passwords regularly • Don’t share passwords with ANYONE • Used different passwords for different accounts Password Strength • Most commonly used password: “password” – How long would it take to guess this password that only uses lower case letters? • A better alternative: “P@ssw0rd” – How long would it take to guess this password that uses lower and upper case letters, numbers, and special symbols? Hacker Techniques • Phishing – Emails asking you to verify account or personal information • Banks and financial institutions will never ask you to do this over the internet • Social Engineering – People can probe you for information that can lead to your account being compromised – Retrieving information from social networking profiles Hacker Techniques • Dictionary Attacks – Programs that check passwords that are commonly used • Spyware and Viruses – Programs that be installed on you computer without your knowledge • Monitor keystrokes • Track internet activity Computer and Document Protection • Threats to your computer – Theft – Hardware Failure – Data Corruption – Virus/Spyware – User Access Controls How to Protect your Computer • Use and frequently update antivirus software • Install windows updates and software updates when they become available • Only install reputable and licensed software • Check the source of emails before downloading attachments • Avoid questionable websites How to Protect your Computer • Require password protection when starting computer • Use Strong Passwords • Lock the screen or logout when you walk away from your computer • Back up important files on external media Questions?