Responsable use of Social Media

Responsable use of Social Media
Responsable use of Social Media & Cybersecurity

EUMOSS 2023/2024
1 / 39
suivant
Slide 1: Diapositive
BeveiligingMBOStudiejaar 1,2

Cette leçon contient 39 diapositives, avec quiz interactifs, diapositives de texte et 2 vidéos.

time-iconLa durée de la leçon est: 60 min

Éléments de cette leçon

Responsable use of Social Media
Responsable use of Social Media & Cybersecurity

EUMOSS 2023/2024

Slide 1 - Diapositive

Cet élément n'a pas d'instructions

Subjects
  • Social media 
  • Cybersecurity
  • Cybercriminality
  • Social Enginering
  • Research and develop

Slide 2 - Diapositive

Cet élément n'a pas d'instructions

Social media

Slide 3 - Diapositive

Cet élément n'a pas d'instructions

timer
2:00
What comes in your mind concerning;
social media

Slide 4 - Carte mentale

Cet élément n'a pas d'instructions

Social Media 
  1. What is social media? 
  2. Which kind of social media do you use? 
  3. What is the main purpose of your use?
  4. How many hours do you spend (daily) on sociale media?
  5. What kind of effects does social media have an you?

Slide 5 - Diapositive

Cet élément n'a pas d'instructions

What are the risks of using social media?

Slide 6 - Carte mentale

Cet élément n'a pas d'instructions

Slide 7 - Vidéo

Cet élément n'a pas d'instructions

Social media
Use and abuse of social media

Slide 8 - Diapositive

Cet élément n'a pas d'instructions

Social media has a positive impact on society.
Connects people and fosters relationships.
Empowers individuals to express themselves freely.
Provides a platform for social activism.
Enables businesses to reach wider audiences.

Slide 9 - Sondage

Cet élément n'a pas d'instructions

Social media has a negative impact on society.
Causes addiction and leads to excessive screen time.
Facilitates cyberbullying and online harassment.
Contributes to the spread of fake news.
Erodes privacy and personal data security.

Slide 10 - Sondage

Cet élément n'a pas d'instructions

Social media hinders authentic human connection.
Promotes shallow and superficial interactions.
Reduces face-to-face communication skills.
Creates a false sense of social validation.
Contributes to feelings of loneliness and isolation.

Slide 11 - Sondage

Cet élément n'a pas d'instructions

Social media promotes meaningful communication.
Encourages open dialogue and diverse perspectives.
Facilitates sharing of ideas and knowledge.
Strengthens interpersonal relationships and friendships.
Provides a platform for international cultural exchange.

Slide 12 - Sondage

Cet élément n'a pas d'instructions

Slide 13 - Vidéo

Cet élément n'a pas d'instructions

Is cybersecurity a top priority for you?
Yes, it protects sensitive information.
Yes, cyber threats are increasing rapidly.
No, other issues are more urgent.
No, individuals should be responsible.

Slide 14 - Sondage

Cet élément n'a pas d'instructions

Are individuals doing enough to protect themselves online?
Yes, they use strong passwords and encryption.
Yes, they are aware of potential risks.
No, many still have weak security practices.
No, they rely too much on technology.

Slide 15 - Sondage

Cet élément n'a pas d'instructions

Should governments play a bigger role in cybersecurity?
Yes, they have resources and expertise.
Yes, cybersecurity is a national concern.
No, it hinders privacy and freedom.
No, private sector should handle it.

Slide 16 - Sondage

Cet élément n'a pas d'instructions

CYBERCRIMINALITEIT
CYBERCRIMINALITY

Slide 17 - Diapositive

Cet élément n'a pas d'instructions

Definition
  • By cybercrime we mean all crime with an ICT resource aimed at another ICT resource.
  • An ICT resource is, for example, a telephone, a computer or a tablet.
  • ICT stands for Information Communication Technology 

Slide 18 - Diapositive

Cet élément n'a pas d'instructions

Social Engineering

Criminals can obtain information in different ways. For example through OSINT (Open Source Intelligence). Think of Google, Facebook, Media, etc.

Sometimes certain information is not easy to find and must be obtained from within. This is done through Social Engineering

Slide 19 - Diapositive

Cet élément n'a pas d'instructions

Social engineering involves tricking someone into doing or saying things that they would never do to a stranger or outsider under "normal" circumstances.


Normally, social engineering tactics are carried out by arousing curiosity and intimidation.

Slide 20 - Diapositive

Cet élément n'a pas d'instructions

Cybercrime
-
Cybercriminality
-
Computer criminality
"Crime committed with ICT. The criminal offense is committed with a computer, smartphone or tablet."

Slide 21 - Diapositive

Cet élément n'a pas d'instructions

Examples of cybercriminality
Phishing (neppe mail+app)

Exposing(foto's + filmpjes rondsturen zonder goedkeuring)

Grooming (digitaal kinderlokken, mensenhandel)


Slide 22 - Diapositive

Cet élément n'a pas d'instructions

Why is cybersecurity so important?
Cybersecurity is important because it helps protect data and systems from hackers, viruses and other forms of cybercrime.

Slide 23 - Diapositive

Benadruk het belang van cybersecurity en illustreer dit met voorbeelden van cyberaanvallen die in het nieuws zijn geweest.
What is online security/safety?
Online security refers to taking measures to protect yourself against cybercrime, such as viruses, malware, phishing and hackers.

Slide 24 - Diapositive

Definieer online veiligheid en geef voorbeelden van verschillende bedreigingen.
Assignment:
Creating Rules for Safe Use of Social Media

Slide 25 - Diapositive

Cet élément n'a pas d'instructions

Assignment Purpose:
The purpose of this assignment is to help security personnel understand how to use social media safely. We want to prevent problems and ensure that our organization doesn't get into trouble.

Slide 26 - Diapositive

Cet élément n'a pas d'instructions

Instructions:
1. What we want to achieve:

Think about why it's important to have rules for social media. We want to protect sensitive information, prevent people from saying bad things about our organization, and make sure we come across as professional.

Slide 27 - Diapositive

Cet élément n'a pas d'instructions

2. Look at your organization's rules:


Read the organization's rules about social media. Make sure the rules you create align with them.

Slide 28 - Diapositive

Cet élément n'a pas d'instructions

3. Think about possible issues:


Consider what could go wrong when security personnel use social media. They might accidentally share confidential information or say something wrong.

Slide 29 - Diapositive

Cet élément n'a pas d'instructions

4. Create simple rules:


Come up with straightforward rules that security personnel can follow. For example, tell them what they shouldn't share and how they should respond to questions about the organization.

Slide 30 - Diapositive

Cet élément n'a pas d'instructions

5. What to do if something goes wrong:


Explain what security personnel should do if there's a problem on social media, such as accidentally sharing confidential information.

Slide 31 - Diapositive

Cet élément n'a pas d'instructions

6. Who is responsible:


Specify who within the organization is responsible for monitoring whether security personnel follow the rules and taking action if they don't.

Slide 32 - Diapositive

Cet élément n'a pas d'instructions

7. Tell others:


Think about how to educate security personnel about these rules. Maybe training is needed to help them understand what they should do.

Slide 33 - Diapositive

Cet élément n'a pas d'instructions

8. Regularly check:


Ensure that the rules are reviewed periodically and adjusted as necessary.

Slide 34 - Diapositive

Cet élément n'a pas d'instructions

Assessment Criteria:
We will assess whether the rules are clear and whether they fit the organization. We'll also look at whether possible issues are well understood and whether there's consideration for training security personnel. It's important that the rules are easy to follow.

Slide 35 - Diapositive

Cet élément n'a pas d'instructions

What does AI stand for?
A
Advanced Integration
B
Artificial Intelligence
C
Automated Interaction
D
Alternative Interpretation

Slide 36 - Quiz

Cet élément n'a pas d'instructions

What is scamshop?
A
A fraudulent online store that deceives customers and steals their money.
B
A shop that sells discounted products.
C
A legitimate online marketplace.
D
A place where scams are organized.

Slide 37 - Quiz

Cet élément n'a pas d'instructions

What is digital awareness?
A
A term used in marketing strategies.
B
Knowledge and understanding of digital threats and safe online practices.
C
An awareness of digital devices.
D
Understanding different digital platforms.

Slide 38 - Quiz

Cet élément n'a pas d'instructions

Slide 39 - Diapositive

Cet élément n'a pas d'instructions