TAILIEUCHUNG - Lecture Professional Practices in IT: Lecture 16 - Saqib Iqbal

After studying this chapter you will be able to understand: Modes of hacker attack, spoofing, IP spoofing – flying-blind attack, IP spoofing – source routing, email spoofing, web spoofing, web spoofing – tracking state, session hijacking, session hijacking, denial of service (DOS) attack,. | Lecture 16 Secure Social Networking Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children What is Social Networking? Wikipedia A social network service focuses on building online communities of people who share interests and/or activities, or who are interested in exploring the interests and activities of others. National Cyber Alert System “Social networking sites build on the concept of traditional social networks where you are connected to new people through the people you already know.” “Friend of a Friend” More definitions Web – technology that “allows users to interact with others and to change website content, in contrast to non-interactive websites that are limited to passive viewing of information.” (Wikipedia) Examples: social networking sites, video sharing sites, blogs, etc. Facebook & MySpace – free-access social networking websites Twitter – “micro” blog – 140 characters or less Blog – shared on-line journal Video Sharing Sites – YouTube, Flikr Podcast – audio broadcast that can be downloaded Facebook has over 300 million users. The Good, the bad and the Ugly The Good Networking Communicating Reconnecting with old friends Keeping up with family Business marketing and promotion ., Facebook, Twitter Entertaining and fun Virginia Tech example After shooting rampage in 2007, campus in lockdown mode, phone lines jammed, website overloaded – students, faculty, staff used “ MySpace and Facebook to get in touch with family and friends outside traditional channels.” Also used to “ send condolences, share memories and gain closure.” *SC Magazine, article “Social Anxiety”, page 21, August 2009. The Bad and the ugly Personal information could get in the wrong hands. Phishing scams, viruses and spyware may spread through social networks. Once you’ve posted something, others can copy it or it may exist in cache, so that even if you delete it, it may still exist and is out of your control.

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.