SlideShare a Scribd company logo
social networking &
 internet security
 i t    t      it
  by: w2fdb (Frank Brunke)
Social networking and internet security
What is a social net ork?
                 network?




   Evolution graph of a social network: Barabási model.
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
twitter
 t itter
user generated platform
@#
twitter
t itter
twitter
t itter
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Social networking and internet security
Linkedin - G t the most from Linkedin
           Get th     tf     Li k di

•   Make sure your profile is complete
•   List your current position, at least 2 previous
•   Add in education information
•   Edit Vanity URL (www.linkedin.com/in/frankdbrunke)
•   Use keywords
•   Leverage existing network
Internet Security
         Sec rit
Internet Security
         Sec rit




     I am the king of 160!
Internet Security
          Sec rit
Antivirus - (not set it and forget it )
                                   it.)
 Make sure it is up-to-date and running.

Put in the time, to secure yourself

  Play and iTunes applications are not 100%
  safe.
    f

  You are in charge of your security!
Thank you
        o
Questions?

147.300
147 300

cq@w2fdb.com

w2fdb.com for a link to this presentation.

More Related Content

PPTX
Internet safety
PPTX
Internet safety
PPT
Internet safety gerard and saul
PPTX
Internet security
PPTX
Building Your Brand Safely Using Social Media
PPTX
Digital Etiquette
PPTX
Digital safety
PPT
Information technology powerpoint
Internet safety
Internet safety
Internet safety gerard and saul
Internet security
Building Your Brand Safely Using Social Media
Digital Etiquette
Digital safety
Information technology powerpoint

What's hot (16)

PDF
7 Steps for Law Firms to Combat Cyber Threats
PPT
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
KEY
Pivotal tracker
PDF
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
PPTX
Internet Safety
DOCX
10 rules to be safe on internet
KEY
Internet Safety
PDF
Post-it notes: The banner that makes you like banners
PPTX
Jitsi meet
PPTX
Swap2010 twitter minining using semantic web technologies and linked data
PPTX
Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?
PDF
Fido U2F Security Key
PDF
Fido Security Key
PDF
We Don't Need No Stinking Badges
PPTX
How to See People Who Block You on Twitter
7 Steps for Law Firms to Combat Cyber Threats
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Pivotal tracker
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Internet Safety
10 rules to be safe on internet
Internet Safety
Post-it notes: The banner that makes you like banners
Jitsi meet
Swap2010 twitter minining using semantic web technologies and linked data
Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?
Fido U2F Security Key
Fido Security Key
We Don't Need No Stinking Badges
How to See People Who Block You on Twitter
Ad

Viewers also liked (19)

PPT
SQL212.3 Introduction to SQL using Oracle Module 3
PPTX
How to find new Music
PPT
Samantha Resume
PPT
Being Caught Stealing (Con La Mano En El Pastel)
PPS
Lips & Mouth
PPS
Nice Travel
PDF
SQL202 SQL Server SQL Manual
PPS
Cute Animals
PPT
Rockets
PPT
Lean Fables from Adland
PDF
ifilms Company Profile
PPT
Dahle Communication Group
PDF
From Neo to Trinity: The Matrix Reinvented
PDF
Social enter strategic planning
DOC
úLoha 11
PPS
X Ray Views
PPT
Allemand
SQL212.3 Introduction to SQL using Oracle Module 3
How to find new Music
Samantha Resume
Being Caught Stealing (Con La Mano En El Pastel)
Lips & Mouth
Nice Travel
SQL202 SQL Server SQL Manual
Cute Animals
Rockets
Lean Fables from Adland
ifilms Company Profile
Dahle Communication Group
From Neo to Trinity: The Matrix Reinvented
Social enter strategic planning
úLoha 11
X Ray Views
Allemand
Ad

Similar to Social networking and internet security (20)

PDF
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
PDF
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
PPT
FFLA 2012 pre conference 2012
PDF
Behind the Curtain: Exposing Advanced Threats
PPT
Danger on Your Desktop
PPTX
Pre-Quiz Symantec Endpoint Encryption
PDF
Weaponizing data science for social engineering: automate E2E spear phishing ...
PPTX
Cyber security-awareness-training security-.pptx
PDF
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
PPTX
cyber security
PPTX
Basic Security Training for End Users
PPTX
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
PDF
cyber safety.pdf
PPTX
MINI PROJECT 2023 deepfake detection.pptx
PPTX
IT Security for Small Business
PDF
GFI Network Security and PCI Compliance Power Tools 1st Edition Brien Posey
PDF
A Simple Introduction To Python Stephen Lynch
PDF
CyberSecThreats_R_U_atRisk_Watson
PDF
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
DEFCON 23 - jeremy dorrough - usb attack to decrypt wifi communicationsn
FFLA 2012 pre conference 2012
Behind the Curtain: Exposing Advanced Threats
Danger on Your Desktop
Pre-Quiz Symantec Endpoint Encryption
Weaponizing data science for social engineering: automate E2E spear phishing ...
Cyber security-awareness-training security-.pptx
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
cyber security
Basic Security Training for End Users
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
cyber safety.pdf
MINI PROJECT 2023 deepfake detection.pptx
IT Security for Small Business
GFI Network Security and PCI Compliance Power Tools 1st Edition Brien Posey
A Simple Introduction To Python Stephen Lynch
CyberSecThreats_R_U_atRisk_Watson
Innovation Showcase: Hugo Fiennes, CEO/Co-Founder, Electric Imp

Social networking and internet security

  • 1. social networking & internet security i t t it by: w2fdb (Frank Brunke)
  • 3. What is a social net ork? network? Evolution graph of a social network: Barabási model.
  • 26. twitter t itter user generated platform @#
  • 35. Linkedin - G t the most from Linkedin Get th tf Li k di • Make sure your profile is complete • List your current position, at least 2 previous • Add in education information • Edit Vanity URL (www.linkedin.com/in/frankdbrunke) • Use keywords • Leverage existing network
  • 36. Internet Security Sec rit
  • 37. Internet Security Sec rit I am the king of 160!
  • 38. Internet Security Sec rit Antivirus - (not set it and forget it ) it.) Make sure it is up-to-date and running. Put in the time, to secure yourself Play and iTunes applications are not 100% safe. f You are in charge of your security!
  • 39. Thank you o Questions? 147.300 147 300 cq@w2fdb.com w2fdb.com for a link to this presentation.