SlideShare a Scribd company logo
Privacy & Social Media
Contents
What is Social Media?
What is Privacy?
Now A days Social Media Uses
Threats to Online Social Networks Users
Solution For Protecting Users Privacy
Conclusion
What is Social Media?
Social media refers to websites and applications that are designed to allow people to
share content quickly, efficiently, and in real-time. Many people define social media
as apps on their smartphone or tablet, but the truth is, this communication tool
started with computers. This misconception stems from the fact that most social
media users access their tools via apps.
What is Privacy?
Privacy is a fundamental right, essential to autonomy and the
protection of human dignity, serving as the foundation upon
which many other human rights are built.
We share just about everything on the internet these days, naive
about the fact that our constant over-sharing grants the world
access to our deepest secrets. We check in at locations, share
photos, and allow people to feel like they went on vacation with
us.
Now A days Social Media Uses
Continue….
Percentage of young people engaging in Social Networking online,2014
Threats to Online Social Networks Users
Classic Threats Modern Threats Combination
Threats
Threats Targeting
Children
Online
Predator
Risky
Behaviors
Cyberbullying
Malware
Phishing Attacks
Spammers
Clickjacking
De-anonymization
attacks
Face Recognition
Fake Profiles
(Social bots)
Cross-site Scripting
(XSS)
Internet
Fraud
Identity Clone
Attacks
Information
Leakage
Inference Attacks
Location
Leakage
Socware
Solution For Protecting Users Privacy
Operator Solution Commercial
Solutions
Academic Solutions
Improving Privacy
Setting Interfaces
Phishing Detection
Spammer Detection
Authentication
Mechanisms
Security &
Privacy Settings
Internal Protection
mechanisms
Internet Security
Solution
AVG Privacy Fix
FB Phishing Protector
Norton Safe WebReport Users
McAfee Social
Protection
No Script Security
Suite
My Permissions
Privacy Scanner For
Facebook
Net Nanny
Minor Monitor
Cloned Profile
Detection
Face Profile Detection
Preventing Information
and Location Leakage
Socware Detection
Conclusion
In The End , We Are Not 100% Safe In Social Media. This Is The Most
Big Problem In Digital Age. But WE Cant Not Stop This Digitalization
Because We Are Depend On Every Digital Products On This Age. And In
This Age We Can Not Hiding Anything In Our Life. So It Is Our Self
Responsibility To Do Protect Our Privacy.
Thank
You

More Related Content

What's hot

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
Gab Billones
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
Beckusq
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
Tom Eston
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
atifkhanniazi
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptxPink Elephant
 
Social media-policy-presentation
Social media-policy-presentationSocial media-policy-presentation
Social media-policy-presentation
Ira Wolfe
 
Riza 9 a
Riza   9 aRiza   9 a
Riza 9 a
Anumod E Nair
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
FatimaAmin26
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
manesh Makheja
 
What is social media?
What is social media?What is social media?
What is social media?
WheresOllie
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
Archana Dwivedi
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
Ashley Surabhi
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
sanju prasad
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
Inflection Point Global
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Mohit Dholakiya
 
cyber crime
 cyber crime cyber crime
cyber crime
Surkhab Shelly
 

What's hot (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Digital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online NetiquetteDigital Safety, Data Privacy, and Online Netiquette
Digital Safety, Data Privacy, and Online Netiquette
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Social media-policy-presentation
Social media-policy-presentationSocial media-policy-presentation
Social media-policy-presentation
 
Riza 9 a
Riza   9 aRiza   9 a
Riza 9 a
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
What is social media?
What is social media?What is social media?
What is social media?
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
cyber crime
 cyber crime cyber crime
cyber crime
 

Similar to Privacy and social media

Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
Impulse Digital
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
Sandeep Thoniparambil
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
Dr Raghu Khimani
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
 
L017146571
L017146571L017146571
L017146571
IOSR Journals
 
INTERNET
INTERNETINTERNET
INTERNET
yaharamazing
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
JihithaJP
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacy
RohitBisht345647
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
StuartJDavidson.com
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
Dilna DV
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
RIZALEAHSAMANIEGO
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
Cyber police an idea for securing cyber space with unique
Cyber police  an idea for securing cyber space with uniqueCyber police  an idea for securing cyber space with unique
Cyber police an idea for securing cyber space with unique
Baharul Islam
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 

Similar to Privacy and social media (20)

Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
L017146571
L017146571L017146571
L017146571
 
INTERNET
INTERNETINTERNET
INTERNET
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
cybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacycybercriminals are weaponizing social media and jeopardizing privacy
cybercriminals are weaponizing social media and jeopardizing privacy
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.EMPOWERMENT TECHNOLOGIES.
EMPOWERMENT TECHNOLOGIES.
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
Cyber police an idea for securing cyber space with unique
Cyber police  an idea for securing cyber space with uniqueCyber police  an idea for securing cyber space with unique
Cyber police an idea for securing cyber space with unique
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 

Recently uploaded

SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
AJHSSR Journal
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 

Recently uploaded (19)

SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 

Privacy and social media

  • 2. Contents What is Social Media? What is Privacy? Now A days Social Media Uses Threats to Online Social Networks Users Solution For Protecting Users Privacy Conclusion
  • 3. What is Social Media? Social media refers to websites and applications that are designed to allow people to share content quickly, efficiently, and in real-time. Many people define social media as apps on their smartphone or tablet, but the truth is, this communication tool started with computers. This misconception stems from the fact that most social media users access their tools via apps.
  • 4. What is Privacy? Privacy is a fundamental right, essential to autonomy and the protection of human dignity, serving as the foundation upon which many other human rights are built. We share just about everything on the internet these days, naive about the fact that our constant over-sharing grants the world access to our deepest secrets. We check in at locations, share photos, and allow people to feel like they went on vacation with us.
  • 5. Now A days Social Media Uses
  • 7. Percentage of young people engaging in Social Networking online,2014
  • 8. Threats to Online Social Networks Users Classic Threats Modern Threats Combination Threats Threats Targeting Children Online Predator Risky Behaviors Cyberbullying Malware Phishing Attacks Spammers Clickjacking De-anonymization attacks Face Recognition
  • 9. Fake Profiles (Social bots) Cross-site Scripting (XSS) Internet Fraud Identity Clone Attacks Information Leakage Inference Attacks Location Leakage Socware
  • 10. Solution For Protecting Users Privacy Operator Solution Commercial Solutions Academic Solutions Improving Privacy Setting Interfaces Phishing Detection Spammer Detection Authentication Mechanisms Security & Privacy Settings Internal Protection mechanisms Internet Security Solution AVG Privacy Fix FB Phishing Protector
  • 11. Norton Safe WebReport Users McAfee Social Protection No Script Security Suite My Permissions Privacy Scanner For Facebook Net Nanny Minor Monitor Cloned Profile Detection Face Profile Detection Preventing Information and Location Leakage Socware Detection
  • 12. Conclusion In The End , We Are Not 100% Safe In Social Media. This Is The Most Big Problem In Digital Age. But WE Cant Not Stop This Digitalization Because We Are Depend On Every Digital Products On This Age. And In This Age We Can Not Hiding Anything In Our Life. So It Is Our Self Responsibility To Do Protect Our Privacy.