balancing identity and privacy on social networking sites
DESCRIPTION
with the rapid growth and remarkable adoptation rate of social networking sites such as facebook,linkedin,g+,twitter etc. we are now concerned with the growing risks.such as-loss of privacy,our pictures may be stolen,bullying,harmful contacts etc. dat implicitly give rise to the exposure of one's identity and privacy. our intent of exposing our identity and connecting publicly at times makes us ignorant of the fact that we are at the risk of breaching the privacy of our personally identifiable information.nevertheless,you can learn a few steps to feel more secure via this presentation.TRANSCRIPT
![Page 1: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/1.jpg)
“BALANCING IDENTITY AND PRIVACY
ON SOCIAL NETWORKING
SITES”
Presented by:- SAKSHI JAINCSE 3rd year
![Page 2: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/2.jpg)
INTRODUCTIONSocial networking sites have been rapidly adopted by children and, especially, teenagers and young people worldwide, enabling new opportunities for the presentation of the self, learning, construction of a wide circle of relationships
On the other hand, there are also concerns that social networking increases the likelihood of new risks to the self, these centering on loss of privacy, bullying, harmful contacts and more.
This presentation focuses on the importance of building safety considerations into the design and management of social networking sites, the imperative for greater attention to ‘at risk’ children in particular.
![Page 3: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/3.jpg)
WHAT DOES PEOPLE THINK ?
![Page 4: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/4.jpg)
4357
![Page 5: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/5.jpg)
![Page 6: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/6.jpg)
![Page 7: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/7.jpg)
Why should students care about their digital identity?As members of a campus community, it is important
for students to know that their online actions can have impact.
Social media posts can show up in search engine queries.
Companies are no longer just looking at your resume. They want to know what you are doing (and saying) online too.
![Page 8: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/8.jpg)
Students with a fluent grasp of social media can accelerate their learning, develop meaningful connections with peers, and grow their professional network.
What we do online can affect our face-to-face interactions…and vice versa.
![Page 9: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/9.jpg)
Why should higher education concern about
students’ digital identity?We’re all digital students in the sense
that we are constantly learning how to use the social tools while they are constantly evolving.
Schools need to be intentional about how they incorporate digital identity development into their educational constructs.
![Page 10: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/10.jpg)
Social media are not a trend or a fad that are going to someday evaporate.
We need to be proactive with teaching our students how to build their digital identity versus being reactive whenever they post something that we wish hadn’t made it onto the web.
![Page 11: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/11.jpg)
Six ways to protect your identity online…
![Page 12: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/12.jpg)
Use a password manager
Disable GPS and Wi-Fi on your mobile device until you need them
Read the access privileges for apps carefully, and make
good choices
Make yourself more difficult to
find on social media
Keep your work and personal
presences separate
Encrypt your connections
![Page 13: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/13.jpg)
![Page 14: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/14.jpg)
SECURE THE LINEVPNs serve as an encrypted tunnel that prevents bad guys from getting between you and the Internet in order to steal your login credentials or other sensitive information.
Over a VPN your ISP can see only your connection to the VPN.
You can use a free virtual private network client like OpenVPN to connect to a VPN service where you have an account, so you can browse the Web through an encrypted tunnel.
![Page 15: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/15.jpg)
VPN
ENCRYPTION/AUTHENTICATION IPsec
TUNNELING
![Page 16: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/16.jpg)
IMPLEMENTATION
IP header
• AUTHENTICATION
IP header
• ENCRYPTION
AH Data and TCP header
ESP header
ESP trailer
Data and TCP header
![Page 17: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/17.jpg)
IP header
Data and TCP header
IP header
TUNNELING
![Page 18: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/18.jpg)
![Page 19: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/19.jpg)
STOP LEAVING PRIVATE DATA IN THE CLOUD
For sensitive data that you need to sync across devices,use an encrypted cloud storage service. You can build one by encrypting data on your PC before sending it to Dropbox, using free software such as BoxCryptor .
Two popular encrypted storage services are SpiderOak and Wuala. Both services bill themselves as “zero-knowledge solutions”.
You have to be comfortable with the company and trust that the service it is doing what it claims is to keep your data secure.
![Page 20: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/20.jpg)
![Page 21: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/21.jpg)
When you use SpiderOak,the password you choose is factored into the encryption keys generated by the SpiderOak client.
It provides storage for upto 2GB.The only way for anyone, even a
SpiderOak employee, to access your file is by inputting your password by guessing it.
Password-building best practices dictate you should choose a phrase of at least ten characters.
Use SpiderOak's desktop client for maximum security.
![Page 22: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/22.jpg)
![Page 23: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/23.jpg)
Wuala claims to encrypt and decrypt your data on a mobile device similar to the way it handles the task on your PC.
Wuala provides storage for upto 5GB.when you share folders from Wuala
using a Web link, the encryption key gets included in the URL.
Anyone who receives the URL can view the contents of that folder,and the key has to be sent to Wuala’s servers for decryption,that’s one instance where using Wuala is less secure.
![Page 24: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/24.jpg)
![Page 25: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/25.jpg)
TWO-FACTOR AUTHENTICATION
Two-factor authentication requires you to enter a short numeric code in addition to your password to protect you from hacking and unauthorized account access.
The code usually comes from a smartphone application.
The best thing is that you can get most of your two-factor authentication codes from Google’s Authenticator app for Android and iOS.
Authenticator automatically works with accounts such as Dropbox, Evernote, Google, LastPass, and Microsoft.
![Page 26: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/26.jpg)
![Page 27: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/27.jpg)
![Page 28: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/28.jpg)
![Page 29: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/29.jpg)
![Page 30: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/30.jpg)
Using your browser’s incognito mode won’t keep you completely anonymous, either, but it will block websites from reading the cookies and history stored in your browser.
The downside of services like SpiderOak and Wuala is that there is no way of retrieving your password and can provide only a password hint that you entered during the signup process.
Two-factor authentication isn’t foolproof, but it does add a hurdle to help deter anyone who wants to get into your account.
POINTS TO NOTE
![Page 31: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/31.jpg)
CONCLUSION Every organization that produces social networks should implement strong measures during creation of such applications to be secure in their operation. They further need to implement unassailable access controls to prevent exposure of personally identifiable information.
On the other side, users should manage how much information they reveal about themselves and their peers.
What is required,is balancing between the identity and privacy.
So should you still blindly jump into the race of socializing or rather implement stringent solutions that balance both our identity and privacy to help mitigate the risks and concerns?
![Page 32: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/32.jpg)
REFERENCESwww.informationweek.in/informationweek/persp
ective/295864/social-networks-balancing-identity-privacy
www.eduniverse.org/digital-identity-social-media-privacy-balance-and-being-radical
Alessandro Acquisti , Ralph Gross, Imagined communities: awareness, information sharing, and privacy on the facebook, June 28-30, 2006, Cambridge, UK
Altman, I. The environment and social behavior---privacy, personal space, territory, crowding. Monterey, CA: Brooks/Cole Publishing Company, 1975.
Danah Boyd , Jeffrey Heer, Profiles as Conversation: Networked Identity Performance on Friendster, p.59.3, January 04-07, 2006
Behrouz A.Forouzan,Data Communications and Networking.ch-23,26
![Page 33: Balancing identity and privacy on social networking sites](https://reader035.vdocuments.net/reader035/viewer/2022081518/553a2b814a79596f718b4a23/html5/thumbnails/33.jpg)