SlideShare a Scribd company logo
1 of 13
Social Media and Security.
How to Ensure Safe Social
Networking?
Presented By:
Ishfaq Majid
What is Social Media?
Social media is a computer-based technology
which facilitates the sharing of
• Ideas
• thoughts
• information
2
Cont.
By design, social media is internet-based and gives users quick
electronic communication of content. The content includes
• personal information
• Documents
• Videos
• Photos
The users engage with social media often via computer, tablet
or smartphone via web-based software or web application.
3
Cont.
• Social media originated as a way to interact with friends
and family but was later adopted by businesses which
wanted to take advantage of a popular new communication
method to reach out to customers.
• The power of social media is the ability to connect and share
information with anyone on Earth, or with many people
simultaneously.
4
Most popular social networks worldwide
• Compilation of the most popular social networks
worldwide by active users (October, 2018) prepared by
Statista.
• It gives a clear picture of the number of active users (in
millions) with Facebook ruling supreme.
• With over 2 billion active users Facebook holds the majority
market share.
• YouTube is second with Facebook-owned, WhatsApp and
Messenger not far behind.
5
What happens in one minute on Facebook
• 243,055 photos are uploaded by users
• 100,000 friends are requested
• 13,888 apps are installed
• 3,298,611 items are shared
• 50,000 links are posted
• 15,277,777 like and share buttons are viewed on other
websites. (Ahmad, 2014).
6
The Social Media Concern
• Most social network users share a large amount of their
private information in their social network space. This
information ranges from contact information, comments,
images, videos, etc.
• Many users publish their information publicly without careful
consideration.
• Moreover, social network users tend to have a high level of
trust toward other social network users. They tend to accept
friend requests easily, and trust items that friends send to
them (Gunatilaka, 2011).
7
Internet Security Threat Report, 2018
• India emerged as third most vulnerable country in terms of
risk of cyber threats, such as malware, spam and
ransomware in 2017. The report was published by security
solutions provider Symantec.
8
How Social Media security issue arises
• Forgetting to log out
• Logging on fake website
• Lack of Privacy
• Clicking on Enticing Ads
• Using Third Party Apps
• Common Passwords
• Clicking malicious links
• Using Virtual Private Networks
9
How to be ensure safe Social Networking
• Clearing browser history
• Two factor verification
• Updating Privacy Setting
• Avoid clicking ads on social media
• Avoid using third party apps
• Minimizing the use of Virtual Private Networks
• Using different and strong passwords
• Don’t trust a message
10
Conclusion
• The world is getting closer and everyone wants to be connected.
Static blogs and websites are losing popularity.
• The information comes to users rather than users have to make
effort to get the information. After all the advantages, the
problem that arises is of information overload and security.
• Social networks, unlike the common media, do not have a pattern
as to how much information has to be conveyed and where to
draw the line.
• Security might be area of concern where people can get illegal
access to a user’s information. The future of social networking
looks very promising but still it has to deal with the problems
associated with it.
11
References
Ahmad, I. (2014). What Happens in Just one Minute on Facebook.
Socialmediatoday. Retrieved from https://goo.gl/1rqAR8,
retrieved on 21st January 2019.
Gunatilaka, D. (2011). A Survey of Privacy and Security Issues in
Social Networks. Washington University. Retrieved from
https://goo.gl/JfbUp2, retrieved on 21st January 2018.
Global social networks ranked. The Statistics Portal. Retrieved from
https://goo.gl/cuuGTZ, retrieved on 22nd January 2018.
Internet Security Threat Report (2018). Symantec. 23. Retrieved
from https://goo.gl/wPHtHX, retrieved on 22nd January
2018.
12
Social media is fine, depending on how you use it.
(Edward Enninful)
Thank You
13

More Related Content

What's hot

Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingmkotzer
 
Social Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSocial Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSriram Ruthiran
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 

What's hot (20)

Power of Social Media
Power of Social MediaPower of Social Media
Power of Social Media
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Network security
Network securityNetwork security
Network security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Facebook
FacebookFacebook
Facebook
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Phishing
PhishingPhishing
Phishing
 
Social Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSocial Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media Addiction
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Similar to Social media and Security: How to Ensure Safe Social Networking

A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysisu3037519
 
Presentation1-1.pptx
Presentation1-1.pptxPresentation1-1.pptx
Presentation1-1.pptxFahadGujjar6
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposureLDdsng
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Yash Mittal
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfMichael Montarde
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social MediaYogeshIJTSRD
 
Social Media
Social MediaSocial Media
Social Mediaalok016
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialMichael Netzley, Ph.D.
 

Similar to Social media and Security: How to Ensure Safe Social Networking (20)

A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
 
Presentation1-1.pptx
Presentation1-1.pptxPresentation1-1.pptx
Presentation1-1.pptx
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Group 11.
Group 11.Group 11.
Group 11.
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
Social Media
Social MediaSocial Media
Social Media
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocial
 

Recently uploaded

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 

Recently uploaded (20)

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 

Social media and Security: How to Ensure Safe Social Networking

  • 1. Social Media and Security. How to Ensure Safe Social Networking? Presented By: Ishfaq Majid
  • 2. What is Social Media? Social media is a computer-based technology which facilitates the sharing of • Ideas • thoughts • information 2
  • 3. Cont. By design, social media is internet-based and gives users quick electronic communication of content. The content includes • personal information • Documents • Videos • Photos The users engage with social media often via computer, tablet or smartphone via web-based software or web application. 3
  • 4. Cont. • Social media originated as a way to interact with friends and family but was later adopted by businesses which wanted to take advantage of a popular new communication method to reach out to customers. • The power of social media is the ability to connect and share information with anyone on Earth, or with many people simultaneously. 4
  • 5. Most popular social networks worldwide • Compilation of the most popular social networks worldwide by active users (October, 2018) prepared by Statista. • It gives a clear picture of the number of active users (in millions) with Facebook ruling supreme. • With over 2 billion active users Facebook holds the majority market share. • YouTube is second with Facebook-owned, WhatsApp and Messenger not far behind. 5
  • 6. What happens in one minute on Facebook • 243,055 photos are uploaded by users • 100,000 friends are requested • 13,888 apps are installed • 3,298,611 items are shared • 50,000 links are posted • 15,277,777 like and share buttons are viewed on other websites. (Ahmad, 2014). 6
  • 7. The Social Media Concern • Most social network users share a large amount of their private information in their social network space. This information ranges from contact information, comments, images, videos, etc. • Many users publish their information publicly without careful consideration. • Moreover, social network users tend to have a high level of trust toward other social network users. They tend to accept friend requests easily, and trust items that friends send to them (Gunatilaka, 2011). 7
  • 8. Internet Security Threat Report, 2018 • India emerged as third most vulnerable country in terms of risk of cyber threats, such as malware, spam and ransomware in 2017. The report was published by security solutions provider Symantec. 8
  • 9. How Social Media security issue arises • Forgetting to log out • Logging on fake website • Lack of Privacy • Clicking on Enticing Ads • Using Third Party Apps • Common Passwords • Clicking malicious links • Using Virtual Private Networks 9
  • 10. How to be ensure safe Social Networking • Clearing browser history • Two factor verification • Updating Privacy Setting • Avoid clicking ads on social media • Avoid using third party apps • Minimizing the use of Virtual Private Networks • Using different and strong passwords • Don’t trust a message 10
  • 11. Conclusion • The world is getting closer and everyone wants to be connected. Static blogs and websites are losing popularity. • The information comes to users rather than users have to make effort to get the information. After all the advantages, the problem that arises is of information overload and security. • Social networks, unlike the common media, do not have a pattern as to how much information has to be conveyed and where to draw the line. • Security might be area of concern where people can get illegal access to a user’s information. The future of social networking looks very promising but still it has to deal with the problems associated with it. 11
  • 12. References Ahmad, I. (2014). What Happens in Just one Minute on Facebook. Socialmediatoday. Retrieved from https://goo.gl/1rqAR8, retrieved on 21st January 2019. Gunatilaka, D. (2011). A Survey of Privacy and Security Issues in Social Networks. Washington University. Retrieved from https://goo.gl/JfbUp2, retrieved on 21st January 2018. Global social networks ranked. The Statistics Portal. Retrieved from https://goo.gl/cuuGTZ, retrieved on 22nd January 2018. Internet Security Threat Report (2018). Symantec. 23. Retrieved from https://goo.gl/wPHtHX, retrieved on 22nd January 2018. 12
  • 13. Social media is fine, depending on how you use it. (Edward Enninful) Thank You 13