Subject: Information security communication



Yüklə 6,92 Kb.
tarix24.12.2023
ölçüsü6,92 Kb.
#190849

Theme: Overview of social media and its security
Subject: Information security communication
The evolution of social media has created a new paradigm of communication and interaction. It has become a part of our social life that helps us connect to friends, family, colleagues, or others. We have witnessed how the advent of social media platforms like Facebook, Twitter, and Whatsapp brought a revolutionary change in how we use the internet for personal and professional purposes. Even though there are security settings on social media platforms, people with mischievous intentions still find a way to gain access to sensitive personal information. So, we must understand social media cyber security, which directly impacts our use of social media networks.
1. Issues involving Cybersecurity for social media
As social media has grown by leaps and bounds, it has brought various benefits simultaneously and has posed serious social media cyber security concerns. It also acts as a vulnerable platform to be exploited by hackers. Some issues associated are pointed out below.
Privacy of Data: Users share their personal information on social media, which can cause privacy breaches. It can also sometimes cause personal data loss or instigate hackers to leverage the same for malicious reasons. For example, a user’s information can be viewed by everyone if the user’s default setting is public.
Data Mining: We all leave a data trail behind on the internet. When someone creates a new social media account and provides details such as date of birth, name, location, and personal habits, and without our knowledge, all these data are leveraged and shared with third-party for targeting advertising. It can cause security concerns as third-party may collect real-time updates on the user’s location.
Virus and Malware Attacks: Malware and viruses quite often find a way into the computer system through annoying ads. Once gaining access to the network, the attacker steals confidential data or causes complete disruption to the computer system. This often causes the loss of all kinds of data – personal, professional, financial, etc.
Issues involving the use of 3rd Party Applications: Most applications nowadays ask permission from users to access personal information such as contacts, pictures, and current geographic location before installing, and some of these applications which are running in the background might download malware on the user’s phone or smart devices without their knowledge.
Risks & Challenges
As the number of users accessing social platforms is increasing day by day, so are the risks.
Identity Theft: As millions share their personal information to get registered on one or more social media platforms, this data becomes vulnerable as hackers and identity thieves use this information to reset passwords, apply for loans, or other malicious objectives.
Romance Scams: A romance scam is a fraudulent scheme in which a swindler pretends romantic interest in a target, establishes a relationship, and then attempts to get money or sensitive information from the target under pretenses.
Whistle-blowers: People are often impulsive on social media; they show their vexation with their colleagues or bosses without thinking. They may deliberately reveal sensitive data in their posts, which can cause significant damage to the reputation of the organization.
Cyber Stalking: It refers to harassment over the internet. Cyberstalkers harass victims on social media by sending unpleasant and lewd messages. They morph photos of victims and circulate them on social media, alleging rumors making the victim’s life unbearable.
Cyber Bullying: It refers to bullying through the digital medium. It can take place on social media, gaming, and messaging platforms. It is aimed at scaring, shaming, or annoying the targeted victim.
Solutions On Social Media Threats
Creating strong passwords is the primary option to ensure the privacy of your information. 
Ensure passwords are complex, including upper & lower case, numbers and special characters. It should be memorized and never be written on paper.
We need to be sensitive in what we upload/share on our social networking accounts and avoid sharing personal information like date of birth, social security details, phone numbers, names, and pictures of family members.
Use security and privacy options provided by social media platforms viz: 2-factor authentication system, access control.
Connect our devices only to authorized wifi access, use privacy options provided by various mobile operating systems, use auto-lock features, and download apps only from authorized app stores.
Keep the operating system updated with the latest patches, turn on the firewall, and avoid installing cracked software.
Ensure our antivirus is updated and scans are performed frequently.
We need to be smart using the internet and avoid visiting untrusted websites; referral links to visit websites are never to be clicked; instead, type in the browser’s URL address.
We must accept friend requests only from people we know and block those who post upsetting content or comments.
Thanks for you
Attention!
Yüklə 6,92 Kb.

Dostları ilə paylaş:




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin