Social Media Security By: Opeyemi A. Rasaki
Social Media Security By: Opeyemi A. Rasaki
Social Media Security By: Opeyemi A. Rasaki
RASAKI 0
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 1
DISCLAIMER
The author does not assume any responsibility whatsoever under any conditions or circumstances.
You are 100% responsible for any inconveniencies, injury, or fallouts that result from changes that
might occur after the publication of this material.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 2
READ THIS
This book is the intellectual property of the author and you should by no means modify, copy,
transfer or use this book for any purpose that is against the ideal set for it.
Cheers!
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 3
PART ONE
WHO IS AN HACKER?
Noun
1. (computing) One who is expert at programming and solving problems with a computer.
2. (computing) One who uses a computer to gain unauthorized access to data, or to carry out
malicious attacks.
3. The Grey Hat Hackers- Not for Evil not for Good
At one end of the spectrum is the black hat, who hacks for evil and malicious intent and without
permission.
On the other end of the spectrum is the white hat, who hacks against a black hat in order to
protect computer and network access and has permission to do so.
In the middle is the grey hat, who hacks not for evil and not for good; they are neutral in their
cause and usually try to sell their skills for monetary gain, like a mercenary.
So, whenever you heard of hacker, they are not always a bad element.
Even, you can choose to be a professional hacker, I mean Ethical Hacker which is the same thing
as White Hat Hacker.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 4
At the end of this training, you should be able to secure your social media account against
Evil Doer Hackers.
I believe you will agree with me that nearly 99% of online registration including social media
accounts require Email address.
That means, having email account is a must for every individual using smartphone.
Well, there's different between using smartphone device and using internet sha.
Therefore, it's very important that you ensure your email account is secured.
Once hacker has access to your email account just say goodbye to every other thing that are
connected with it.
▪ Gmail
Visit www.account.google.com
Click on Done
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 7
problem.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 8
Let's proceed…
Continue clicking on the tab one after the other till you get to Security
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 9
Click on Set it up
1
2
Click on NEXT
Click on NEXT
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 11
Click YES
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 12
LET'S MOVE TO 2
2- Step Verification
1
2
Click on OK
Click on Yes
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 15
Click on YES
Click on YES
Click on TURN ON
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 18
Switch this on
Google Authenticator.
You can get it from Google Play Store for Android Phone
Click on SET UP
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 19
Faster option,
3 4
D
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 23
media too.
Once your email is secure, all other connected platforms are secure too.
Though, there are other social media platforms that accept either phone number/email
If you choose to use secure email instead of phone number, Facebook for instance, you need not
to worry.
Facebook Account
and Your WhatsApp Account now.
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 25
Yeah,
Instagram Security
Click on Settings
Read that
1. Text message
2. Authentication App
2
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 27
Click on Next
Done
your line.
Click on it
Click Next
Note:
Click Ok
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 29
Type it HERE
Click DONE
TWITTER SECURITY
Just let me show you where you can get started, then you proceed from there
Click on Account
SOCIAL MEDIA SECURITY BY: OPEYEMI A. RASAKI 31
Click on Security
TAKE NOTE
PART TWO
Thank God now that if you are using Chrome google will notify you that the link is not secure
Actually,
Phishing is a method of trying to gather personal information using deceptive e-mails and
websites.
▪ Domain name
▪ Subdomain
▪ Domain extension
Example, track.jumia.com.ng
The track here is the subdomain, it’s always at the left-side of the main domain name.
3. Domain extension is what end domain name like .com, .net, .ng, etc.
https://cocacola.com-cheap.best
Anybody that come across the link will think it's from COCA-COLA.
https://cocacola.com-cheap.best
The cocacola.com is just to deceive people to click on the link and get them to take action
https://cocacola.com-cheap.best
Actually, some other phishing website may not secure like the one used as an example.
➢ Like email address, phone number, date of birth, location, gender, ...
➢ After collection of data from a lot of people, they will organize everything, sell it to
anybody that needs the info.
➢ They may use it themselves,
➢ To target audience for email marketing and the likes.
➢ They may collect your email for newsletters
➢ Whenever you receive text messages like you win 10million or from unrecognized body,
don't blame them, blame yourself because you are the one that filled your phone number
on a particular website. The same thing with email too.
Some phishing website may be created to collect your Bank Account Details, BVN
NOTE:
‘Chat’ from the link is a subdomain and it is not a phishing website. Because, Main domain
name from the link is whatsapp.com and it’s recorgnised.
FOR EXAMPLE:
➢ Never rush to follow a link that comes to your way. Check the link properly, be sure it is
from acclaimed source
➢ Be careful of freebies.
For instance,
When you are asked to follow a link from MTN to win 100gb, you should know that is a
problem.
We were talking about social media hacking like this in a physical training. Then, somebody
raised a point a that he was hacked due to the fact he was very anxious to win a plasma TV on
facebook.
He was just asked some simple questions then; he was informed that he won a Plasma TV and
they entered him through that.
Another instance,
there is something called spyware. It's a program that can be used to spy and report actions or
activities on computer.
There was a time somebody sent a VPN application to me for free browsing on smartphone.
Then, I noticed that whenever I was using the VPN on my phone it would just pop-up on my
screen anytime, whether I'm on whatsapp or any other applications.
➢ Never use your name, your birth year and the likes as password.
There was a day when I was in school, I just collected a friend's a phone then, I unlocked it once,
without stress.
The lady was surprised that how did I know her pin because that was the first time I would be
holding her phone.
I just looked at her face thought about what her year of birth would be, then, typed it on the
phone and it worked.
➢ JUST BE CAREFUL
THE END
➢ Smartphone Productivity;
➢ Social Media Marketing Strategies;
➢ Smartphone Operation Maximization;
➢ Personal Development and
➢ Free Masterclass
Opeyemi A. Rasaki is a calm and competent individual with high moral rectitude and
ability to achieve set goals, even at the tightest deadline. Also, a versatile individual
with a thorough understanding of Branding, Online Marketing Strategies and
Information and Communication Technology.
He graduated from Osun state university Osogbo with a bachelor’s degree in
Economics Education.
He is a smartphone ICT expert; he has trained over 1000 individuals how to be smart and productive
with their smartphone; and how to turn it to money making machine and free from the shackle of
brokenness.
He is the Co-founder of MidasPlug Solutions; and the Chief Executive Officer of Rasqopym Konsult,
a multidimensional firm organized for business development.
rasakiopeyemi30@gmail.com
(+234) 0816 135 4832.