320 likes | 482 Views
Outline of this module. By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and friends; Understand how social networking operates; Understand the different ways in which criminals target people on social networking sites;
E N D
Outline of this module • By the end of this module, you will be able to: • Identify the benefits of using social networking to communicate with family and friends; • Understand how social networking operates; • Understand the different ways in which criminals target people on social networking sites; • Know what level and type of information you should post online; • Know how to use security settings on your accounts and profiles;
Outline of this module • By the end of this module, you will be able to: • Understand how communicating online is different to communicating face to face; • Know simple strategies which can reduce the likelihood that you become a victim of social networking; and • Know what to do if you think you have been a victim on a social networking site.
Important information A copy of this presentation and the accompanying training booklet are available for download at: www.carindalepcyc.org.au 4
Getting started… • What do you currently know about social networking?
What is social networking? • It is all about connecting and communicating with people. • It isn’t just confined to the internet, however the internet has increased the ease and popularity of communication. • It operates through various websites where people can post profiles and initiate/receive contacts from other people.
Online communication • Talking to a person over the internet is different to talking to a person face to face • It is harder to establish trust (people can say anything without having to back it up). • Visual cues (such as facial expressions) are missing. • Not everything that appears on the internet is true! • There is no filter to edit material. • Anyone can post anything online.
An awareness of social networking • Social networking sites are a great way to communicate with people, but there are a few things which you need to be aware of: • Identity crime • Fraudulent emails • Malware • However, each of these can be overcome with a few simple steps.
Identity crime • One of the biggest threats on social networking sites, is the need to post excessive amounts and levels of information. • The internet isn’t as private as we might think, and our posts can be viewed by people other than our contacts. • Putting high levels of information on the internet and inadequate security settings can increase the risk of identity crime.
Fraudulent emails • These types of emails will appear in your inbox and can look genuine. • They might come from a social networking site and ask you for personal information. • They might ask you to reply to their email or they might provide a link to provide your personal details.
Malware • Short for “malicious software”, malware is designed to disrupt the normal running of your computer. • Malware comes in many forms, each with a different purpose. • Malware can be downloaded from an attachment or through visiting a compromised website. • You might not know your computer is infected.
How to protect yourself on social networking sites • There are several strategies which can help you protect yourself when using social networking sites. • By following these simple steps, you will greatly reduce the likelihood that you become a victim of a crime while communicating with people on social networking sites.
Protecting yourself while social networking • Limit what details you put on the internet • Carefully consider the amount and type of information that you make available to others. • Knowing and using security settings • Make sure that you have security setting activated on all your accounts and profiles. • Don’t rely on the default setting as this may not be as secure as you think it is.
Protecting yourself while social networking • Use a strong password • Try to use different passwords that contain at least 8 characters and a combination of letters, numbers and symbols. • Avoid clicking links in emails • Clicking on links in emails can take you to an infected website and allow malware to download on your computer.
Protecting yourself while social networking • Never reply to an email with personal details • Fraudulent emails will not always be obvious. • Talk to someone if you are unsure of an email. • Don’t feel pressured to respond. • Never send money in response to an email • The situation may seem genuine and you may trust the person, but once you have sent the money there is no way to get it back.
Online dating sites • These are legitimate ways to meet people. • However, criminals can use these sites to gain money from unsuspecting victims. • They seek to manipulate a person’s good will and their emotions and exploit the relationship. • This can have a devastating effect on victims. • Be extra cautious when using these sites.
If you think you are a fraud victim • There are steps you can take if you think that you may have become a victim of fraud on a social networking site. • Don’t panic or ignore it! • Contact the social networking site. • Most sites have a way to report someone to investigate having them removed or blocked. • Use the delete key. • Delete people from your contacts.
If you think you are a fraud victim • If you have sent money, there are a few things you can do: • Contact your bank and see if the transaction can be cancelled. • Contact the wire transfer service to see if the transaction can be cancelled. • Contact the police to report your loss. You are unlikely to get the money back, but it is important for you to report it.
Reporting Fraud • You can report fraudulent emails to the Australian Communications and Media Authority via email at: report@submit.spam.acma.gov.au • You should report financial losses to the police. 24
Conclusion • Social networking sites are a great way of communicating and connecting with family, friends and contacts all over the world. • By following the steps outlined in this presentation, you should be able to enjoy using these sites in a confident and safe manner.
Further information… For more information about other modules in this series go to: www.carindalepcyc.org.au For more information about online security issues, go to: www.scamwatch.gov.au www.cybersmart.gov.au For more information about computers and technology, go to: www.ascca.org.au 31