Who S Accessing Your Information?

Total Page:16

File Type:pdf, Size:1020Kb

Who S Accessing Your Information?

Who’s Accessing Your Information?

Brute Force

Brute force attempts to access accounts by continuously guessing passwords it pulls off of a list of potential words, phases, and other combinations of letter, numbers, and symbols

Passwords

 Length is better than complexity

 Use a mixture of upper case, lower case, numbers, and symbols

 Never share passwords with anyone

Spokeo

 Example of how easily accessible information is

 Request removal of personal info from Spokeo and similar sites

 Always use internet, social media in a professional manner, your “online tattoo” can never be removed

 Actions today can affect your future career

Social Media  Avoid the Infamous Tagging Mistake

Visit your profile privacy page and modify the setting next to “Photos Tagged of You”. Select the option which says “Customize…” and a box like the one pictured below will pop up. Select the option “Only Me” and then “None of My Networks” if you would like to keep all tagged photos private. If you’d like to make tagged photos visible to certain users you can choose to add them in the box under the “Some Friends” option. In the box that displays after you select “Some Friends” you can type either individual friends or friend lists.  Protect your Pics

Geotagging

 Geotagging adds geographical identification data to various media such as photos, videos, website, text messages and many others. This information usually consist of latitude and longitude coordinates, however they can also include altitude, bearing, distance, and place names

Threats

 Scams

Often times scams on sites such as Facebook or Twitter will lure you in by promising something, typically a video, to know who’s been looking at your profile, or even free airline tickets.

 Social Engineering

Using social skills to convince people to reveal valuable information

 Shoulder Surfing

 Phishing

Utilizing social engineering, phishing attempts to gain valuable information, ususally by posing as a legitimate company or agency

Education & Career

 Computer Science, MIS, IA, MOT  FBI, NSA

Recommended publications