1 / 18

You, Me & Technology

You, Me & Technology. Overview. Technology Our relationship with technology Threats What, Who, When, Where, Why & How Protection What we can do to protect our information. Our Relationship w/ Technology. Modern Technology

anahid
Télécharger la présentation

You, Me & Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. You, Me & Technology

  2. Overview • Technology • Our relationship with technology • Threats • What, Who, When, Where, Why & How • Protection • What we can do to protect our information

  3. Our Relationship w/ Technology • Modern Technology A hyper-connected world—with texting, social networking, e-mail, online gaming, chat, music downloading, web surfing, and other forms of wired and wireless communication - Creates a dependency for society - Alienates and takes the “social” out of social interaction - Effects on communication skills

  4. The Internet • In simplest terms, it is a large group of millions of computers around the world that are all connected to one another.

  5. Internet In Numbers North America: 273,785,413 people use the internet Asia: 1,076,681,059 people use the internet

  6. Threats: Who? • Sex Offenders • Stalkers • Hackers • Fraudsters • Terrorists

  7. Threats: Why? • Personal Fulfillment • Financial Gain • Status • Fun / Thrill • Corporate Espionage • Malicious Intent

  8. Threats: What? • Malware (Malicious Software) • Types: • Viruses : Infection in a computer that spreads from one to another through files. • Trojan Horses : Contains itself in programs or files that seem “harmless”. • Worms : Infection that spreads unaided. • Spyware : Intrudes your privacy without you knowing • Phishing : Using Emails or other forms to take personal data. • Spams : Emails about miracle products, making easy money, etc. It is all spams.

  9. Threats: What? • Mobile Attacks • APPs • Network Connection • Public Networks • https:// • Text Threats • Others Threats

  10. Threats: What? • Information Sharing • Personal Information in the wrong hands • What is personal information • Social Networks • Online Image • Search Engines • Your information is sold! • Habits • Audience

  11. How: Social Networking • Nothing has changed the Web more than the rise of social networking sites. • "With social networks, we're able to visualize the connections between individuals… knowing the connections between individuals helps us better understand them, who they are connected to, and how they are connected to us.” • If Stutzman is right, understanding the way these networking sites work will help us understand ourselves and our friends.

  12. Your Online Image • How do you portray yourself?? • Pictures, Profiles, Posts, Online image becomes part of your real life image. • What does your profile say about you?? • What about your email?? • Usernames - Beef_Kate, MustyElbows, Spoony, JerkyMyTurkey

  13. Who Views Your Profile? • Profile Settings • Who views your profile? • Friends • Family • Future Employers • Teachers/Coaches • Neighbors • Stranger Danger (Potential Criminals)

  14. Personal Information • What is personal information? • Name • Physical Address • Email Address • Phone • Bank Information • Social Security • Login Information • Anything that can be used to identify, contact or locate you.

  15. Protecting Yourself • Protecting from Malware: http://www.youtube.com/watch?v=XU8PHihT_P4&feature=plcp • Stop and ask yourself • Weariness of social networks, online shopping, etc. • Passwords • Create Strong Passwords • Case sensitive, Numbers, Special Characters

  16. MINI CHALLENGE!! Name one threat from using the internet.

  17. MINI CHALLENGE!! Give an example of a bad password.

  18. Games?? • Class teams, open the boxed “email”, bingo? Supplemental material • Max Butler http://www.youtube.com/watch?v=U0I6kAP76fY • Sharing info • http://www.youtube.com/watch?v=O5OsQsB7Hg4&feature=plcp • http://www.youtube.com/watch?v=m_JB9mA_O3c&feature=plcp • ID Theft • http://www.youtube.com/watch?v=lp_8cvNm_vE&feature=plcp

More Related