SlideShare a Scribd company logo
1 of 1
Part 1: Security Threats A Facebook data breach revealed more
Part 1: Security ThreatsA Facebook data breach revealed more than 530 million
individuals’ personal information to hackers. This included the date of birth, user’s name,
current city, and posts made on their wall. The exposure was discovered in 2021 even
though it existed since 2019.This breach happened when cybercriminals scraped data from
Facebook’s servers using a misconfiguration in their contact importer. As a result, they
could gain access to the personal information of millions of people.According to (Vojtko
How to prevent security misconfiguration) “The most common mistakes that lead to
security misconfiguration are: Unnecessary ports being left open, Unneeded services
permitted to run, Leftover pages still available to access, and Unused accounts with certain
privileges not being deleted.”By not removing these things you are leaving the application
open to attacks. A couple of things we can do to prevent Security Misconfiguration are:
Remove unused features, Disable the use of default accounts and passwords, and Limit
access to administrator interfaces.Part 2: Mobile devicesA desktop computer is more
physically secure than laptops, smartphones, and tablets because it is often kept in one
location, making it easier to protect. Desktop’s access to internet usually comes from a
single source, which help to fight malware easier. Each one of these items have different
practices when it comes to secure your device, these are a few ones that they have in
common:Always run updates, avoid public or suspicious Wi-Fi, enable remote lock, enable
user authentication, turn off device when not in use, and restrict physical access to
device.I’m already implementing a few security practices on my mobile device to protect it
from being hacked. For example, I try to avoid social media apps as much as possible ( I do
not have Facebook, Twitter, Tik Tok). Instagram is the only social media platform I have,
and I always try to share as less information about myself as possible.Another practice I use
is to always download files from a trustworthy source or page.References:Vojtko, Mark.
“How to Prevent Security Misconfiguration.” Hashed Out by The SSL Store™, 28 Dec. 2020,
https://www.thesslstore.com/blog/how-to-prevent-security-misconfiguration/.

More Related Content

Similar to Part Security Threats A Facebook data breach revealed more.docx

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0dkp205
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfGMATechnologies1
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 

Similar to Part Security Threats A Facebook data breach revealed more.docx (20)

Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Hamza
HamzaHamza
Hamza
 
Mobile security
Mobile securityMobile security
Mobile security
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Top 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOSTop 6-Security-Threats-on-iOS
Top 6-Security-Threats-on-iOS
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Mobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdfMobile App Security Best Practices Protecting User Data.pdf
Mobile App Security Best Practices Protecting User Data.pdf
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 

More from write4

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxwrite4
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docxwrite4
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxwrite4
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docxwrite4
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docxwrite4
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxwrite4
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docxwrite4
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docxwrite4
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docxwrite4
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxwrite4
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docxwrite4
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxwrite4
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxwrite4
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxwrite4
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxwrite4
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxwrite4
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxwrite4
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docxwrite4
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docxwrite4
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxwrite4
 

More from write4 (20)

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docx
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docx
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docx
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docx
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docx
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docx
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docx
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docx
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docx
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docx
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docx
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docx
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docx
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docx
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docx
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docx
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docx
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docx
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docx
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Part Security Threats A Facebook data breach revealed more.docx

  • 1. Part 1: Security Threats A Facebook data breach revealed more Part 1: Security ThreatsA Facebook data breach revealed more than 530 million individuals’ personal information to hackers. This included the date of birth, user’s name, current city, and posts made on their wall. The exposure was discovered in 2021 even though it existed since 2019.This breach happened when cybercriminals scraped data from Facebook’s servers using a misconfiguration in their contact importer. As a result, they could gain access to the personal information of millions of people.According to (Vojtko How to prevent security misconfiguration) “The most common mistakes that lead to security misconfiguration are: Unnecessary ports being left open, Unneeded services permitted to run, Leftover pages still available to access, and Unused accounts with certain privileges not being deleted.”By not removing these things you are leaving the application open to attacks. A couple of things we can do to prevent Security Misconfiguration are: Remove unused features, Disable the use of default accounts and passwords, and Limit access to administrator interfaces.Part 2: Mobile devicesA desktop computer is more physically secure than laptops, smartphones, and tablets because it is often kept in one location, making it easier to protect. Desktop’s access to internet usually comes from a single source, which help to fight malware easier. Each one of these items have different practices when it comes to secure your device, these are a few ones that they have in common:Always run updates, avoid public or suspicious Wi-Fi, enable remote lock, enable user authentication, turn off device when not in use, and restrict physical access to device.I’m already implementing a few security practices on my mobile device to protect it from being hacked. For example, I try to avoid social media apps as much as possible ( I do not have Facebook, Twitter, Tik Tok). Instagram is the only social media platform I have, and I always try to share as less information about myself as possible.Another practice I use is to always download files from a trustworthy source or page.References:Vojtko, Mark. “How to Prevent Security Misconfiguration.” Hashed Out by The SSL Store™, 28 Dec. 2020, https://www.thesslstore.com/blog/how-to-prevent-security-misconfiguration/.