Responsable use of Social Media

Responsable use of Social Media
Responsable use of Social Media & Cybersecurity

EUMOSS 2023/2024
1 / 39
next
Slide 1: Slide
BeveiligingMBOStudiejaar 1,2

This lesson contains 39 slides, with interactive quizzes, text slides and 2 videos.

time-iconLesson duration is: 60 min

Items in this lesson

Responsable use of Social Media
Responsable use of Social Media & Cybersecurity

EUMOSS 2023/2024

Slide 1 - Slide

This item has no instructions

Subjects
  • Social media 
  • Cybersecurity
  • Cybercriminality
  • Social Enginering
  • Research and develop

Slide 2 - Slide

This item has no instructions

Social media

Slide 3 - Slide

This item has no instructions

timer
2:00
What comes in your mind concerning;
social media

Slide 4 - Mind map

This item has no instructions

Social Media 
  1. What is social media? 
  2. Which kind of social media do you use? 
  3. What is the main purpose of your use?
  4. How many hours do you spend (daily) on sociale media?
  5. What kind of effects does social media have an you?

Slide 5 - Slide

This item has no instructions

What are the risks of using social media?

Slide 6 - Mind map

This item has no instructions

Slide 7 - Video

This item has no instructions

Social media
Use and abuse of social media

Slide 8 - Slide

This item has no instructions

Social media has a positive impact on society.
Connects people and fosters relationships.
Empowers individuals to express themselves freely.
Provides a platform for social activism.
Enables businesses to reach wider audiences.

Slide 9 - Poll

This item has no instructions

Social media has a negative impact on society.
Causes addiction and leads to excessive screen time.
Facilitates cyberbullying and online harassment.
Contributes to the spread of fake news.
Erodes privacy and personal data security.

Slide 10 - Poll

This item has no instructions

Social media hinders authentic human connection.
Promotes shallow and superficial interactions.
Reduces face-to-face communication skills.
Creates a false sense of social validation.
Contributes to feelings of loneliness and isolation.

Slide 11 - Poll

This item has no instructions

Social media promotes meaningful communication.
Encourages open dialogue and diverse perspectives.
Facilitates sharing of ideas and knowledge.
Strengthens interpersonal relationships and friendships.
Provides a platform for international cultural exchange.

Slide 12 - Poll

This item has no instructions

Slide 13 - Video

This item has no instructions

Is cybersecurity a top priority for you?
Yes, it protects sensitive information.
Yes, cyber threats are increasing rapidly.
No, other issues are more urgent.
No, individuals should be responsible.

Slide 14 - Poll

This item has no instructions

Are individuals doing enough to protect themselves online?
Yes, they use strong passwords and encryption.
Yes, they are aware of potential risks.
No, many still have weak security practices.
No, they rely too much on technology.

Slide 15 - Poll

This item has no instructions

Should governments play a bigger role in cybersecurity?
Yes, they have resources and expertise.
Yes, cybersecurity is a national concern.
No, it hinders privacy and freedom.
No, private sector should handle it.

Slide 16 - Poll

This item has no instructions

CYBERCRIMINALITEIT
CYBERCRIMINALITY

Slide 17 - Slide

This item has no instructions

Definition
  • By cybercrime we mean all crime with an ICT resource aimed at another ICT resource.
  • An ICT resource is, for example, a telephone, a computer or a tablet.
  • ICT stands for Information Communication Technology 

Slide 18 - Slide

This item has no instructions

Social Engineering

Criminals can obtain information in different ways. For example through OSINT (Open Source Intelligence). Think of Google, Facebook, Media, etc.

Sometimes certain information is not easy to find and must be obtained from within. This is done through Social Engineering

Slide 19 - Slide

This item has no instructions

Social engineering involves tricking someone into doing or saying things that they would never do to a stranger or outsider under "normal" circumstances.


Normally, social engineering tactics are carried out by arousing curiosity and intimidation.

Slide 20 - Slide

This item has no instructions

Cybercrime
-
Cybercriminality
-
Computer criminality
"Crime committed with ICT. The criminal offense is committed with a computer, smartphone or tablet."

Slide 21 - Slide

This item has no instructions

Examples of cybercriminality
Phishing (neppe mail+app)

Exposing(foto's + filmpjes rondsturen zonder goedkeuring)

Grooming (digitaal kinderlokken, mensenhandel)


Slide 22 - Slide

This item has no instructions

Why is cybersecurity so important?
Cybersecurity is important because it helps protect data and systems from hackers, viruses and other forms of cybercrime.

Slide 23 - Slide

Benadruk het belang van cybersecurity en illustreer dit met voorbeelden van cyberaanvallen die in het nieuws zijn geweest.
What is online security/safety?
Online security refers to taking measures to protect yourself against cybercrime, such as viruses, malware, phishing and hackers.

Slide 24 - Slide

Definieer online veiligheid en geef voorbeelden van verschillende bedreigingen.
Assignment:
Creating Rules for Safe Use of Social Media

Slide 25 - Slide

This item has no instructions

Assignment Purpose:
The purpose of this assignment is to help security personnel understand how to use social media safely. We want to prevent problems and ensure that our organization doesn't get into trouble.

Slide 26 - Slide

This item has no instructions

Instructions:
1. What we want to achieve:

Think about why it's important to have rules for social media. We want to protect sensitive information, prevent people from saying bad things about our organization, and make sure we come across as professional.

Slide 27 - Slide

This item has no instructions

2. Look at your organization's rules:


Read the organization's rules about social media. Make sure the rules you create align with them.

Slide 28 - Slide

This item has no instructions

3. Think about possible issues:


Consider what could go wrong when security personnel use social media. They might accidentally share confidential information or say something wrong.

Slide 29 - Slide

This item has no instructions

4. Create simple rules:


Come up with straightforward rules that security personnel can follow. For example, tell them what they shouldn't share and how they should respond to questions about the organization.

Slide 30 - Slide

This item has no instructions

5. What to do if something goes wrong:


Explain what security personnel should do if there's a problem on social media, such as accidentally sharing confidential information.

Slide 31 - Slide

This item has no instructions

6. Who is responsible:


Specify who within the organization is responsible for monitoring whether security personnel follow the rules and taking action if they don't.

Slide 32 - Slide

This item has no instructions

7. Tell others:


Think about how to educate security personnel about these rules. Maybe training is needed to help them understand what they should do.

Slide 33 - Slide

This item has no instructions

8. Regularly check:


Ensure that the rules are reviewed periodically and adjusted as necessary.

Slide 34 - Slide

This item has no instructions

Assessment Criteria:
We will assess whether the rules are clear and whether they fit the organization. We'll also look at whether possible issues are well understood and whether there's consideration for training security personnel. It's important that the rules are easy to follow.

Slide 35 - Slide

This item has no instructions

What does AI stand for?
A
Advanced Integration
B
Artificial Intelligence
C
Automated Interaction
D
Alternative Interpretation

Slide 36 - Quiz

This item has no instructions

What is scamshop?
A
A fraudulent online store that deceives customers and steals their money.
B
A shop that sells discounted products.
C
A legitimate online marketplace.
D
A place where scams are organized.

Slide 37 - Quiz

This item has no instructions

What is digital awareness?
A
A term used in marketing strategies.
B
Knowledge and understanding of digital threats and safe online practices.
C
An awareness of digital devices.
D
Understanding different digital platforms.

Slide 38 - Quiz

This item has no instructions

Slide 39 - Slide

This item has no instructions