Which of the following are security measures you should follow when using social media sites quizlet?

Recommended textbook solutions

Which of the following are security measures you should follow when using social media sites quizlet?

American Government

1st EditionGlen Krutz

412 solutions

Which of the following are security measures you should follow when using social media sites quizlet?

American Corrections

11th EditionMichael D. Reisig, Todd R. Clear

160 solutions

Which of the following are security measures you should follow when using social media sites quizlet?

Government in America: Elections and Updates Edition

16th EditionGeorge C. Edwards III, Martin P. Wattenberg, Robert L. Lineberry

269 solutions

Which of the following are security measures you should follow when using social media sites quizlet?

Criminal Justice in America

9th EditionChristina Dejong, Christopher E. Smith, George F Cole

105 solutions

Recommended textbook solutions

Which of the following are security measures you should follow when using social media sites quizlet?

The Language of Composition: Reading, Writing, Rhetoric

2nd EditionLawrence Scanlon, Renee H. Shea, Robin Dissin Aufses

661 solutions

Which of the following are security measures you should follow when using social media sites quizlet?

Technical Writing for Success

3rd EditionDarlene Smith-Worthington, Sue Jefferson

468 solutions

Which of the following are security measures you should follow when using social media sites quizlet?

Technical Writing for Success

3rd EditionDarlene Smith-Worthington, Sue Jefferson

468 solutions

Which of the following are security measures you should follow when using social media sites quizlet?

Technical Writing for Success

3rd EditionDarlene Smith-Worthington, Sue Jefferson

468 solutions

Social media is best understood as a group of online media, which share most or all of the following characteristics:

•Participation - Social media encourages contributions and feedback from everyone who is interested. It blurs the line between media and audience.
•Openness - Most social media services are open to feedback and participation. Voting, comments, and sharing are encouraged with few barriers to accessing or making use of content.
•Conversation - Whereas traditional media is about broadcasts, social media is better seen as a two-way dialogue.
•Community - Social media allows communities to form quickly and communicate effectively; these communities share common interests, such as a love of photography, an environmental issue, or a favorite TV show.
•Connectedness - Social media thrives on their connectedness, making use of links to other sites, resources, and people.

Operations security (OPSEC) measures are those measures taken to deny critical information about friendly forces to our adversaries. Critical information includes specific facts about friendly intentions, capabilities, and activities needed by adversaries to plan and act effectively against friendly mission accomplishment.

All Marines are responsible for protecting critical information by practicing security at the source.
Security Measures:
•Never violate OPSEC by posting critical information that includes but is not limited to: tactics, troop movements, unit location, force size, force protection measures, specific numbers of equipment, and weapon system details.
•Turn off the global positioning system (GPS) function of your digital devices when deployed since photos and location-based social media applications can reveal your geographical location. Also, check photos you intend to post for location indicators in the background or reflective surfaces.
•While deployed, don't report your specific location on social media since failure to do so could result in mission failure, harm to you or other Marines.
•Don't share information that is not approved for public release. This includes memos, meeting notes, e-mails, message traffic, personnel lists, phone numbers, e-mail addresses, etc.
•Ensure family members understand the importance of protecting operations security when posting to social media sites

Marines must be aware that criminals use the Internet to gain information for unethical reasons such as identity theft. By piecing together information provided on different websites, criminals can use information to, among other things, impersonate Marines and steal passwords.

You should be extremely careful when disclosing personal details on the Internet.

Security Measures:
•Set the privacy settings on social media accounts to limit who will have access to your personal information.
•Don't post personally identifiable information (PII) such as social security number, home address, birthday, birth place, driver's license number, etc.
•Don't post sensitive, family-related information within your profile.
•Don't post information that would infringe upon the privacy of others.
•Keep your plans, schedules, and location information to yourself.
•Tell friends to be careful when posting photos and information about you and your family.

he following references provide additional guidelines and information regarding making unofficial posts on social media, security measures to follow, and what types of political activities are okay and which are prohibited. The references are also listed in the Lesson Resources tab on the menu.
•DoD 5500.07-R, Joint Ethics Regulation
•DoDD 1344.10, Political Activities by Members of the Armed Forces
•DoDI 1325.06, Handling Dissident and Protest Activities Among Members of the Armed Forces
•SECNAVINST 5211.5E, Department of the Navy Privacy Program
•MCO 3070.2A, Marine Corps Operations Security (OPSEC) Program
•MCO 5230.18, Clearance of DoD Information for Public Release
•MCO 5239.2A, Marine Corps Cybersecurity Program (MCCSP)
•MCO 5720.77, Marine Corps Public Affairs (PA) Order
•MARADMIN 181/10, Responsible and Effective Use of Internet-Based Capabilities
•MARADMIN 365/10, Social Media Guidance - Unofficial Internet Posts
•"The Social Corps: The U.S.M.C. Social Media Principles"
•"Social Media Guidance for Unofficial Internet Posts"

Which of the following are security measures you should follow when using social media site?

Safety Tips for Social Networking.
Manage your privacy settings. ... .
Remember: once posted, always posted. ... .
Build a positive online reputation. ... .
Keep personal info personal. ... .
Protect your computer. ... .
Know what action to take. ... .
Use strong passwords. ... .
Be cautious on social networking sites..

When posting on social media which of the following is a guideline for political activities by members of the armed forces?

Guidance on Political Activity and DOD Support You must adhere to the policy in Department of Defense Directive 1344.10 when posting any political content, which includes: Cannot participate in any interview or discussion as an advocate for or against a party, candidate or cause.

Which of the following are basic forms of social media?

Social networking is possibly the most traditional form of social media. Platforms like Facebook, Twitter, and LinkedIn are often called “networking” platforms because they allow user accounts to interact with each other in a variety of different ways.

What are the social media guidelines leading Marines?

DO NOT share information that is not approved for public release. Be aware of security measures regarding your identity and finances. Keep all important information out of Social Media. Be cautious against cyber criminals and attackers by following sound security procedures.