This document discusses social media security, privacy risks, and challenges. It outlines how sharing personal information on social media can lead to privacy breaches if default settings are not adjusted. It also explains how third parties can mine user data shared on social media for targeted advertising without consent. Additional risks include virus and malware attacks through ads, privacy issues with third party apps accessing contacts and location, legal issues from offensive posts, identity theft from shared personal details, cyberbullying, and use of social media for cyber terrorism activities. The document provides solutions such as using strong, unique passwords, being selective about shared information, enabling two-factor authentication and privacy settings, only installing apps from authorized sources, and keeping devices and software updated. It also
2. HERE WE
DISCUSS
The evolution of social media has created a new
paradigm of communication and interaction. It has
become a part of our social life that helps us
connect to friends, family, colleagues, or others
Issues involving Cybersecurity for social
media
Risks & Challenges
Solutions To Social Media Threats
3. PRIVACY OF
DATA:
Users share their personal information on social
media, which can cause privacy breaches. It can
also sometimes cause personal data loss or
instigate hackers to leverage the same for
malicious reasons. For example, a users
information can be viewed by everyone if the
users default setting is public.
4. DATA MINING:
We all leave a data trail behind on the internet.
When someone creates a new social
media account and provides details such as date
of birth, name, location, and personal habits, and
without our knowledge, all these data are
leveraged and shared with third-party for targeting
advertising. It can cause security concerns as
third-party may collect real-time updates on the
users location.
5. VIRUS AND
MALWARE
ATTACKS:
Malware and viruses quite often find a way into
the computer system through annoying ads. Once
gaining access to the network, the attacker steals
confidential data or causes complete disruption to
the computer system. This often causes the loss
of all kinds of data personal, professional,
financial, etc.
6. ISSUES
INVOLVING
THE USE OF
3RD PARTY
APPLICATIONS
:
Most applications nowadays ask permission from
users to access personal information such as
contacts, pictures, and current geographic
location before installing, and some of these
applications which are running in the background
might download malware on the users phone or
smart devices without their knowledge.
7. LEGAL
ISSUES:
There are legal risks associated with the use
of social media, like posting offensive content
towards any individual, community, or country.
Often, legal actions can be and are taken when
such offensive posts are made and uploaded by
any individual or organization.
8. IDENTITY
THEFT:
As millions share their personal information to get
registered on one or more social media platforms,
this data becomes vulnerable as hackers and
identity thieves use this information to reset
passwords, apply for loans, or other malicious
objectives.
9. CYBER
BULLYING:
CYBER TERRORISM:
It refers to bullying through the digital medium. It
can take place on social media, gaming, and
messaging platforms. It is aimed at scaring,
shaming, or annoying the targeted victim.
Cyber Terrorism: Nowadays, social media is also
used to facilitate terrorism-related activities. It can
support, promote, engage, and spread terrorism
propaganda like incitement to terrorism,
recruitment, radicalizing training, and planning of
terrorist attacks.
11. Creating strong
passwords is the
primary option to
ensure the privacy of
your information.
Ensure passwords
are complex,
including upper &
lower case, numbers
and special
characters. It should
be memorized and
never be written on
paper.
We need to be
sensitive in what we
upload/share on our
social networking
accounts and avoid
sharing personal
information like date
of birth, social
security details,
phone numbers,
names, and pictures
of family members.
Use security and
privacy options
provided by social
media platforms viz:
2-factor
authentication
system, access
control.
12. Connect our devices only to
authorized wifi access, use
privacy options provided by
various mobile operating
systems, use auto-lock features,
and download apps only from
authorized app stores.
Keep the operating system
updated with the latest patches,
turn on the firewall, and avoid
installing cracked software.
Ensure our antivirus is updated
and scans are performed
frequently.
We need to be smart using the
internet and avoid visiting
untrusted websites; referral links
to visit websites are never to be
clicked; instead, type in the
browsers URL address.
We must accept friend requests
only from people we know and
block those who post upsetting
content or comments.
14. 1. Clear your history using Off-Facebook Activity
2. Hide your location
Disable Facial Recognition
Get rid of apps that track you off Facebook
5. Enable two-factor authentication to lock out hackers
6. Stop search engines from showing your Facebook account
7. Limit the audience for your personal posts
8. Stop your activity from being advertised
9. Avoid those Like and Share buttons on other parts of the web
10. Clean up your Friends List