180 likes | 356 Views
You, Me & Technology. Overview. Technology Our relationship with technology Threats What, Who, When, Where, Why & How Protection What we can do to protect our information. Our Relationship w/ Technology. Modern Technology
E N D
Overview • Technology • Our relationship with technology • Threats • What, Who, When, Where, Why & How • Protection • What we can do to protect our information
Our Relationship w/ Technology • Modern Technology A hyper-connected world—with texting, social networking, e-mail, online gaming, chat, music downloading, web surfing, and other forms of wired and wireless communication - Creates a dependency for society - Alienates and takes the “social” out of social interaction - Effects on communication skills
The Internet • In simplest terms, it is a large group of millions of computers around the world that are all connected to one another.
Internet In Numbers North America: 273,785,413 people use the internet Asia: 1,076,681,059 people use the internet
Threats: Who? • Sex Offenders • Stalkers • Hackers • Fraudsters • Terrorists
Threats: Why? • Personal Fulfillment • Financial Gain • Status • Fun / Thrill • Corporate Espionage • Malicious Intent
Threats: What? • Malware (Malicious Software) • Types: • Viruses : Infection in a computer that spreads from one to another through files. • Trojan Horses : Contains itself in programs or files that seem “harmless”. • Worms : Infection that spreads unaided. • Spyware : Intrudes your privacy without you knowing • Phishing : Using Emails or other forms to take personal data. • Spams : Emails about miracle products, making easy money, etc. It is all spams.
Threats: What? • Mobile Attacks • APPs • Network Connection • Public Networks • https:// • Text Threats • Others Threats
Threats: What? • Information Sharing • Personal Information in the wrong hands • What is personal information • Social Networks • Online Image • Search Engines • Your information is sold! • Habits • Audience
How: Social Networking • Nothing has changed the Web more than the rise of social networking sites. • "With social networks, we're able to visualize the connections between individuals… knowing the connections between individuals helps us better understand them, who they are connected to, and how they are connected to us.” • If Stutzman is right, understanding the way these networking sites work will help us understand ourselves and our friends.
Your Online Image • How do you portray yourself?? • Pictures, Profiles, Posts, Online image becomes part of your real life image. • What does your profile say about you?? • What about your email?? • Usernames - Beef_Kate, MustyElbows, Spoony, JerkyMyTurkey
Who Views Your Profile? • Profile Settings • Who views your profile? • Friends • Family • Future Employers • Teachers/Coaches • Neighbors • Stranger Danger (Potential Criminals)
Personal Information • What is personal information? • Name • Physical Address • Email Address • Phone • Bank Information • Social Security • Login Information • Anything that can be used to identify, contact or locate you.
Protecting Yourself • Protecting from Malware: http://www.youtube.com/watch?v=XU8PHihT_P4&feature=plcp • Stop and ask yourself • Weariness of social networks, online shopping, etc. • Passwords • Create Strong Passwords • Case sensitive, Numbers, Special Characters
MINI CHALLENGE!! Name one threat from using the internet.
MINI CHALLENGE!! Give an example of a bad password.
Games?? • Class teams, open the boxed “email”, bingo? Supplemental material • Max Butler http://www.youtube.com/watch?v=U0I6kAP76fY • Sharing info • http://www.youtube.com/watch?v=O5OsQsB7Hg4&feature=plcp • http://www.youtube.com/watch?v=m_JB9mA_O3c&feature=plcp • ID Theft • http://www.youtube.com/watch?v=lp_8cvNm_vE&feature=plcp