Transcript Slide 1

Technological Awareness for
Teens and Young Adults
What is Social Networking?
• Social Networking is a social structure
made of individuals who are tied by
specific types of relationships.
– Facebook
– Myspace
– Twitter
– Flickr
– Youtube
What Not to Share
• Anything you wouldn’t be comfortable
having your family see
– Inappropriate photos
– Offensive comments or language
– Personal Information
•
•
•
•
•
Birth Date
Home Address
Vacation Plans
Favorite Activities
Information that could be used to answer security questions
Who Does this Apply to?
• Everybody
– Even if you don’t have a social networking
account you can be impacted by what others
post about you
• Student Athletes are in the spotlight more
then average students
– Held to a higher standard
– Role models for other students
Consequences of Inappropriate Use
• College Admissions Decisions
– 1 in 10 college admissions officers routinely
check applicants social networking pages
• 38% found information that reflected poorly on the
students
• Employment Decisions
– 34% of hiring managers have chosen not to
hire a candidate based on information in their
social network profiles
Consequences of Inappropriate Use
• Suspension/Expulsion of athletic privileges
– Two Nebraska wrestlers kicked off team over
inappropriate photos
– Michael Phelps suspended from competition for
3 months over photos depicting illegal drug use
• Legal Consequences
– pictures from Facebook were used to cite
violators of university alcohol policy at North
Carolina State University
Inappropriate Use of Electronic
Communication
• Don’t assume text message and emails
are private communication
– Anything sent through the methods is
permanent
– Software can be installed on phones that alert
a third party to content being sent and
received on the phone including photos and
text messages
Text Messaging
• Sexting is send nude pictures via text
message
– 20% of teenagers admit to engaging in sexting
• Messages can be forwarded to unintended
recipients
• 6 Pennsylvania teenagers charged with child
pornography as a result of sexting
Online Information Protection
• Transition from high school to adult lives
involves greater use of online accounts
– Financial Information
– Registering for College
– Job Applications
– Shopping
Password Selection
• Complex passwords are harder to guess
– Include capital and lowercase letters
– Include numbers
– Include special characters
• Change passwords regularly
• Don’t share passwords with ANYONE
• Used different passwords for different
accounts
Password Strength
• Most commonly used password: “password”
– How long would it take to guess this password
that only uses lower case letters?
• A better alternative: “P@ssw0rd”
– How long would it take to guess this password
that uses lower and upper case letters,
numbers, and special symbols?
Hacker Techniques
• Phishing
– Emails asking you to verify account or personal
information
• Banks and financial institutions will never ask you to
do this over the internet
• Social Engineering
– People can probe you for information that can
lead to your account being compromised
– Retrieving information from social networking
profiles
Hacker Techniques
• Dictionary Attacks
– Programs that check passwords that are
commonly used
• Spyware and Viruses
– Programs that be installed on you computer
without your knowledge
• Monitor keystrokes
• Track internet activity
Computer and Document
Protection
• Threats to your computer
– Theft
– Hardware Failure
– Data Corruption
– Virus/Spyware
– User Access Controls
How to Protect your Computer
• Use and frequently update antivirus software
• Install windows updates and software
updates when they become available
• Only install reputable and licensed software
• Check the source of emails before
downloading attachments
• Avoid questionable websites
How to Protect your Computer
• Require password protection when starting
computer
• Use Strong Passwords
• Lock the screen or logout when you walk
away from your computer
• Back up important files on external media
Questions?