SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2100
Social Media Privacy Protection for Blockchain with Cyber Security
Prediction Framework
M. Veni Priya1, Mrs P. Jasmine Lois Ebenezer2
1PG Scholar, Department of Computer Applications and Research Centre, Sarah Tucker College (Autonomous),
Tirunelveli, Tamil Nadu, India
2HOD & Associate Professor, Department of Computer Applications and Research Centre, Sarah Tucker College
(Autonomous), Tirunelveli, Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Human life has become increasingly reliant on
social networks. Most social networking sites provide basic
features such as online contact, communication, and interest
sharing, as well as the ability to build onlineprofilesthatother
users can view. Unfortunately, many users are unaware that
their personal information is being disclosed through their
profiles. Leakage of a user's personal information canoccurin
a variety of ways. This study discusses many of the security
issues involved with utilizing socialmedia. Alsodiscussedisthe
topic of privacy and how it pertains to security. Some crucial
points are presented based on these conversations in order to
increase a user's privacy and security on social networks. Our
investigation will assist readersincomprehendingthesecurity
and privacy concerns that social network users face, and this
research will assist users.
Key Words: OSN, security, classic privacy threats, modern
threat.
1. INTRODUCTION
Social media's growth has ushered in a new age of
communication and connection. It has become an integral
aspect of our social lives, allowing us tointeractwithfriends,
family, co-workers, and others. We'veseenhowsocial media
platforms like Facebook, Twitter, and WhatsApp have
revolutionized the way we use the internetforbothpersonal
and professional reasons. [4] social media are a kind of
online engagement that allows data senders (data
generators) and receivers (end users) to form virtual
communities via the usage of online social networks.
Because so much of our personal information is stored on
the Internet, information securityshouldbea toppriority for
everyone. Because of the massive popularity of these social
networks, which are often used by minors and those who do
not value privacy or security, a large quantity of potentially
private information is posted on the Internet for others to
see. [1] It is important to be cautious about what we publish
online in this manner; being careless might result in
information being shared that should not be considered.
A significant portion of long-distance interpersonal
communication is concerned with security. Aside from the
revolution in social networking that Online Social Networks
have brought about, its attraction, the ever-increasing
number of members, and the vast quantity of personal
information they exchange have created new hazards to
their users.
Fig -1: Social network growth from 2010-2021
As they become more integrated into users' everyday lives,
online social networks raise additional security issues,
particularly due to the possibility for massive quantities of
personal data to be exposed. Securityandprivacyassaultson
online social networks, as well as remedies that may be
employed to preserve users' privacy and keep shared data
safe from various sorts of attacks. Because of the possibility
for accessing a great quantity of personal information
provided by online social networking users, online social
media might present new hazards for its users. Private
information of persons or organizations, digital identity,
financial assets,intellectual property(IP),andorganizational
secrets and resources are all vulnerable to assaultsinOnline
Social Networking [5].
2. LITERATURE REVIEW
Recently, the internet has emerged as one of the most
efficient and effective means of communicating and
exchanging information, particularly in the context of social
networking sites. With over billions of users linked via
online social networks, and due to the popularity of social
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2101
networking sites, privacy has become a major worry for
many individuals.
Security concerns on social networking sites are minimal,
and users' efforts to make reasonable modifications to their
social media security are much lower than other sorts of
security operations, according to research. Many social
media users, on the other hand, lack technological
competence and have occasional security worries. It's one
thing to ensure that social networks can execute desirable
behaviours, but while sharing a wealth of (personal) data,
it's equally important to examine what unwanted behaviour
can arise. We'll look at privacy, its significance in social
networks, and possible dangers to users' privacyinthispart.
As a result, many firms lack a robust social media security
policy and program, and are unclear of how to develop
effective social media security policies to reduce social
media security threats, according to He's findings. Security
protection of personal information online has become a
substantial and vital studyarea associal networkingservices
have grown in popularity. This article looked into and
examined the privacy and securityofsocial networkingsites.
We will review how current privacy plays on social network
sites, analyse how personal information is influenced by the
internet and social networks, and discuss how privacy has
become a risk and how to use security awareness to avoid
privacy rise, affecting users' self-disclosureofprivatedatain
this paper.
The perceived advantage was merged into this study using
privacy calculus, and a few characteristics, such as, need
change. Data should be managed in a way that does not
compromise the privacy of users, anddata protectionshould
be thoroughly examined. The first and most important step
everyone who uses social media should do is to establish an
unwavering standard of privacy. After analysing the
literature, the concepts of data sensitivity and perceived
advantage were redefined. This research work intends to
reduce the level of privacy worry by examining the
constructs of privacy concern and self-disclosure.
3. COMMON SOCIAL MEDIA SECURITY RISKS
3.1 Social Media Accounts That Aren't Monitored
Even if you don't expect to utilize all of your social media
platforms right immediately, it's a good idea to reserve your
brand's handle on all of them. This makesitsimpleforothers
to locate you, but don't forget about the accounts you don't
use yet, have stopped using, or don't use often. Hackers may
target unmonitored social media accountsandbeginsending
false messages in your behalf [2].
3.2 Human Error
Everybody makes errors. In today'sfast-pacedenvironment,
it's all too simple for an employee to exposetheorganization
to internet dangers by inadvertently. According to the EY
Global Information Security Survey, "employee
vulnerability" was responsible for 20% of cyberattacks.
Some online tasks and quizzes might bedifficulttocomplete.
Employees may unintentionally cause social media security
vulnerabilities by completing them [2].
3.3 Third-Party Apps That Are Vulnerable
It's fantastic to be able to secure your own social media
accounts. However, flaws in linked third-party applications
may allow hackers to obtain access to protected social
media. Hackers gained access to the International Olympic
Committee's Twitter accounts. They gainedaccessthrougha
third-party analytics tool. The similar hack happened to FC
Barcelona [3].
Fig -2: Twitter tweet hack example
3.4 Malware and hacking attacks
Hackers who obtain access to your social media accounts
might severely harm your band's reputation. Hackers
allegedly acquired access to NBA MVP Giannis
Antetokounmpo's accounts. His crew had to undertake
damage control when they tweeted racist insults and other
profanities.
Fig -3: Twitter Accounts Malware Attack
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2102
4. METHODOLOGY
4.1 Predicting Social Media Users' Behaviour
Users often link from e-commerce websites to social
networking sites like Facebook and Twitter in the age of
social commerce. However, there have been few attemptsto
study the links between consumers' social media accounts
and their online shopping habits. This study describes a
method for predicting a user's e-commerce buying
behaviour based on their social media profile. We are
particularly interested in determining if a user's profile
information on a social network (such as Facebook) will be
used to forecast which product categories the user will
purchase (for example eBay Electronics). The article
examines how users' Facebook profile informationconnects
to eBay transactions, as well as the efficacy of different
feature sets and learning algorithms on the job of predicting
buy behaviour.
4.2 Privacy Concerns and Issues
Adolescents might experience both good and harmful
impacts from electronic media. When utilized for education,
access to good health information, and creating and
maintaining social relationships, electronic media may be
beneficial. Despite these advantages, electronic media may
be hazardous and cause healthproblems.Theauthentication
techniques of P2P backup and storage systems were
examined for the study of password-based authenticationin
decentralized systems. Following the investigation, new
methods for password-based authentication and a new
encryption-based access control mechanism were designed
to address the privacy issue without losing speed.
Lightweight custom simulators were createdbyFacebookto
assess design efficiency. The suggested architectures'
security features were carefully examined, but no formal
security proofs were provided.
4.3 Potential Threats in Social Networking Sites
The main needs of social networking sites are security and
privacy concerns. However, many of the worst crimes
continue to exist in all of these social networking sites, and
protecting prospective users from these terrible acts has
been a difficult issue for many social analysts and engineers.
The most common security attacks are divided into three
types.
1) Data Breach: Determine the connectivity between nodes
and edges, as well as the relationship between them.
2) Passive Attacks: These might be completely undetected
and anonymous.
3) Active Attacks: Attempt to connect to opposing nodesand
get access to the other nodes by forming new nodes
intrinsically.
4.4 Privacy Settings on Social Media Sites
Destinations on social networking platforms attempt to
protect privacy settings. As part of their default settings,
Facebook and other long-range social communication
destinations weaken safety. Clients must go via their client
settings to change their protection according to their
freedoms. These sites, such as Facebook, allow users to hide
personal information such as their birth date, email, phone
number, and company status. For those who choose to
include this information, Facebook allows users to restrict
access to their profiles to just those they identify as
"companions." Even this amount of anonymity, however,
cannot prevent one of those companions from downloading
a snapshot to their own computer and uploading it
elsewhere. Regardless, fewer social networking site users
have restricted their accounts at this moment.
Take, for example, how users mayrestrictthedisplayoftheir
profiles to others on a variety of social networking sites:
Facebook: Facebook's new user privacy option is set to
Friends Only.
To do so, go to Settings
Settings > Privacy > Who will be able to view your future
posts?
Settings > Security and privacy > Privacy > Tweet Privacy >
Protect my Tweets on Twitter.
To change this, go to Settings > Account > Helpful Links >
Edit your public profile on LinkedIn.
To change this setting on Google+, write the name of a Circle
in the "To" space underneath your post before publishing it.
5. SOLUTIONS ON SOCIAL MEDIA THREATS
1. The most effective way to guarantee the privacy of
your data is to use strong passwords.
2. Use complicated passwords thatincludeupper-and
lower-case letters, digits, and special characters. It
should be remembered rather than written down.
3. We should be cautious about what we post/share
on social media sites, and avoid publishingpersonal
information such as dates of birth, social security
numbers, phone numbers, names, and family
photos.
4. Only connect our smartphones to allowed Wi-Fi
networks, utilize the privacy features given by
different mobile operating systems, use auto-lock
features, and only download software from
authorized app shops.
5. Keep the operating system up to datewiththelatest
patches, enable the firewall, and stay away from
cracked applications.
6. Make sure our antivirus is up to date and that we
run regular scans.
7. When using the internet, we must be cautious and
avoid accessing untrustworthy sites; referral links
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2103
to websites should never be clicked; instead, put in
the browser's URL address.
8. It's important to only accept friend requests from
individuals we know, and to ban anyone who
publish offensive information or remarks.
5.1 Advantages
 Individual users may easily communicate with
friends and family. You'llpayattentiontowhatother
people do and also let them know what's going onin
your life via words, photographs, and other media.
 Users may connect with others who share their
interests. Social networking makes it simple to join
organizations and establish friends with otherswho
share your interests, no matter how odd they may
be.
 People can connect with one other across vast
distances and across international borders.
 Social networking has the potential to boost voter
turnout and assist political change. Elections,
boycotts, rallies, and marches may all be organized
and carried out via social media.
 In the case of a disaster, such as a storm, wildfire, or
terrorist attack,a large numberofindividualswillbe
notified rapidly.
5.2 Disadvantages
 Users cannot be certain that their personal
information will be kept secure. It should be stolen
or, in certain cases, sold by the site itself.
 Social networking sites are used for scams,
computer infections, fraud, and identity theft.
 Students utilize social networking sitestocheatand
copy their homework.
 People may squander a lot of time on social
networking sites for no apparent reason. As a
consequence, their professional careers, education,
social lives, and even physical health will suffer.
 Companies that use networking face the risk of
making a blunder or worse, harming their brand.
6. CONCLUSIONS
In this article, we go into the specifics of social media privacy
and security. The majority of this investigation shows that
interpersonal organizations pose significant security and
protection risks. Organizations must take proper steps to
prevent cybercrime, and consumers must safeguard their
personal information to prevent abuse. Because cyberspace
is becoming a major arena for criminal activity, there is a
need for broad coordination across governments to tackle
the growing threat of social network security and social
media cyber-attacks. All of this research indicatesthatsocial
networks pose significant security and privacy threats.
REFERENCES
[1] Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.:
Social phishing. Comm. ACM 50(10), 94–100 (2007
[2] Mahmood, S.: Online social networks: The overt and
covert communication channels for terrorists and
beyond. In: IEEE HST, 2012.
[3] Mahmood, S.: New privacy threats for Facebook and
Twitter users. In: IEEE 3PGCIC, 2012.
[4] Dey, R., Tang, C., Ross, K.W., Saxena, N.: Estimating age
privacy leakage in online social networks. In: INFOCOM,
pp. 2836–2840, 2012 70 S. Mahmood.
[5] A. Mislove, M. Marcon, K. P.Gummadi,P.Druschel,andB.
Bhattacharjee, “Measurement and analysis of online
social networks,”inProceedingsofthe5thACM/USENIX
Internet Measurement Conference (IMC’07), October
2007.
[6] Warren, S.D., Brandeis, L.D.: The right to privacy. Harv.
Law Rev. 4(5), 193–220 (1890)
[7] Chaabane, A., Acs, G., Kaafar, M.: You are what you like!
Information leakage through users’ interests. In: Proc.
Annual Network and Distributed System Security
Symposium, 2012
[8] Chaum, D.: Untraceable electronic mail, return
addresses, and digital pseudonyms. Comm. ACM 24(2),
84–88 (1981)
[9] Chaum, D.: Blind signatures for untraceable payments.
In: CRYPTO, pp. 199–203, 1982
[10] Cooper, B.: Italian drugs fugitive jailed after posting
pictures of himself with Barack Obama waxwork in
London on Facebook. Mail Online February 14, 2012
[11] Westin, A., Blom-Cooper, L.: Privacy and Freedom.
Bodley Head, London (1970).

More Related Content

Similar to Social Media Privacy Protection for Blockchain with Cyber Security Prediction Framework

Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message Detection
IRJET Journal
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
vivatechijri
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
ijcsit
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
ijceronline
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
Jeewanthi Fernando
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
IRJET Journal
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
IRJET Journal
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
IRJET Journal
 
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
Cyberbullying Detection on Social Networks Using Machine Learning ApproachesCyberbullying Detection on Social Networks Using Machine Learning Approaches
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
IRJET Journal
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
Supriya Radhakrishna
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
Enow Eyong
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
tecnologico de tuxtepec
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
IAEME Publication
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj

Similar to Social Media Privacy Protection for Blockchain with Cyber Security Prediction Framework (20)

Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message Detection
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Big Data and Information Security
Big Data and Information SecurityBig Data and Information Security
Big Data and Information Security
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
Cyberbullying Detection on Social Networks Using Machine Learning ApproachesCyberbullying Detection on Social Networks Using Machine Learning Approaches
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
Kastriot Blakaj
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 

Recently uploaded (20)

DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 

Social Media Privacy Protection for Blockchain with Cyber Security Prediction Framework

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2100 Social Media Privacy Protection for Blockchain with Cyber Security Prediction Framework M. Veni Priya1, Mrs P. Jasmine Lois Ebenezer2 1PG Scholar, Department of Computer Applications and Research Centre, Sarah Tucker College (Autonomous), Tirunelveli, Tamil Nadu, India 2HOD & Associate Professor, Department of Computer Applications and Research Centre, Sarah Tucker College (Autonomous), Tirunelveli, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Human life has become increasingly reliant on social networks. Most social networking sites provide basic features such as online contact, communication, and interest sharing, as well as the ability to build onlineprofilesthatother users can view. Unfortunately, many users are unaware that their personal information is being disclosed through their profiles. Leakage of a user's personal information canoccurin a variety of ways. This study discusses many of the security issues involved with utilizing socialmedia. Alsodiscussedisthe topic of privacy and how it pertains to security. Some crucial points are presented based on these conversations in order to increase a user's privacy and security on social networks. Our investigation will assist readersincomprehendingthesecurity and privacy concerns that social network users face, and this research will assist users. Key Words: OSN, security, classic privacy threats, modern threat. 1. INTRODUCTION Social media's growth has ushered in a new age of communication and connection. It has become an integral aspect of our social lives, allowing us tointeractwithfriends, family, co-workers, and others. We'veseenhowsocial media platforms like Facebook, Twitter, and WhatsApp have revolutionized the way we use the internetforbothpersonal and professional reasons. [4] social media are a kind of online engagement that allows data senders (data generators) and receivers (end users) to form virtual communities via the usage of online social networks. Because so much of our personal information is stored on the Internet, information securityshouldbea toppriority for everyone. Because of the massive popularity of these social networks, which are often used by minors and those who do not value privacy or security, a large quantity of potentially private information is posted on the Internet for others to see. [1] It is important to be cautious about what we publish online in this manner; being careless might result in information being shared that should not be considered. A significant portion of long-distance interpersonal communication is concerned with security. Aside from the revolution in social networking that Online Social Networks have brought about, its attraction, the ever-increasing number of members, and the vast quantity of personal information they exchange have created new hazards to their users. Fig -1: Social network growth from 2010-2021 As they become more integrated into users' everyday lives, online social networks raise additional security issues, particularly due to the possibility for massive quantities of personal data to be exposed. Securityandprivacyassaultson online social networks, as well as remedies that may be employed to preserve users' privacy and keep shared data safe from various sorts of attacks. Because of the possibility for accessing a great quantity of personal information provided by online social networking users, online social media might present new hazards for its users. Private information of persons or organizations, digital identity, financial assets,intellectual property(IP),andorganizational secrets and resources are all vulnerable to assaultsinOnline Social Networking [5]. 2. LITERATURE REVIEW Recently, the internet has emerged as one of the most efficient and effective means of communicating and exchanging information, particularly in the context of social networking sites. With over billions of users linked via online social networks, and due to the popularity of social
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2101 networking sites, privacy has become a major worry for many individuals. Security concerns on social networking sites are minimal, and users' efforts to make reasonable modifications to their social media security are much lower than other sorts of security operations, according to research. Many social media users, on the other hand, lack technological competence and have occasional security worries. It's one thing to ensure that social networks can execute desirable behaviours, but while sharing a wealth of (personal) data, it's equally important to examine what unwanted behaviour can arise. We'll look at privacy, its significance in social networks, and possible dangers to users' privacyinthispart. As a result, many firms lack a robust social media security policy and program, and are unclear of how to develop effective social media security policies to reduce social media security threats, according to He's findings. Security protection of personal information online has become a substantial and vital studyarea associal networkingservices have grown in popularity. This article looked into and examined the privacy and securityofsocial networkingsites. We will review how current privacy plays on social network sites, analyse how personal information is influenced by the internet and social networks, and discuss how privacy has become a risk and how to use security awareness to avoid privacy rise, affecting users' self-disclosureofprivatedatain this paper. The perceived advantage was merged into this study using privacy calculus, and a few characteristics, such as, need change. Data should be managed in a way that does not compromise the privacy of users, anddata protectionshould be thoroughly examined. The first and most important step everyone who uses social media should do is to establish an unwavering standard of privacy. After analysing the literature, the concepts of data sensitivity and perceived advantage were redefined. This research work intends to reduce the level of privacy worry by examining the constructs of privacy concern and self-disclosure. 3. COMMON SOCIAL MEDIA SECURITY RISKS 3.1 Social Media Accounts That Aren't Monitored Even if you don't expect to utilize all of your social media platforms right immediately, it's a good idea to reserve your brand's handle on all of them. This makesitsimpleforothers to locate you, but don't forget about the accounts you don't use yet, have stopped using, or don't use often. Hackers may target unmonitored social media accountsandbeginsending false messages in your behalf [2]. 3.2 Human Error Everybody makes errors. In today'sfast-pacedenvironment, it's all too simple for an employee to exposetheorganization to internet dangers by inadvertently. According to the EY Global Information Security Survey, "employee vulnerability" was responsible for 20% of cyberattacks. Some online tasks and quizzes might bedifficulttocomplete. Employees may unintentionally cause social media security vulnerabilities by completing them [2]. 3.3 Third-Party Apps That Are Vulnerable It's fantastic to be able to secure your own social media accounts. However, flaws in linked third-party applications may allow hackers to obtain access to protected social media. Hackers gained access to the International Olympic Committee's Twitter accounts. They gainedaccessthrougha third-party analytics tool. The similar hack happened to FC Barcelona [3]. Fig -2: Twitter tweet hack example 3.4 Malware and hacking attacks Hackers who obtain access to your social media accounts might severely harm your band's reputation. Hackers allegedly acquired access to NBA MVP Giannis Antetokounmpo's accounts. His crew had to undertake damage control when they tweeted racist insults and other profanities. Fig -3: Twitter Accounts Malware Attack
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2102 4. METHODOLOGY 4.1 Predicting Social Media Users' Behaviour Users often link from e-commerce websites to social networking sites like Facebook and Twitter in the age of social commerce. However, there have been few attemptsto study the links between consumers' social media accounts and their online shopping habits. This study describes a method for predicting a user's e-commerce buying behaviour based on their social media profile. We are particularly interested in determining if a user's profile information on a social network (such as Facebook) will be used to forecast which product categories the user will purchase (for example eBay Electronics). The article examines how users' Facebook profile informationconnects to eBay transactions, as well as the efficacy of different feature sets and learning algorithms on the job of predicting buy behaviour. 4.2 Privacy Concerns and Issues Adolescents might experience both good and harmful impacts from electronic media. When utilized for education, access to good health information, and creating and maintaining social relationships, electronic media may be beneficial. Despite these advantages, electronic media may be hazardous and cause healthproblems.Theauthentication techniques of P2P backup and storage systems were examined for the study of password-based authenticationin decentralized systems. Following the investigation, new methods for password-based authentication and a new encryption-based access control mechanism were designed to address the privacy issue without losing speed. Lightweight custom simulators were createdbyFacebookto assess design efficiency. The suggested architectures' security features were carefully examined, but no formal security proofs were provided. 4.3 Potential Threats in Social Networking Sites The main needs of social networking sites are security and privacy concerns. However, many of the worst crimes continue to exist in all of these social networking sites, and protecting prospective users from these terrible acts has been a difficult issue for many social analysts and engineers. The most common security attacks are divided into three types. 1) Data Breach: Determine the connectivity between nodes and edges, as well as the relationship between them. 2) Passive Attacks: These might be completely undetected and anonymous. 3) Active Attacks: Attempt to connect to opposing nodesand get access to the other nodes by forming new nodes intrinsically. 4.4 Privacy Settings on Social Media Sites Destinations on social networking platforms attempt to protect privacy settings. As part of their default settings, Facebook and other long-range social communication destinations weaken safety. Clients must go via their client settings to change their protection according to their freedoms. These sites, such as Facebook, allow users to hide personal information such as their birth date, email, phone number, and company status. For those who choose to include this information, Facebook allows users to restrict access to their profiles to just those they identify as "companions." Even this amount of anonymity, however, cannot prevent one of those companions from downloading a snapshot to their own computer and uploading it elsewhere. Regardless, fewer social networking site users have restricted their accounts at this moment. Take, for example, how users mayrestrictthedisplayoftheir profiles to others on a variety of social networking sites: Facebook: Facebook's new user privacy option is set to Friends Only. To do so, go to Settings Settings > Privacy > Who will be able to view your future posts? Settings > Security and privacy > Privacy > Tweet Privacy > Protect my Tweets on Twitter. To change this, go to Settings > Account > Helpful Links > Edit your public profile on LinkedIn. To change this setting on Google+, write the name of a Circle in the "To" space underneath your post before publishing it. 5. SOLUTIONS ON SOCIAL MEDIA THREATS 1. The most effective way to guarantee the privacy of your data is to use strong passwords. 2. Use complicated passwords thatincludeupper-and lower-case letters, digits, and special characters. It should be remembered rather than written down. 3. We should be cautious about what we post/share on social media sites, and avoid publishingpersonal information such as dates of birth, social security numbers, phone numbers, names, and family photos. 4. Only connect our smartphones to allowed Wi-Fi networks, utilize the privacy features given by different mobile operating systems, use auto-lock features, and only download software from authorized app shops. 5. Keep the operating system up to datewiththelatest patches, enable the firewall, and stay away from cracked applications. 6. Make sure our antivirus is up to date and that we run regular scans. 7. When using the internet, we must be cautious and avoid accessing untrustworthy sites; referral links
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 2103 to websites should never be clicked; instead, put in the browser's URL address. 8. It's important to only accept friend requests from individuals we know, and to ban anyone who publish offensive information or remarks. 5.1 Advantages  Individual users may easily communicate with friends and family. You'llpayattentiontowhatother people do and also let them know what's going onin your life via words, photographs, and other media.  Users may connect with others who share their interests. Social networking makes it simple to join organizations and establish friends with otherswho share your interests, no matter how odd they may be.  People can connect with one other across vast distances and across international borders.  Social networking has the potential to boost voter turnout and assist political change. Elections, boycotts, rallies, and marches may all be organized and carried out via social media.  In the case of a disaster, such as a storm, wildfire, or terrorist attack,a large numberofindividualswillbe notified rapidly. 5.2 Disadvantages  Users cannot be certain that their personal information will be kept secure. It should be stolen or, in certain cases, sold by the site itself.  Social networking sites are used for scams, computer infections, fraud, and identity theft.  Students utilize social networking sitestocheatand copy their homework.  People may squander a lot of time on social networking sites for no apparent reason. As a consequence, their professional careers, education, social lives, and even physical health will suffer.  Companies that use networking face the risk of making a blunder or worse, harming their brand. 6. CONCLUSIONS In this article, we go into the specifics of social media privacy and security. The majority of this investigation shows that interpersonal organizations pose significant security and protection risks. Organizations must take proper steps to prevent cybercrime, and consumers must safeguard their personal information to prevent abuse. Because cyberspace is becoming a major arena for criminal activity, there is a need for broad coordination across governments to tackle the growing threat of social network security and social media cyber-attacks. All of this research indicatesthatsocial networks pose significant security and privacy threats. REFERENCES [1] Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Comm. ACM 50(10), 94–100 (2007 [2] Mahmood, S.: Online social networks: The overt and covert communication channels for terrorists and beyond. In: IEEE HST, 2012. [3] Mahmood, S.: New privacy threats for Facebook and Twitter users. In: IEEE 3PGCIC, 2012. [4] Dey, R., Tang, C., Ross, K.W., Saxena, N.: Estimating age privacy leakage in online social networks. In: INFOCOM, pp. 2836–2840, 2012 70 S. Mahmood. [5] A. Mislove, M. Marcon, K. P.Gummadi,P.Druschel,andB. Bhattacharjee, “Measurement and analysis of online social networks,”inProceedingsofthe5thACM/USENIX Internet Measurement Conference (IMC’07), October 2007. [6] Warren, S.D., Brandeis, L.D.: The right to privacy. Harv. Law Rev. 4(5), 193–220 (1890) [7] Chaabane, A., Acs, G., Kaafar, M.: You are what you like! Information leakage through users’ interests. In: Proc. Annual Network and Distributed System Security Symposium, 2012 [8] Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 24(2), 84–88 (1981) [9] Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO, pp. 199–203, 1982 [10] Cooper, B.: Italian drugs fugitive jailed after posting pictures of himself with Barack Obama waxwork in London on Facebook. Mail Online February 14, 2012 [11] Westin, A., Blom-Cooper, L.: Privacy and Freedom. Bodley Head, London (1970).