SlideShare a Scribd company logo
1 of 21
SOCIAL MEDIA AND ITS EFFECT
ON SECURITY
PRESENTED BY: RAJKIRAN R. NADAR
WHAT IS SOCIAL MEDIA:
• Websites and applications that enable users to create and share
content or to participate in social networking.
• Common Feature Of Social Media:
1) interactive Web 2.0 Internet-based applications.
2) User-generated content
3) facilitate the development of online social networks
4) Provide specific service
SOME PROMINENT EXAMPLES OF SOCIAL
MEDIA
• Facebook : is a popular free social networking website that
allows registered users to create profiles, upload photos and
video, send messages and keep in touch with friends, family
and colleagues
• Twitter : is a free microblogging service that allows registered
members to broadcast short posts called tweets. Twitter
members can broadcast tweets and follow other users' tweets
by using multiple platforms and devices
• Wikipedia : is a free, open content online encyclopedia created
through the collaborative effort of a community of users known
as Wikipedians.
• LinkedIn : is a social networking site designed specifically for
• Google+: is Google's social networking project, designed to
replicate the way people interact offline more closely than is
the case in other social networking services.
• YouTube : is video-sharing website which allows users to
upload, view, rate, share, add to favorites, report, comment on
videos, and subscribe to other users.
• Pinterest is a social curation website for sharing and
categorizing images found online. Pinterest requires brief
descriptions but the main focus of the site is visual
Question :
Social Media’s are free website like Facebook or
Google
Then are we customer of free website?
5 THREATS TO YOUR SECURITY WHEN
USING SOCIAL MEDIA:
• 1. Having Your Identity Stolen
• Precautions: 1)Have a strong password:
Check Password Strength: https://howsecureismypassword.net
2. GETTING YOUR COMPUTER OR SOCIAL PROFILE
HACKED
2)Be careful with your status updates
3) Don’t reveal your location.
Precautions:
1) Hover over the link.
2) Try a link scanner: Try URLVoid
3) Check shortened links:
Some shortened link sites include bit.ly, Ow.ly, and
TinyURL.
e.g.: http://bit.ly/KestalCares
3. INADVERTENTLY LETTING STALKERS FIND YOU:
• When you are online, cookies track your activity as you move
from site to site.
Precautions:
1) click on the “Do Not Track” feature
2) clear the cache and cookies on your browser
regularly
4. LETTING BURGLARS KNOW YOUR WHEREABOUTS
Precautions:
1) Use highest privacy control.
2) Be selective with the status updates.
5. BECOMING OVERCONFIDENT
3)Avoid posting specific travel plans. Never post
when, where, or how long you’ll be gone.
4)Wait until you are home to post pictures to a
vacation album
• Many users believe as long as they have a firewall and an
antivirus installed, there is no threat to security.
• Many people also believe that they don’t have anything worth
hacking so there’s no need to worry about security.
• Avoid posting information including:
1. Travel plans
2. Your full address and birthdate
3. Your children’s’ names, school, and birthdates
4. Location information, such as the name of your work place
5. Your daily schedule
CYBER STALKER ARRESTED
• Hyderabad: A MBA student from Karimnagar was arrested by
Rachakonda cyber cell for harassing a girl by creating a fake
Facebook profile on her name and posting abusive messages to
her friends. He also posted her photo and phone number on
various websites.
KEYLOGGER:
• A keylogger is a hardware device or a software program that
records the real time activity of a computer user including the
keyboard keys they press.
WHAT INFORMATION A KEYLOGGER CAN
COLLECT ?
• The capabilities of keyloggers vary, but when installed on a device they can
generally do the following:
1. capture any passwords entered by users on the device
2. take screen captures of the device at periodic intervals
3. record the URLs that were visited via Web browsers, and possibly also take
screen captures of the Web pages viewed
4. record a list of the applications run by users on the device
5. capture logs of all instant messaging (IM) sessions
6. capture copies of sent emails
7. automatically send the reports containing stored logs and emails to a
remote location (by email, FTP or HTTP).
HOW DOES A KEYLOGGER GET ON YOUR
COMPUTER ?
• A keylogger can be installed on your computer any number of
ways
• Anyone with access to your computer could install it
• Keyloggers could come as a component part of a virus or from
any application installation, despite how deceptively innocent it
may look
• This is part of the reason why you should always be sure you’re
downloading files from a trusted resource.
COUNTERMEASURES
• Network monitors
• Anti-spyware / Anti-virus programs
• Anti keyloggers
• Keystroke interference software

More Related Content

What's hot

5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Mediatechexpert2345
 
Cit 335 hootsuite-final project presentation
Cit 335 hootsuite-final project presentationCit 335 hootsuite-final project presentation
Cit 335 hootsuite-final project presentationitalianstallone
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Jay Nagar
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2alicelagajino
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusABHAY PATHAK
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteDOFJLCCDD
 
Browzine
BrowzineBrowzine
Browzinesciref
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber SecurityKushantha Gunawardana
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rulesritz482
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamMohammed Adam
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 

What's hot (20)

5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
 
What is Browser Sandbox Protection?
What is Browser Sandbox Protection?What is Browser Sandbox Protection?
What is Browser Sandbox Protection?
 
Cit 335 hootsuite-final project presentation
Cit 335 hootsuite-final project presentationCit 335 hootsuite-final project presentation
Cit 335 hootsuite-final project presentation
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Browzine
BrowzineBrowzine
Browzine
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Web 2.0 basic training
Web 2.0 basic trainingWeb 2.0 basic training
Web 2.0 basic training
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 

Similar to Social Media And It's Effect on Security

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Chapter 6_The Internet and Web Applications.pdf
Chapter 6_The Internet and Web Applications.pdfChapter 6_The Internet and Web Applications.pdf
Chapter 6_The Internet and Web Applications.pdfMohamedGamal607401
 
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)KaliAndres
 
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxEMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxJerickRemoyan
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking serviceManish S Thingalaya
 
Empowerment Module 1.pptx
Empowerment Module 1.pptxEmpowerment Module 1.pptx
Empowerment Module 1.pptxCristineAuditor
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptxRupertGarryTorres1
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 

Similar to Social Media And It's Effect on Security (20)

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Chapter 6_The Internet and Web Applications.pdf
Chapter 6_The Internet and Web Applications.pdfChapter 6_The Internet and Web Applications.pdf
Chapter 6_The Internet and Web Applications.pdf
 
Social Media Application Development
Social Media Application DevelopmentSocial Media Application Development
Social Media Application Development
 
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
 
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxEMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Emptech Lesson 1.pptx
Emptech Lesson 1.pptxEmptech Lesson 1.pptx
Emptech Lesson 1.pptx
 
Empowerment Module 1.pptx
Empowerment Module 1.pptxEmpowerment Module 1.pptx
Empowerment Module 1.pptx
 
Social networking
Social networkingSocial networking
Social networking
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptx
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 

Recently uploaded

Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsPooja Nehwal
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyAJHSSR Journal
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Delhi Call girls
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's goSocioCosmos
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageSocioCosmos
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceSapana Sha
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Delhi Call girls
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyWSI INTERNET PARTNER
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...Mona Rathore
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrSapana Sha
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRDelhi Call girls
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian
 

Recently uploaded (20)

Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9167673311 Book Hot And Sexy Girls
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Online Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary StudyOnline Social Shopping Motivation: A Preliminary Study
Online Social Shopping Motivation: A Preliminary Study
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
Night 7k Call Girls Pari Chowk Escorts Call Me: 8448380779
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Telibagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Telibagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts ServiceCall Girls In Patel Nagar Delhi 9654467111 Escorts Service
Call Girls In Patel Nagar Delhi 9654467111 Escorts Service
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing Company
 
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
GREAT OPORTUNITY Russian Call Girls Kirti Nagar 9711199012 Independent Escort...
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
 
Angela Killian | Operations Director | Dallas
Angela Killian | Operations Director | DallasAngela Killian | Operations Director | Dallas
Angela Killian | Operations Director | Dallas
 

Social Media And It's Effect on Security

  • 1. SOCIAL MEDIA AND ITS EFFECT ON SECURITY PRESENTED BY: RAJKIRAN R. NADAR
  • 2. WHAT IS SOCIAL MEDIA: • Websites and applications that enable users to create and share content or to participate in social networking. • Common Feature Of Social Media: 1) interactive Web 2.0 Internet-based applications. 2) User-generated content 3) facilitate the development of online social networks 4) Provide specific service
  • 3. SOME PROMINENT EXAMPLES OF SOCIAL MEDIA • Facebook : is a popular free social networking website that allows registered users to create profiles, upload photos and video, send messages and keep in touch with friends, family and colleagues • Twitter : is a free microblogging service that allows registered members to broadcast short posts called tweets. Twitter members can broadcast tweets and follow other users' tweets by using multiple platforms and devices • Wikipedia : is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians. • LinkedIn : is a social networking site designed specifically for
  • 4. • Google+: is Google's social networking project, designed to replicate the way people interact offline more closely than is the case in other social networking services. • YouTube : is video-sharing website which allows users to upload, view, rate, share, add to favorites, report, comment on videos, and subscribe to other users. • Pinterest is a social curation website for sharing and categorizing images found online. Pinterest requires brief descriptions but the main focus of the site is visual
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Question : Social Media’s are free website like Facebook or Google Then are we customer of free website?
  • 10.
  • 11. 5 THREATS TO YOUR SECURITY WHEN USING SOCIAL MEDIA: • 1. Having Your Identity Stolen • Precautions: 1)Have a strong password: Check Password Strength: https://howsecureismypassword.net
  • 12. 2. GETTING YOUR COMPUTER OR SOCIAL PROFILE HACKED 2)Be careful with your status updates 3) Don’t reveal your location. Precautions: 1) Hover over the link. 2) Try a link scanner: Try URLVoid 3) Check shortened links: Some shortened link sites include bit.ly, Ow.ly, and TinyURL. e.g.: http://bit.ly/KestalCares
  • 13.
  • 14. 3. INADVERTENTLY LETTING STALKERS FIND YOU: • When you are online, cookies track your activity as you move from site to site. Precautions: 1) click on the “Do Not Track” feature 2) clear the cache and cookies on your browser regularly 4. LETTING BURGLARS KNOW YOUR WHEREABOUTS Precautions: 1) Use highest privacy control. 2) Be selective with the status updates.
  • 15. 5. BECOMING OVERCONFIDENT 3)Avoid posting specific travel plans. Never post when, where, or how long you’ll be gone. 4)Wait until you are home to post pictures to a vacation album • Many users believe as long as they have a firewall and an antivirus installed, there is no threat to security. • Many people also believe that they don’t have anything worth hacking so there’s no need to worry about security.
  • 16. • Avoid posting information including: 1. Travel plans 2. Your full address and birthdate 3. Your children’s’ names, school, and birthdates 4. Location information, such as the name of your work place 5. Your daily schedule
  • 17. CYBER STALKER ARRESTED • Hyderabad: A MBA student from Karimnagar was arrested by Rachakonda cyber cell for harassing a girl by creating a fake Facebook profile on her name and posting abusive messages to her friends. He also posted her photo and phone number on various websites.
  • 18. KEYLOGGER: • A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.
  • 19. WHAT INFORMATION A KEYLOGGER CAN COLLECT ? • The capabilities of keyloggers vary, but when installed on a device they can generally do the following: 1. capture any passwords entered by users on the device 2. take screen captures of the device at periodic intervals 3. record the URLs that were visited via Web browsers, and possibly also take screen captures of the Web pages viewed 4. record a list of the applications run by users on the device 5. capture logs of all instant messaging (IM) sessions 6. capture copies of sent emails 7. automatically send the reports containing stored logs and emails to a remote location (by email, FTP or HTTP).
  • 20. HOW DOES A KEYLOGGER GET ON YOUR COMPUTER ? • A keylogger can be installed on your computer any number of ways • Anyone with access to your computer could install it • Keyloggers could come as a component part of a virus or from any application installation, despite how deceptively innocent it may look • This is part of the reason why you should always be sure you’re downloading files from a trusted resource.
  • 21. COUNTERMEASURES • Network monitors • Anti-spyware / Anti-virus programs • Anti keyloggers • Keystroke interference software