<p> Who’s Accessing Your Information?</p><p>Brute Force</p><p>Brute force attempts to access accounts by continuously guessing passwords it pulls off of a list of potential words, phases, and other combinations of letter, numbers, and symbols</p><p>Passwords</p><p> Length is better than complexity</p><p> Use a mixture of upper case, lower case, numbers, and symbols</p><p> Never share passwords with anyone </p><p>Spokeo</p><p> Example of how easily accessible information is</p><p> Request removal of personal info from Spokeo and similar sites</p><p> Always use internet, social media in a professional manner, your “online tattoo” can never be removed</p><p> Actions today can affect your future career</p><p>Social Media Avoid the Infamous Tagging Mistake</p><p>Visit your profile privacy page and modify the setting next to “Photos Tagged of You”. Select the option which says “Customize…” and a box like the one pictured below will pop up. Select the option “Only Me” and then “None of My Networks” if you would like to keep all tagged photos private. If you’d like to make tagged photos visible to certain users you can choose to add them in the box under the “Some Friends” option. In the box that displays after you select “Some Friends” you can type either individual friends or friend lists. Protect your Pics</p><p>Geotagging</p><p> Geotagging adds geographical identification data to various media such as photos, videos, website, text messages and many others. This information usually consist of latitude and longitude coordinates, however they can also include altitude, bearing, distance, and place names</p><p>Threats</p><p> Scams</p><p>Often times scams on sites such as Facebook or Twitter will lure you in by promising something, typically a video, to know who’s been looking at your profile, or even free airline tickets.</p><p> Social Engineering</p><p>Using social skills to convince people to reveal valuable information</p><p> Shoulder Surfing</p><p> Phishing</p><p>Utilizing social engineering, phishing attempts to gain valuable information, ususally by posing as a legitimate company or agency</p><p>Education & Career</p><p> Computer Science, MIS, IA, MOT FBI, NSA</p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages5 Page
-
File Size-