Each day computer users give away a variety of personal information about themselves without even realizing it.
Often this happens when a person takes advantage of online services like search, social media, mobile applications, e-commerce and professional development.
For example, if a person bookmarks a visited page, adds an item to an e-commerce store “wish list”, or completes an “About Me” quiz on social media, a friend can share the information they provide or sold to interested or competitor business or on the dark web.
Additionally, with social media sites like Facebook, Twitter, or LinkedIn, created content like status updates, comments and uploaded photos and videos become a permanent part of those social media networks. Anyone can find them, read them, and use them for any purpose. The real question for the user is: “What does my digital footprint reveal about me?”
Users cannot control how others use information provided online but they can control their online behavior and therefore protect their electronic privacy.
This module teaches students the threats associated with social media use and ways to protect one’s self while still enjoying the site they visit. Topics include how personally identifiable information can be used to impersonate someone, how to read the security and privacy policy pages on a social media website, and how to adjust the privacy and security settings on a social media site to control who sees your posts.
Essentially, anyone that uses social media should be aware that identity thieves, scam artists, debt collectors, stalkers, employers and corporations use these services to gather information about you. Don’t post anything online that you would not mind seeing on the front page of a newspaper. Once done with a social media website, you should always log off.
Please find examples of more social media privacy attacks here.