Technological Awareness for Teens and Young Adults - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Technological Awareness for Teens and Young Adults

Description:

... .icarecoalition.org/parentalcontrols.asp Most employers use software to monitor email and internet activity Chris Brown Rihanna incident started over a text ... – PowerPoint PPT presentation

Number of Views:129
Avg rating:3.0/5.0
Slides: 21
Provided by: iaUnmEdu
Category:

less

Transcript and Presenter's Notes

Title: Technological Awareness for Teens and Young Adults


1
Technological Awareness for Teens and Young Adults
2
What is Social Networking?
  • Social Networking is a social structure made of
    individuals who are tied by specific types of
    relationships.
  • Facebook
  • Myspace
  • Twitter
  • Flickr
  • Youtube

3
What Not to Share
  • Anything you wouldnt be comfortable having your
    family see
  • Inappropriate photos
  • Offensive comments or language
  • Personal Information
  • Birth Date
  • Home Address
  • Vacation Plans
  • Favorite Activities
  • Information that could be used to answer security
    questions

4
10 things NOT to do on social networking sites
  • Post your full name
  • Post your date of birth
  • Post contact Information phone, email or address
  • Post pictures you dont want everyone to see
  • Assume any communication here is private
  • Post information about your school or work
  • Talk about places and times of where your going
    to be
  • Post information about new purchases
  • Add friends you dont really know
  • DO enable privacy on your accounts

5
Who Does this Apply to?
  • Everybody
  • Even if you dont have a social networking
    account you can be impacted by what others post
    about you
  • Student Athletes are in the spotlight more then
    average students
  • Held to a higher standard
  • Upheld to a student athlete code of conduct
  • Some colleges have added restrictions to social
    networking in code of conduct contracts
  • Role models for other students

6
Consequences of Inappropriate Use
  • College Admissions Decisions
  • 1 in 10 college admissions officers routinely
    check applicants social networking pages
  • 38 found information that reflected poorly on
    the students http//youngadults.about.com/od/legal
    issues/a/facebookcaveat.htm
  • Employment Decisions
  • 34 of hiring managers have chosen not to hire a
    candidate based on information in their social
    network profiles http//www.cnn.com/2008/LIVING/wo
    rklife/11/05/cb.social.networking/index.html

7
Consequences of Inappropriate Use
  • Suspension/Expulsion of athletic privileges
  • Two Nebraska wrestlers kicked off team over
    inappropriate photos http//www.nowpublic.com/spor
    ts/two-nebraska-wrestlers-kicked-team-over-nude-in
    ternet-photos
  • Michael Phelps suspended from competition for 3
    months over photos depicting illegal drug use
    http//abcnews.go.com/Sports/wireStory?id6816007
  • Legal Consequences
  • Pictures from Facebook were used to cite
    violators of university alcohol policy at North
    Carolina State University http//web.archive.org/w
    eb/20051031084848/http//www.wral.com/news/5204275
    /detail.html
  • Murder suspect Dwayne Stancill of Oakland
    California was identified through a gangs MySpace
    web page http//mashable.com/2007/10/25/murder-sus
    pect-caught-through-myspace/
  • Higher risk of being robbed
  • Recent new article states that burglars use
    Twitter, MySpace and other sites to case homes
    http//maribyrnong-leader.whereilive.com.au/news/s
    tory/burglars-use-facebook-twitter-to-target-empty
    -homes

8
Inappropriate Use of Electronic Communication
  • Dont assume text message and emails are private
    communication
  • Assume anything sent through these methods is
    permanent
  • Software can be installed on phones that alert a
    third party to content being sent and received on
    the phone including photos and text messages
    http//www.icarecoalition.org/parentalcontrols.asp
  • Most employers use software to monitor email and
    internet activity
  • Chris Brown Rihanna incident started over a text
    message from another woman http//www.mtv.com/news
    /articles/1625680/20091106/rihanna.jhtml
  • UNM recently published email strings from the
    Locksley scandal www.kob.com

9
Text Messaging
  • Sexting is sending nude pictures via text message
  • 20 of teenagers admit to engaging in sexting
    http//www.associatedcontent.com/article/1390743/s
    exting_teens_charged_with_child_pornography.html
  • Messages can be forwarded to unintended
    recipients
  • Could be embarrassing if pictures were seen by
    unintended parties
  • 6 Pennsylvania teenagers charged with child
    pornography as a result of sexting
    http//www.associatedcontent.com/article/1390743/s
    exting_teens_charged_with_child_pornography.html

10
Online Information Protection
  • Transition from high school to adult lives
    involves greater use of online accounts
  • Financial Information
  • Registering for College
  • Job Applications
  • Shopping

11
Password Selection
  • Complex passwords are harder to crack
  • Include capital and lowercase letters
  • Include numbers
  • Include special characters
  • Change passwords regularly
  • Dont share passwords with ANYONE
  • Use different passwords for different accounts

12
Password Strength
  • Most commonly used password password
  • How long would it take to crack this 8 character
    password that only uses lower case letters?
  • Approximately 348 minutes http//www.lockdown.co.u
    k/?pgcombi
  • A better alternative P_at_ssw0rd
  • How long would it take to crack this 8 character
    password that uses lower and upper case letters,
    numbers, and special symbols?
  • Approximately 23 years http//www.lockdown.co.uk/?
    pgcombi

13
Hacker Techniques
  • Phishing
  • Emails asking you to verify account or personal
    information for security
  • Banks and financial institutions will never ask
    you to do this over the internet
  • Social networking messages
  • Is that really you in this video?
  • Text Messages
  • Your account has been compromised. Please call
    (999)999-9999

14
Hacker Techniques
  • Social Engineering
  • People can probe you for information that can
    lead to your security being compromised
  • Be careful what information you give out to whom
  • Mothers maiden name?
  • Where you were born?
  • What was your favorite pets name?
  • Retrieving information from social networking
    profiles

15
Hacker Techniques
  • Dictionary Attacks
  • Programs that check passwords against commonly
    used passwords
  • Spyware and Viruses
  • Programs that are installed on you computer
    without your knowledge
  • Monitor keystrokes
  • Track internet activity
  • Compromise, corrupt, or destroy data

16
Computer and Document Protection
  • Threats to your computer
  • Theft
  • Hardware Failure
  • Data Corruption
  • Virus/Spyware
  • User Access Controls

17
How to Protect your Computer
  • Use and frequently update antivirus software
  • Install software updates when they become
    available
  • Only install reputable and licensed software
  • Check the source of emails before downloading
    attachments
  • Dont follow links in emails. Instead use you
    internet browser to navigate to the site
  • http//www.mgt.unm.edu/technology/security.asp

18
How to Protect your Computer
  • Avoid questionable websites
  • Require password protection when starting
    computer
  • Use Strong Passwords
  • Lock the screen or logout when you walk away from
    your computer
  • Dont leave your computer unattended in public
    places
  • Back up important files on external media
  • http//www.mgt.unm.edu/technology/security.asp

19
Best Practices
  • Always use virus software on your PC
  • Dont assume electronic communication is private
  • Use strong passwords and change them regularly
  • Dont share your passwords
  • Use discretion on social networking sites
  • Be cautious when making purchases online
  • Only visit reputable websites
  • Back up important data in a second location
  • Dont give out unnecessary personal information

20
Questions?
Write a Comment
User Comments (0)
About PowerShow.com