SlideShare a Scribd company logo
1 of 13
Social Media and Security.
How to Ensure Safe Social
Networking?
Presented By:
Ishfaq Majid
What is Social Media?
Social media is a computer-based technology
which facilitates the sharing of
• Ideas
• thoughts
• information
2
Cont.
By design, social media is internet-based and gives users quick
electronic communication of content. The content includes
• personal information
• Documents
• Videos
• Photos
The users engage with social media often via computer, tablet
or smartphone via web-based software or web application.
3
Cont.
• Social media originated as a way to interact with friends
and family but was later adopted by businesses which
wanted to take advantage of a popular new communication
method to reach out to customers.
• The power of social media is the ability to connect and share
information with anyone on Earth, or with many people
simultaneously.
4
Most popular social networks worldwide
• Compilation of the most popular social networks
worldwide by active users (October, 2018) prepared by
Statista.
• It gives a clear picture of the number of active users (in
millions) with Facebook ruling supreme.
• With over 2 billion active users Facebook holds the majority
market share.
• YouTube is second with Facebook-owned, WhatsApp and
Messenger not far behind.
5
What happens in one minute on Facebook
• 243,055 photos are uploaded by users
• 100,000 friends are requested
• 13,888 apps are installed
• 3,298,611 items are shared
• 50,000 links are posted
• 15,277,777 like and share buttons are viewed on other
websites. (Ahmad, 2014).
6
The Social Media Concern
• Most social network users share a large amount of their
private information in their social network space. This
information ranges from contact information, comments,
images, videos, etc.
• Many users publish their information publicly without careful
consideration.
• Moreover, social network users tend to have a high level of
trust toward other social network users. They tend to accept
friend requests easily, and trust items that friends send to
them (Gunatilaka, 2011).
7
Internet Security Threat Report, 2018
• India emerged as third most vulnerable country in terms of
risk of cyber threats, such as malware, spam and
ransomware in 2017. The report was published by security
solutions provider Symantec.
8
How Social Media security issue arises
• Forgetting to log out
• Logging on fake website
• Lack of Privacy
• Clicking on Enticing Ads
• Using Third Party Apps
• Common Passwords
• Clicking malicious links
• Using Virtual Private Networks
9
How to be ensure safe Social Networking
• Clearing browser history
• Two factor verification
• Updating Privacy Setting
• Avoid clicking ads on social media
• Avoid using third party apps
• Minimizing the use of Virtual Private Networks
• Using different and strong passwords
• Don’t trust a message
10
Conclusion
• The world is getting closer and everyone wants to be connected.
Static blogs and websites are losing popularity.
• The information comes to users rather than users have to make
effort to get the information. After all the advantages, the
problem that arises is of information overload and security.
• Social networks, unlike the common media, do not have a pattern
as to how much information has to be conveyed and where to
draw the line.
• Security might be area of concern where people can get illegal
access to a user’s information. The future of social networking
looks very promising but still it has to deal with the problems
associated with it.
11
References
Ahmad, I. (2014). What Happens in Just one Minute on Facebook.
Socialmediatoday. Retrieved from https://goo.gl/1rqAR8,
retrieved on 21st January 2019.
Gunatilaka, D. (2011). A Survey of Privacy and Security Issues in
Social Networks. Washington University. Retrieved from
https://goo.gl/JfbUp2, retrieved on 21st January 2018.
Global social networks ranked. The Statistics Portal. Retrieved from
https://goo.gl/cuuGTZ, retrieved on 22nd January 2018.
Internet Security Threat Report (2018). Symantec. 23. Retrieved
from https://goo.gl/wPHtHX, retrieved on 22nd January
2018.
12
Social media is fine, depending on how you use it.
(Edward Enninful)
Thank You
13

More Related Content

What's hot

CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Social media challenges
Social media challengesSocial media challenges
Social media challengesDr A.K. Sharma
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowSymantec Security Response
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Social Media
Social MediaSocial Media
Social MediaDarshit
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 

What's hot (20)

CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Social media challenges
Social media challengesSocial media challenges
Social media challenges
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Email threats
Email threatsEmail threats
Email threats
 
Basic malware analysis
Basic malware analysisBasic malware analysis
Basic malware analysis
 
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Network security
Network securityNetwork security
Network security
 
Social Media
Social MediaSocial Media
Social Media
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 

Similar to Social media and Security: How to Ensure Safe Social Networking

A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysisu3037519
 
Presentation1-1.pptx
Presentation1-1.pptxPresentation1-1.pptx
Presentation1-1.pptxFahadGujjar6
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposureLDdsng
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Yash Mittal
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfMichael Montarde
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social MediaYogeshIJTSRD
 
Social Media
Social MediaSocial Media
Social Mediaalok016
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialMichael Netzley, Ph.D.
 

Similar to Social media and Security: How to Ensure Safe Social Networking (20)

A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
 
Presentation1-1.pptx
Presentation1-1.pptxPresentation1-1.pptx
Presentation1-1.pptx
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Group 11.
Group 11.Group 11.
Group 11.
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?Social Media & Networking - Boon or Bane?
Social Media & Networking - Boon or Bane?
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
Social Media
Social MediaSocial Media
Social Media
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Pillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocialPillars of the Digital Age [v4] #AXASocial
Pillars of the Digital Age [v4] #AXASocial
 

Recently uploaded

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 

Social media and Security: How to Ensure Safe Social Networking

  • 1. Social Media and Security. How to Ensure Safe Social Networking? Presented By: Ishfaq Majid
  • 2. What is Social Media? Social media is a computer-based technology which facilitates the sharing of • Ideas • thoughts • information 2
  • 3. Cont. By design, social media is internet-based and gives users quick electronic communication of content. The content includes • personal information • Documents • Videos • Photos The users engage with social media often via computer, tablet or smartphone via web-based software or web application. 3
  • 4. Cont. • Social media originated as a way to interact with friends and family but was later adopted by businesses which wanted to take advantage of a popular new communication method to reach out to customers. • The power of social media is the ability to connect and share information with anyone on Earth, or with many people simultaneously. 4
  • 5. Most popular social networks worldwide • Compilation of the most popular social networks worldwide by active users (October, 2018) prepared by Statista. • It gives a clear picture of the number of active users (in millions) with Facebook ruling supreme. • With over 2 billion active users Facebook holds the majority market share. • YouTube is second with Facebook-owned, WhatsApp and Messenger not far behind. 5
  • 6. What happens in one minute on Facebook • 243,055 photos are uploaded by users • 100,000 friends are requested • 13,888 apps are installed • 3,298,611 items are shared • 50,000 links are posted • 15,277,777 like and share buttons are viewed on other websites. (Ahmad, 2014). 6
  • 7. The Social Media Concern • Most social network users share a large amount of their private information in their social network space. This information ranges from contact information, comments, images, videos, etc. • Many users publish their information publicly without careful consideration. • Moreover, social network users tend to have a high level of trust toward other social network users. They tend to accept friend requests easily, and trust items that friends send to them (Gunatilaka, 2011). 7
  • 8. Internet Security Threat Report, 2018 • India emerged as third most vulnerable country in terms of risk of cyber threats, such as malware, spam and ransomware in 2017. The report was published by security solutions provider Symantec. 8
  • 9. How Social Media security issue arises • Forgetting to log out • Logging on fake website • Lack of Privacy • Clicking on Enticing Ads • Using Third Party Apps • Common Passwords • Clicking malicious links • Using Virtual Private Networks 9
  • 10. How to be ensure safe Social Networking • Clearing browser history • Two factor verification • Updating Privacy Setting • Avoid clicking ads on social media • Avoid using third party apps • Minimizing the use of Virtual Private Networks • Using different and strong passwords • Don’t trust a message 10
  • 11. Conclusion • The world is getting closer and everyone wants to be connected. Static blogs and websites are losing popularity. • The information comes to users rather than users have to make effort to get the information. After all the advantages, the problem that arises is of information overload and security. • Social networks, unlike the common media, do not have a pattern as to how much information has to be conveyed and where to draw the line. • Security might be area of concern where people can get illegal access to a user’s information. The future of social networking looks very promising but still it has to deal with the problems associated with it. 11
  • 12. References Ahmad, I. (2014). What Happens in Just one Minute on Facebook. Socialmediatoday. Retrieved from https://goo.gl/1rqAR8, retrieved on 21st January 2019. Gunatilaka, D. (2011). A Survey of Privacy and Security Issues in Social Networks. Washington University. Retrieved from https://goo.gl/JfbUp2, retrieved on 21st January 2018. Global social networks ranked. The Statistics Portal. Retrieved from https://goo.gl/cuuGTZ, retrieved on 22nd January 2018. Internet Security Threat Report (2018). Symantec. 23. Retrieved from https://goo.gl/wPHtHX, retrieved on 22nd January 2018. 12
  • 13. Social media is fine, depending on how you use it. (Edward Enninful) Thank You 13