Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
182 views4 pages

Group 2

The social networking site collects both public and private user information. Publicly shared content like posts and photos can be accessed by search engines and other users. Private profile information is only visible to confirmed friends, unless users make parts of their profile public. The site uses collected data for security purposes, customizing user experience, and targeting ads. Users can download their data or delete their account to remove stored information from the site.

Uploaded by

Angelique Tubay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
182 views4 pages

Group 2

The social networking site collects both public and private user information. Publicly shared content like posts and photos can be accessed by search engines and other users. Private profile information is only visible to confirmed friends, unless users make parts of their profile public. The site uses collected data for security purposes, customizing user experience, and targeting ads. Users can download their data or delete their account to remove stored information from the site.

Uploaded by

Angelique Tubay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Type of information Risks

First name There is a risk in sharing your first name. Chances are, hacker
may already know plenty of stuff about you even if you only give
out your first name. Likewise, you cannot just walk in a room and
start introducing yourself to everyone. You do not know whom
you can come across with.

Last name If sharing your first name is a small risk, having both your first
and last is more risky. You will be vulnerable to being searched
for using search engines, which include image search. Matching a
name with a face is a modus to several cybercrimes like identity
theft.

Middle name Sharing your middle name alone is probably not the most risky of
these shared information, but sharing your full name would be.

Current and previous Most people who steal identities study their subject. They can use
school(s) this information for verification purposes.

Your cellphone number Your cellphone number should never be posted over the internet.
The internet is a public, place it is the same as posting your
number on a billboard. You would not want random strangers to
text or call you or worse, pretend that they are someone else.

The name of your siblings Diclosing this is a huge risk. Strangers may pretend or use their
identity to dope you

Your address Hopefully, you answered "no" to this one. Giving the internet your
number is one thing. Giving your address is a whole other level. It
would be easier for the criminals to find you

Your home phone number This shared information information is more risky than sharing
your personal phone number, scam usually use this information to
deceive you, one of which is when a strangers pretend to know
your parents or pretend to be you,

Your birthday Letting people know your birthday is probably must if you want
to get as many gift as possible. But having it to your profile makes
you more vulnerable to identity thief.
Internet Threats

Here are some of the threats you should be aware of when using the internet:

1. Malware- stands for malicious soft ware

A. Virus- a malicious program designed to replicate itself and transfer from one computer to
another either through the internet and local network or data storage like flash drives and CDs.

B. Worm- a malicious program that transfers from one computer to another by any type of
means. Often, it uses a computer network to spread itself. For example, the ILOVEYOU worm
(Love Bug Worm) created by filipino.

C. Trojan- a malicious program that is disguise as a useful program but once downloaded or
installed, leaves your PC unprotected and allows hackers to get your information.

*Rogue security software - tricks the user into posing that it is security software. It asks the
user to pay to improve his/her security but in reality they are not protected at all

D. Spyware - a program that runs in the background without you knowing it (thus called
"spy"). It has the ability to monitor what you are currently doing and by typing though key
logging.

*keyloggers - used the record the keystroke done by the user. This is done tonsteal their
password or any information you type using your keyboard.

E. Adware - a program designed to send ypu advertisers. Mostly pop ups

2. Spam - unwanted email mostly from bots or advertisers. It can be used to send malware

3. Phishing- its goal is to aquire sensitive personal information like password s and credit cards
details. This is done by sending you an email that wil direct the user to visit a website and be ask
to update his/her username , password,credit cards or personal information

*pharming - a more complicated way of phishing where it exploit the DNS (domain name
service) system.

The internet is defined as the information superhighway. This means that anyone has access
to this highway, can place information, and can grab that information. Any information, even
things that you have set privately, can be accessed one way or another. This is why social
networking sites like Facebook continue to improve their security features. The threat of
cybercrime is very real. While you may not experience the threat now, whatever information we
share today could affect our future.
Tips to Stay Safe Online

The internet is a public place and it is up to you to protect yourself. Here are some tips
to help you stay safe when using the internet.

1. Be mindful of what you share online and what site you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn how the website handles the
information you share.
4. Know the security features of the social networking site you use. By keeping your profile
private, search engines will not be able to scan your profile.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in “incognito (or private) mode”, a
feature of the browser, will not protect you from hackers.
7. Do not talk to strangers whether online or face-to-face.

8. Never post anything about future vacation .its is similar to posting, “Rob my house at
this date.”

9. Add friends you know in real life.

10. Avoid visiting untrusted websites.

11. Install and update an antivirus software on your computer. User only one anti-virus
software to avoid conflict.

12. If you have a Wi-Fi at home, make it a private network by adding a password.

13. Avoid downloading anything from untrusted websites,You are most likely not vulnerable
in peer to peer downloads (torrents) as the download is most likely not monitored by the site
owner.

14. Buy the software do not use pirated ones.

15. Do not reply or click links from suspicious emails.

Most people would dispute that there is no such thing as private over the internet and they may
be right.There are hackers who can find a backdoor even if your profile is already set to
private.You have no control of whoever is looking at your friend's screen whenever they open
your profile or chat with you.You have no control over people getting access to your friend's
account and seeing your private staff.

SKILL EXPLORATION

Exploration 2.1. Privacy Policies


Visit social networking site and look for the site's privacy policy.The link is typically found
at the bottom of the page and sometimes labeled only as "Privacy."Write a summary on how the
website handles both your private and public information

You might also like