You are on page 1of 49

SECURITY ISSUES

RELATED TO SOCIAL
MEDIA
Module 6:2
Ethics in Technology
DIGITAL FOOTPRINT

Definition

A digital footprint is a trail of data you


create while using the Internet. It includes
the websites you visit, emails you send, and
information you submit to online services.

https://techterms.com/definition/
digital_footprint
DIGITAL FOOTPRINT

 A "passive digital footprint" is a data trail you


unintentionally leave online.

 For example, when you visit a website, the web


server may log your IP address, which identifies
your Internet service provider (ISP) and your
approximate location. While your IP address may
change and does not include any personal information,
it is still considered part of your digital footprint. A
more personal aspect of your passive digital footprint
is your search history, which is saved by some search
engines while you are logged in.

https://techterms.com/definition/digital_footprint
DIGITAL FOOTPRINT

 An "active digital footprint" includes data that you


intentionally submit online.

 Sending an email contributes to your active digital


footprint, since you expect the data be seen
and/or saved by another person. The more email
you send, the more your digital footprint grows.
Since most people save their email online, the
messages you send can easily remain online for
several years or more.

https://techterms.com/definition/digital_footprint
DIGITAL FOOTPRINT

 Publishing a blog and posting social media updates


are another popular ways to expand your digital
footprint. Every tweet you post on Twitter, every
status update you publish on Facebook, and every
photo you share on Instagram, contributes to your
digital footprint. The more you spend time
on social networking websites, the larger your
digital footprint will be. Even "liking" a page or a
Facebook post adds to your digital footprint, since
the data is saved on Facebook's servers.

https://techterms.com/definition/digital_footprint
DIGITAL FOOTPRINT

 Everyone who uses the Internet has a digital footprint, so


it is not something to be worried about. However, it is
wise to consider what trail of data you are leaving
behind. For example, remembering your digital footprint
may prevent you from sending a scathing email, since the
message might remain online forever. It may also lead
you to be more discerning in what you publish on social
media websites. While you can often delete content from
social media sites, once digital data has been shared
online, there is no guarantee you will ever be able to
remove it from the Internet.

https://techterms.com/definition/digital_footprint
DIGITAL FOOTPRINT
 So how can you manage your digital footprint? Here are a
few places to start:

 Protect your personal data: Don’t disclose your personal


address, phone number, passwords or bank card numbers.
Consider using a nickname instead of your real name.

 Keep login info under lock and key: Never share any of your
usernames or passwords with anyone.

 Think before you post: Once something is posted, it can be


difficult to remove. If you wouldn’t want a potential
employer seeing something, don’t post it!

http://www.rasmussen.edu/student-life/blogs/main/your-
digital-footprint/
DIGITAL FOOTPRINT
 So how can you manage your digital footprint? Here are a few
places to start:

 Nix the pics: Any photo you post publicly is fair game for anyone
to dig up. If you do choose to share questionable pictures, be
sure to set your privacy settings accordingly.

 Google yourself: It may sound narcissistic but if strangers are


going to do it, you should too! Search for your name every few
months so you’re cognizant of the information others have
access to.

 Scale back on social media: Don't be on more social networking


sites than you can handle. Keep the profiles you use frequently
and delete any accounts you don't update often.

http://www.rasmussen.edu/student-life/blogs/main/your-digital-
footprint/
DIGITAL FOOTPRINT
What are the benefits of having a digital footprint?
 Before you start having nightmares about the dangers of
digital footprints, it’s important to know there are
positive aspects as well. It’s a way for you to create a
personal brand for yourself. You’re now aware that
employers are following your trail, so take advantage of
it! There are many ways you can leverage your digital
skills to land a job.
 “The best thing to do is not to stay offline,” says Jessica
Koltz, Rasmussen College career services advisor. She
encourages you to participate in professional groups or
forums and network with others in your field. She says
creating a personal blog is another way to highlight your
strengths and personality online.

http://www.rasmussen.edu/student-life/blogs/main/your-
digital-footprint/
ABOUT USER PROFILES
 The system creates a user profile the first
time that a user logs on to a computer. At
subsequent logons, the system loads the
user's profile, and then other system
components configure the user's environment
according to the information in the profile.

https://msdn.microsoft.com/en-us/library/
windows/desktop/bb776892(v=vs.85).aspx
ABOUT USER PROFILES
User profiles provide the following advantages:
 When the user logs on to a computer, the system uses
the same settings that were in use when the user last
logged off.

 When sharing a computer with other users, each user


receives their customized desktop after logging on.

 Settings in the user profile are unique to each user.


The settings cannot be accessed by other users.
Changes made to one user's profile do not affect other
users or other users' profiles.

https://msdn.microsoft.com/en-us/library/windows/
desktop/bb776892(v=vs.85).aspx
ABOUT USER PROFILES
Security of Profiles
 Do not share your passwords or pin.

 Log off, do not remain logged on when you


are finished using a computer device.
Especially one used by a group of people.
PASSWORDS
 What Makes a Good Password
A good password is made up of a number of
different characteristics. For instance, it should be
at least 6 - 8 characters long and should include at
least two uppercase letters, lowercase letters and
numbers. As you mentioned, it shouldn't be
obvious. Definitely do not use your children's names
or pet's names. For that matter, it shouldn't even
be a real word person, place or thing. Use random
characters. The more random the sequence of
characters, the more secure the password will be.

http://www.practicallynetworked.com/sharing/
good_passwords.htm
PASSWORDS
 An example of a secure password would be
something like this: Hgs3@4j55nKX!sl

 This password is 15 characters long and


contains a combination of numbers, symbols,
upper and lowercase letters. Since it's long
and random, it will be far tougher for
someone to hack.

http://www.practicallynetworked.com/
sharing/good_passwords.htm
PASSWORDS
For workstations on a Windows network, Microsoft has
developed official password creation rules. These rules are as
follows:
 Passwords MUST be at least 6 characters long
 Passwords MAY NOT contain your username or any part of your
full name
 Passwords MUST contain characters from at least three of the
four class characteristics, which are listed below.

Classes Characteristics:
 English Upper Case
 English Lower Case
 Numerals
 Non-Alphanumeric (Punctuation marks and other symbols)

http://www.practicallynetworked.com/sharing/
good_passwords.htm
PASSWORDS
 Remember, having a secure password is
meaningless if you write it down and leave it
where anybody could find it. However, if you
have difficulty remembering a random
password, then you can use a common word like
"password," for example, but add three of the
four class characteristics to it to make it more
secure, such as "paSSw0rd." While not as secure
as a completely random password, it still meets
the outlined criteria, thus making it far more
efficient then your kid's name.

http://www.practicallynetworked.com/sharing/
good_passwords.htm
PASSWORDS
How Often Should You Change Your Password?

Security experts say passwords should be changed at


least once every three to six months, sometimes even
sooner. These days, everyone seems to have a huge
collection of passwords to contend with. Passwords for
work and online banking are just the start. Many
people have several email accounts to manage.
Twitter, Facebook and other social media sites must
also be kept secure. All things considered, password
management can turn into a big mess. However, not all
passwords are created equal.

https://itstillworks.com/should-change-password-
5559302.html
PASSWORDS
When Should You Change Your Password

 The three to six month password guideline may be fine


for low- to medium-security sites, but you may want to
change your password more often for high-security sites.
As a general rule, the more secure a site should be, the
more frequently the password should be changed. For
example, a social media site may be fine using the three
to six month guideline, but you may want to change the
password for your bank account once every month or so.
Any site you log on to from a public computer should be
subject to frequent password changes as well.

https://itstillworks.com/should-change-password-
5559302.html
PASSWORDS
Does It Really Help?

 A new school of thought, backed by university studies and


outspoken security experts, is gaining in popularity. This
group argues that an increased frequency of password
changes does not augment the security of a user account.
As a matter of fact, they believe that in some cases it can
actually have a detrimental impact. If users change their
passwords frequently, they are more prone to pick weak
passwords that are easily cracked. Also, having to
remember the constantly changing word or phrase prompts
many of them to write it down, thus increasing the chances
that others may see it as well.

https://itstillworks.com/should-change-password-
5559302.html
PASSWORDS
Password Best Practices

 Whatever the general consensus may be, it is a good idea to


change your passwords frequently if done correctly. Avoid
choosing weak passwords like your name, your phone
number or your child's date of birth. Strong passwords
contain a minimum of eight characters, a mixture of upper
and lower case characters and at least two numbers or
special characters. Never use one password for all your
sites, and if one of your user accounts has been
compromised, change the password immediately. Also, some
sites have alert mechanisms. They email or text you when
someone is trying to change your password to hijack your
account. Activate these alerts when possible.

https://itstillworks.com/should-change-password-
5559302.html
PASSWORDS
Password Management Software

 For those of you who find password management a


real chore, consider using a password manager.
These are software applications that automatically
fill in browser logon forms, warn you when your
password is stale and needs to be changed, and
generate secure passwords for you when needed.
The best thing about password managers is you
only have to remember one password; the master
password to access the manager itself.

https://itstillworks.com/should-change-password-
5559302.html
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad Thing

 We don’t often think about our current location as sensitive


information, but as you’ll see in this article, it can be very
sensitive data that you should consider protecting as much
as possible.
 Social media has put us all literally in the public eye. Every
time you post a picture or status update to Facebook, make
a tweet, check-in to a location, etc, you are sharing your
location with potentially a huge audience.
 Why is this a bad thing? Let’s take a look at several reasons
why sharing your current, future, or past location could be
dangerous.

https://www.lifewire.com/why-sharing-your-location-on-
social-media-is-a-bad-thing-2487165
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad
Thing

1. It Tells People Where You Are


 When you post a status update, picture, etc, you are
tagging your current location. This tells people where
you are right now. Depending on your privacy settings,
this information could potentially go out to millions of
strangers. Even if you only have this information set
to be shared with your “friends”, you can’t guarantee
that this information won’t find its way to non-friends
or total strangers.

https://www.lifewire.com/why-sharing-your-location-
on-social-media-is-a-bad-thing-2487165
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad Thing

2. It Tells People Where You Aren’t


 Not only does your status information tell somebody where you currently are, it

also tells them where you aren’t. This information can be just as dangerous in
the hands of criminals, here’s why:
 You are enjoying the first vacation you’ve had in years, you are thousands of

miles away in the Bahamas and you want to brag about a fancy umbrella drink
you just ordered, so you post a picture of it to Facebook, Instagram, or some
other site. Totally harmless, right? Wrong!
 If you are taking a picture and posting it on Facebook from thousands of miles

away, you have just told potentially millions of strangers that you are not at
home, which means that your home is potentially not occupied, and you’ve also
let strangers know that you are at least 10 to 12 hours from returning home.
 Now all they need to do is rent a moving van and take whatever they want from

your house. Check out our article on What Not to Post to Social Media While on
Vacation and also read about How Criminals Can Case Your House Using Google
Maps for details on how crooks know what gate is locked before they ever set
foot on your property.

https://www.lifewire.com/why-sharing-your-location-on-social-media-is-a-bad-
thing-2487165
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad Thing

3. It May Reveal Where Your Valuables Are Located


 When you take a picture with your Smartphone, you may not realize it, but you are
also likely recording the exact GPS location of whatever you happen to be taking a
picture of (geotag).
 How did this setting end up this way? The answer: When you first set up your phone,
you probably answered “yes” when your phone’s camera app asked you “would you
like to record the location of pictures you take? (via a pop-up box). Once this setting
was made, you never bothered to change it and ever since then, your phone has
been recording location information in the metadata of every picture you take.
 Why could this be a bad thing? For starters, it further narrows down your location.
While your status update gives your general location, your geotagged picture gives a
much more precise location. How could criminals use this information? Say you
posted a picture of something you’re selling on an online garage sale group on
Facebook or another website, criminals now know the precise location of the
valuable item you just posted by looking at the location data found in the metadata
of the picture file.
 The good news is that you can disable location services pretty easily. Here is how to
do it on your iPad, and how to do it on your iPhone or Android.

https://www.lifewire.com/why-sharing-your-location-on-social-media-is-a-bad-thing-
2487165
POSTING YOUR LOCATION
Why Sharing Your Location on Social Media is a Bad Thing

4. It May Reveal Information About Other People You Are


With:

 We’ve learned a little bit about location privacy and why


it’s important. You should also consider the safety of
people who are with you when you snap that geotagged
picture or when you tag them in a status update from a
joint vacation. Tagging them puts them with you and is
dangerous for the same reasons mentioned above.

https://www.lifewire.com/why-sharing-your-location-on-
social-media-is-a-bad-thing-2487165
IDENTITY THEFT
Identity theft is the act of a person obtaining
information illegally about someone else.
Thieves try to find such information as full
name, maiden name, address, date of birth,
social security number, passwords, phone
number, e-mail, and credit card numbers.
The thief can then use this information to
gain access to bank accounts, e-mail, cell
phones, identify themselves as you, or sells
your information.

https://www.computerhope.com/jargon/i/
identhef.htm
IDENTITY THEFT
Tips on preventing identity theft:

(1)When entering any personal information on the


Internet, make sure the connection is encrypted. A
connection encrypted with HTTPS is usually indicated
with a small lock icon in the address bar.

(2)When purchasing something over the Internet, unless


you plan on buying something from that same
company again, do not store your credit card or
personal information on that site.

https://www.computerhope.com/jargon/i/
identhef.htm
IDENTITY THEFT
Tips on preventing identity theft:

(3) Make sure to have an active and up-to-


date spyware protection program and antivirus
protection program.

(4) Be aware of fake e-mails and phishing e-mails that


claim to be a company, such as your bank, requesting
any personal information or login information.

(5) Make sure your computer is secure.

https://www.computerhope.com/jargon/i/identhef.htm
IDENTITY THEFT
Tips on preventing identity theft:

(6) If you're a victim of a stolen computer, read through the


steps on what to do if a computer or laptop was stolen or
lost.

(7) When entering answers to the secret question or forgot


password question, don't enter something that can be found
online. For example, a common security question is, "What
is your pet's name?" because a stranger might not know the
answer. However, if on your Facebook wall you're constantly
talking about your dog Fluffy, an attacker could use this
information to guess the answer and break into your
account.

https://www.computerhope.com/jargon/i/identhef.htm
SCAM
A scam is a term used to describe any
fraudulent business or scheme that takes
money or other goods from an unsuspecting
person. With the world becoming more
connected thanks to the Internet, online scams
have increased, and it's often up to you to help
stay cautious with people on the Internet.

https://www.computerhope.com/jargon/s/sca
m.htm
SCAM
Types of computer and Internet related scams:

There are thousands of types of scams today, but most boil


down to stealing money, property, or information.

(1) Phishing
Receive an e-mail from someone pretending to be your
bank indicating you are overdrawn or made a purchase you
really didn't make and asking you to log in and verify the
information. However, the link in the e-mail actually points
to a fake site that logs your username and password
information. See our phishing page for further information,
real examples, and related links.

https://www.computerhope.com/jargon/s/scam.htm
SCAM
Types of computer and Internet related scams:

(2) Auction Fraud


Someone selling something on an online auction
site such as E-bay or Craigslist that appears to be
something it really isn't. For example, someone
may claim to be selling tickets for an upcoming
concert that really are not official tickets.

https://www.computerhope.com/jargon/s/scam.
htm
SCAM
Types of computer and Internet related scams:

(3) Donation Scam


A person claiming they have or have a child or
someone they know with an illness and need
financial assistance. Although many of these claims
can be real there are also an alarming amount of
people who create fake accounts on donation sites
in the hope of scamming people out of money.

https://www.computerhope.com/jargon/s/scam.h
tm
SCAM
Types of computer and Internet related scams:

(4) Catfish
A person who creates a fake online profile with the
intention of deceiving someone. For example, a
woman could create a fake profile on an online
dating website, create a relationship with one or
more people and then create a fake scenario that
asks others for money. See the catfish definition for
further information and related links. See
our catfish page for further information.

https://www.computerhope.com/jargon/s/scam.htm
SCAM
Types of computer and Internet related scams:

(5) Cold-call Scam


Someone claiming to be from technical support from
a computer company like Dell claims they have
received information that your computer is infected
with a virus or has been hacked and offers to
remotely connect to your computer and fix the
problem. Additional information about this type of
scam is found on our does Dell call you document.

https://www.computerhope.com/jargon/s/scam.htm
SCAM
Types of computer and Internet related scams:

(6) 419
419 or the Nigeria scam gives the impression you
can gain a large amount of money and only requires
bank information to deposit the money into your
account. In reality, the bank information is used
against the person or the deposits are kept with no
reward. See the 419 page for additional
information.

https://www.computerhope.com/jargon/s/scam.htm
SCAM
Types of computer and Internet related scams:

(7) Chain mail


Usually harmless, this scam is usually spread
through e-mail and tells people to forward the e-
mail to all their friends to get money back from
someone such as Bill Gates. See the chain mail
definition for additional information and
examples.

https://www.computerhope.com/jargon/s/scam
.htm
SCAM
Types of computer and Internet related scams:

(8) Online Survey Scams


Online survey scams are survey sites that say
they offer money or gift vouchers to
participants. See our online survey
scam definition for further information.

https://www.computerhope.com/jargon/s/s
cam.htm
ONLINE SOCIALISING
 Online forums and social media sites are great
for keeping in touch with friends and family,
but be careful about what information you put
online and who you allow to see it.

 Tip: Don’t accept friend requests or invitations


from people you don’t know – you could be
making yourself and your friends more
vulnerable to scammers.

 https://www.staysmartonline.gov.au/protect-
yourself/doing-things-safely/socialising-online
ONLINE SOCIALISING
 Use social media safely.

 Unfortunately not everyone is as nice as they first appear


online and there are people who use social media to
embarrass, harass or attack others, and steal personal
information and identities.

 Certain types of scams are also more prevalent on social


media platforms – such as dating and romance scams and
fake online retailers. Learn more about scams online.

 Protect yourself when using social media.

https://www.staysmartonline.gov.au/protect-yourself/doing-
things-safely/socialising-online
ONLINE SOCIALISING
Following a few rules and learning about how your social media platform
handles and displays your information can help reduce risk when
socialising online.

 Take the time to read and understand the social network site’s terms
and conditions and privacy policy.

 Familiarise yourself with the site’s privacy and security settings –


make sure you’re only sharing your information with the people you
want to share it with.

 Protect your social media accounts with strong passwords.

 Don't use social networking sites that do not offer any privacy
settings or that allow users to contact each other anonymously.

https://www.staysmartonline.gov.au/protect-yourself/doing-things-
safely/socialising-online
ONLINE SOCIALISING
Following a few rules and learning about how your social media
platform handles and displays your information can help reduce
risk when socialising online.

 Think before you post. Once information is online it is almost


impossible to remove. If unsure, ask yourself – would I be ok if
this image or information was on the news or seen by my
employer? If not, perhaps think again.

 Use the same caution with clicking on advertisements and


online shopping on social media platforms that you do
elsewhere. Just because a post appears in your feed and has
been ‘suggested for you’ doesn’t mean the retailer is
legitimate. Learn how to shop safely online.

https://www.staysmartonline.gov.au/protect-yourself/doing-
things-safely/socialising-online
ONLINE SOCIALISING
Following a few rules and learning about how your social media platform
handles and displays your information can help reduce risk when
socialising online.

 Be particularly careful with information that could compromise the


security of you and others, including:
 dates of birth
 addresses
 information about your daily routine
 holiday plans
 your children's schools
 photos of you or your family and friends - and always seek permission
before posting a picture of someone else. Learn how to protect your
privacy and personal information online.
 This information can be used by criminals to steal your identity or
plan criminal activity – like robbing your home when you are away.

https://www.staysmartonline.gov.au/protect-yourself/doing-things-
safely/socialising-online
ONLINE SOCIALISING
 Important: Be especially careful what you say about others
online. Posting rude, offensive or derogatory comments
about another person or business can have legal
consequences.
 Also be aware that many companies check job applicant’s
online profiles. You might not want the photos and
information you share with your friends to be seen by a
prospective employer!
 Be wary of strangers – and don’t get scammed!
 Remember, people are not always who they say they are
online. If you are 'friends' with people you don’t know, be
especially careful about the amount of information you
reveal - and take care if you choose to meet them in person.

https://www.staysmartonline.gov.au/protect-yourself/doing-
things-safely/socialising-online
ONLINE SOCIALISING
 Protect yourself from dating and romance scams
 Dating scams are where a criminal pretends to have a
romantic interest in a victim in order to steal their money
or personal information. These scams are often
perpetrated via social media, but use the following
guidance to limit your risk of being scammed in this way.
 Check the profile of new friend requests, especially if you
have only met the person online. Look out for:
 new profiles with limited content
 hidden friend lists or friend lists full of people of the opposite
gender
 profiles that read like a dating profile
 grammar and spelling errors.

https://www.staysmartonline.gov.au/protect-yourself/doing-
things-safely/socialising-online
ONLINE SOCIALISING
 Don’t send money to someone you’ve never met in person.
 Be cautious when sharing personal pictures or videos,
especially if you’ve never met them before in person.
Scammers are known to blackmail their targets using
compromising material.
 Don’t share personal information with someone you have
never met in person.
 Do an image search of your admirer to see if they really
are who they say they are. Use image search services such
as Google or TinEye.
 For more information on dating and other scams online,
visit SCAMWatch.

https://www.staysmartonline.gov.au/protect-yourself/
doing-things-safely/socialising-online
ONLINE SOCIALISING
 Check the site's privacy policy
 Privacy policies govern how your personal information can be
used by the site – it is very important that you take the time to
read the website's privacy policy before you sign up.
 Some sites may share your information, such as email addresses
or user preferences, with third party businesses, that may send
you spam.
 Privacy policies change. In many cases by continuing to access
or use the services after those changes become effective, you
agree to be bound by the revised privacy policy.
 Tip: Regularly review privacy policies and check how much
information you reveal in your profile.

https://www.staysmartonline.gov.au/protect-
yourself/doing-things-safely/socialising-online
THE END

You might also like