You are on page 1of 4

Karen Bybee, Jennifer Corbett, & Adam Vinson AIL 690 Internet Safety SEPARATE PERSONAL AND PROFESSIONAL

L CONNECTIONS Social networking sites If you are going to use Facebook, learn the privacy settings o http://www.thebostonchannel.com/r/24670937/detail.html

Choose Your Privacy Settings Connecting on Facebook o Who do you want to be able to find you? o How much information do you want people to see? Sharing on Facebook o Who do you want to be able to read your information? Read your friends information? Lock everything down to friends only. o You may want to turn off friends of friends views. o Places I check in to I customized to only me since Im not sure what this is for. o Customized settings Things I Share Things Others Share Photos and videos Im tagged in customize change to ONLY ME if you dont want your friends to see it My cousin thought it was funny to tag me OR you can custom select friends you want to see it. in this face framing. I dont celebrate Friends can check me into places - DISABLE Halloween, and was Contact Information horrified that my friends could see this! Applications and Websites o Apps for hugs, hearts, retro gifts, flair, and even surveys are outside the Facebook platform and take you outside the Facebook wall. Any of your information can then be accessed by that application and made available publicly on the Internet, regardless of your privacy settings. o Uncheck everything under Info accessible to friends o Game and application activity, set to friends only o Instant personalization DISABLE o Public search do you want your Facebook profile visible from any search engine? Block Lists o You can block specific people from finding you by Facebook name or email address Controlling How You Share o This is a tutorial on sharing information on what your options are for privacy concerns.

Page

Other issues: If you register multiple email address on your profile, Facebook can ghost another account with those other email addresses, access your friends, and send friend requests to everyone to link to the duplicated site. New features are added regularly and automatically checked everyone, so check the default settings on your privacy settings regularly to make sure everything is locked down to friends only. You cannot control being tagged in a photo. Anyone can tag you in a photo, whether its a picture of you or not, and anyone you are connected to can see it. (If there is a way to control this, I havent found it.) Change your password every 60 to 90 days to help prevent the possibility of your account being hacked. Professional Networks LinkedIn Account settings Profile settings Email notifications Home page settings RSS settings Groups Personal information Privacy settings o Connections browse do you want others to see your connections? o Profile views you can see who has looked at your profile, and others can see when you look at their profile. You can turn this off and be completely invisible to profiles you view. My network

Why do you want to be so cautious over social and professional networking sites? www.socialdiligence.com Go to this site and type in your name. See what comes up. This site can show what youre a fan of on Facebook. Pulls information from Linked In, Facebook, etc. Go to Google and in the search line, type in your name in quotation marks and see what you get. Then, at the end of the quotations marks, and + and your state, or +2010 and see what you get. You can type in an email address in Google and track a persons Internet activity. Go to Google Images and type in your name. See what comes up. A picture of my sister on Facebook and/or LinkedIn, which she had locked down to friends only, shows up on Google Images. Same goes for Yahoo. If you have your personal information stored on your Yahoo account, the Yahoo database can be search by your name.

Page

Cyber Sources Social lessons and internet use resources for kids, parents, teachers, and other professionals. www.Webwisekids.org Their tag line is Wisdom begins with you. This is an excellent site that uses interactive computer game-style simulations (based on real-life criminal cases) to tackle current issues like cell phone dangers, online romances, cyber stalking, online predators, and more. It is for children of all ages, parents, teachers, and professionals. Parts of it are free, others you have to purchase. http://www.fbi-sos.org/ - FBI SOS Safe online surfing Internet challenge. Its free and geared for 3rd 8th grade. Their mission is to promote cyber citizenship. http://kids.yahoo.com/ - Yahooligans, Google, & Facebook all have information about controlling how you share information. www.PBSKids.Org and http://pbskids.org/webonauts/- Heres a great game where kids make decisions about interacting safely. www.NetSmartz.org is an excellent free site for kids, parents, professionals, and teachers. It is sponsored by the National Center for Missing and Exploited Children. Its hands down the best site out there with more than enough resources for everyone. Includes videos, games, lesson plans, etc. www.netsmartzkids.org part of NetSmartz.org. www.wiredkids.org This is a large portal that consists of links to other specific sites. It has valuable information, but needs an update in graphics, flash, and interaction. Software resources for protecting your computer. McAfee www.mcafee.com Microsoft Defender http://www.microsoft.com/windows/products/winfamily/defender/default.mspx Bit Defender www.bitdefender.com Kaspersky http://usa.kaspersky.com Webroot www.webroot.com Norton www.norton.com Malwarebytes.org http://malwarebytes.org

Page

THE THREE CS OF INTERNET SAFETY: CYBERSECURITY, CYBERSAFETY, AND CYBERSOURCES Malware Malware is a general term used to describe Adware, Spyware, Viruses, Trojans, etc. An excellent malware removal program is Malwarebytes. This will often remove spyware and malware that other programs wont touch. Viruses, Worms, and Trojans A virus is an unwanted software program that may damage your computer. Worms reside in the active memory of the computer and duplicate themselves; they may send copies to others through email. A Trojan is a malicious program that pretends to be an application, but does unexpected things to the computer; it is different from a virus because it is non-replicating. Adware Adware is software that is downloaded without the users permission when they visit certain websites. Spyware Spyware is software that can collect your keystrokes, including your login ID, password, credit card numbers and bank account numbers if you enter those online. Spyware sometimes sends your personal information to someone else who may use it to steal your identity as well as your money or assets. Spyware might also search your computer for private information and send it to someone else. E-mail Issues Spam is junk/unwanted e-mail, usually sent in bulk. Phishing is an e-mail or a website that steals the name of a reputable company such as a bank or well-known online service to fool you into giving the thief your personal information. Symptoms of Infections Computer stops responding or locks up often Computer runs more slowly than normal Computer crashes and restarts every few minutes Applications do not work correctly Disks or disk drives are inaccessible How to Protect Your Computer Keep antivirus software updated. Keep your operating system updated. Be cautious about opening attachments. Do not respond to phishing e-mails. Be cautious about what you download from the Internet. Use a standard user account rather than an administrator account when surfing the Internet.

Page

You might also like