Social network and digital
security
‫المتدرب‬ ‫عمل‬:‫بنجر‬ ‫إبراهيم‬ ‫محمد‬
‫المقرر‬ ‫مدرب‬:‫م‬.‫العديني‬ ‫إبراهيم‬
INTRODUCTION
Social networks are one of the simplest types of communication these days, reflecting a person's social
picture. They can keep you attached to your avatar together for hours and make you forget the whole
physical world around you. The social relationship network that builds up during your daily lives can be
simply converted into your "profile" and made accessible to all your colleagues. Then there's a
"following" notion that can make a nomad a rockstar. The world of images that you live share has only
made you feel more about your presence. Everything seems so amusing that one would rarely think of
leaving this "world" and becoming an offline monk. But the more comfortable and connected we are to
these locations, the more casual and careless we are to share private information about ourselves.
As of May 2012, five major social
networking locations
1. Facebook.
2. Twitter.
3. Google+.
4. LinkedIn.
5. Pinterest.
Although the use of websites and apps on social networks is increasingly daily, users
are not conscious of the dangers associated with uploading sensitive data.
PRIVACY ISSUES
- Security risks
The related safety dangers are also growing tremendously with growing use of SNSs.
Theft of identity, phishing, scam, cyber bullying etc. are some of the safety hazards.
People use SNSs such as facebook, twitter, etc. to provide their private information.
This information is stored in SNS and is not safe due to the absence of adequate safety
methods introduced in SNSs.
- Identity Theft
Some of the attacker's attack by applying for authorization to access the data given in
the SNS profile. When a customer enables, they get all the data and can readily misuse
it without the understanding or permissions of the customer.
- Profiling Risk
Risk profiling is the risk of profile cloning. The attackers are retrieving users ' private
data and making a profile clone. They do this to harm their social picture or for other
reasons such as knowing about victims ' friends. This is the SNS's most common
security risk because it's very simple to do without the user's consent.
- Fake Product Sale
The attacker advertises on the SNSs for selling goods offering enormous discount and
their profile data goes to the attackers when the user clicks on the product
advertisement. Sometimes all account data is collected by the attackers when the
customer attempts to buy and offer their account data for payment and they misuse
this data.
ATTACKING SCENARIOS
Conventional Attacking Scenarios
1. CBIR( Content based Image Retrieval)
The attacker can understand a user's place in this situation by matching the image
patterns connected with the user's profile. Attack type is performed to understand the
user's present place.
2. Click jacking
This is another form of situation of assault where the attacker posts some videos or
posts to the victim and some malicious activities are done when the victim clicks on
the page. This is prevalent in Facebook with the name of jacking, which is when a user
wants a page, a photo, or a video that the attackers trap the user.
PREVENTION STRATEGIES
- Beware of strangers
The internet makes it easy for individuals to misrepresent their private identities and
intentions. Limiting the individuals who are permitted to contact you on these
locations is always suggested.
- Be sceptical
Don't think in everything you're reading online. People create a lot of errors and post
fake or misleading data on various subjects, including data about their own identity.
- Evaluate your settings
Make sure you keep the privacy settings of the site updated. The default settings may
allow anyone to view your "profile," but you may have an option to customize your
settings to limit access only to certain individuals.
CONCLUSION
Ultimately, the only solution to social network privacy and security issues is to get
some knowledge of how to get fooled. Don't post anything you'd like to hide from a
stranger. Be cautious who you add as a "buddy" as there is simply no way online to
verify the real identity of a user. We suggested a secure communication architecture
between users and a safe request-response architecture for user-to-user exchange of
data. Keep your system up to date and tidy. Keep your senses open while you are
using the internet and never jump to conclusions. Analyze the content thoroughly
before doing anything. And remember, there are no free lunches in this world.
References
http://www.ijsrp.org/research-paper-0413/ijsrp-p1666.pdf

More Related Content

PPTX
National Cyber Security Policy-2013
PDF
IT Security & Risk Management (September 23, 2020)
PPTX
أساسيات أمن المعلومات
PPTX
Phishing techniques
PDF
HOW AI CAN HELP IN CYBERSECURITY
PPTX
Cyber Security
PPT
The Future of Cyber Security
PPTX
Information security awareness - 101
National Cyber Security Policy-2013
IT Security & Risk Management (September 23, 2020)
أساسيات أمن المعلومات
Phishing techniques
HOW AI CAN HELP IN CYBERSECURITY
Cyber Security
The Future of Cyber Security
Information security awareness - 101

What's hot (20)

PPTX
Software piracy
PPT
Information Security
PDF
Information Security Awareness
PPTX
Microsoft Zero Trust
PPTX
Mobile Forensics and Cybersecurity
PPTX
Presentation on security feature of atm (2)
PDF
Cyber security and demonstration of security tools
PDF
The Definitive Guide to Data Loss Prevention
PDF
DevOps for DataScience
PPTX
Data security
PPTX
Cyber security
PPTX
Two factor authentication 2018
PDF
How do OpenAI GPT Models Work - Misconceptions and Tips for Developers
PPT
Software security
PPTX
Internet Safety Presentation
PPT
PPT
General Awareness On Cyber Security
PPT
Privacy and personal information
PPTX
Security management and tools
PPTX
Introduction to PCI DSS
Software piracy
Information Security
Information Security Awareness
Microsoft Zero Trust
Mobile Forensics and Cybersecurity
Presentation on security feature of atm (2)
Cyber security and demonstration of security tools
The Definitive Guide to Data Loss Prevention
DevOps for DataScience
Data security
Cyber security
Two factor authentication 2018
How do OpenAI GPT Models Work - Misconceptions and Tips for Developers
Software security
Internet Safety Presentation
General Awareness On Cyber Security
Privacy and personal information
Security management and tools
Introduction to PCI DSS
Ad

Similar to Social network and digital security (20)

PPTX
Brandon + Eddie users guide phi 235
PPTX
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
PPTX
Social networking privacy issues & exposure
PPTX
Security and Privacy in Social Networks.pptx
PPTX
Security threats in social networks
PPTX
Social Networking Security
PDF
Online Social Networks: 5 threats and 5 ways to use them safely
PDF
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
PPTX
Companies that operate social networks are themselves collecting a variety of...
PDF
Social network privacy
PDF
Social network privacy.
PDF
Social network privacy.
PPTX
Privacy issues in social networking
PDF
Social network privacy guide
PDF
SOCIAL NETWORK SECURITY
PPTX
Social media: Issues
PPTX
Threaths and risks
PPTX
Threaths and risks
PPTX
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
PPT
Future of social networking group project
Brandon + Eddie users guide phi 235
PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL NETWORK PRESENTATION SOCIAL N...
Social networking privacy issues & exposure
Security and Privacy in Social Networks.pptx
Security threats in social networks
Social Networking Security
Online Social Networks: 5 threats and 5 ways to use them safely
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Companies that operate social networks are themselves collecting a variety of...
Social network privacy
Social network privacy.
Social network privacy.
Privacy issues in social networking
Social network privacy guide
SOCIAL NETWORK SECURITY
Social media: Issues
Threaths and risks
Threaths and risks
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
Future of social networking group project
Ad

Recently uploaded (20)

PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
HVAC Specification 2024 according to central public works department
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Trump Administration's workforce development strategy
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
International_Financial_Reporting_Standa.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
My India Quiz Book_20210205121199924.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Introduction to pro and eukaryotes and differences.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Weekly quiz Compilation Jan -July 25.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
HVAC Specification 2024 according to central public works department
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Trump Administration's workforce development strategy
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Practical Manual AGRO-233 Principles and Practices of Natural Farming
International_Financial_Reporting_Standa.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Hazard Identification & Risk Assessment .pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
My India Quiz Book_20210205121199924.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
B.Sc. DS Unit 2 Software Engineering.pptx

Social network and digital security

  • 1. Social network and digital security ‫المتدرب‬ ‫عمل‬:‫بنجر‬ ‫إبراهيم‬ ‫محمد‬ ‫المقرر‬ ‫مدرب‬:‫م‬.‫العديني‬ ‫إبراهيم‬
  • 2. INTRODUCTION Social networks are one of the simplest types of communication these days, reflecting a person's social picture. They can keep you attached to your avatar together for hours and make you forget the whole physical world around you. The social relationship network that builds up during your daily lives can be simply converted into your "profile" and made accessible to all your colleagues. Then there's a "following" notion that can make a nomad a rockstar. The world of images that you live share has only made you feel more about your presence. Everything seems so amusing that one would rarely think of leaving this "world" and becoming an offline monk. But the more comfortable and connected we are to these locations, the more casual and careless we are to share private information about ourselves.
  • 3. As of May 2012, five major social networking locations 1. Facebook. 2. Twitter. 3. Google+. 4. LinkedIn. 5. Pinterest. Although the use of websites and apps on social networks is increasingly daily, users are not conscious of the dangers associated with uploading sensitive data.
  • 4. PRIVACY ISSUES - Security risks The related safety dangers are also growing tremendously with growing use of SNSs. Theft of identity, phishing, scam, cyber bullying etc. are some of the safety hazards. People use SNSs such as facebook, twitter, etc. to provide their private information. This information is stored in SNS and is not safe due to the absence of adequate safety methods introduced in SNSs. - Identity Theft Some of the attacker's attack by applying for authorization to access the data given in the SNS profile. When a customer enables, they get all the data and can readily misuse it without the understanding or permissions of the customer.
  • 5. - Profiling Risk Risk profiling is the risk of profile cloning. The attackers are retrieving users ' private data and making a profile clone. They do this to harm their social picture or for other reasons such as knowing about victims ' friends. This is the SNS's most common security risk because it's very simple to do without the user's consent. - Fake Product Sale The attacker advertises on the SNSs for selling goods offering enormous discount and their profile data goes to the attackers when the user clicks on the product advertisement. Sometimes all account data is collected by the attackers when the customer attempts to buy and offer their account data for payment and they misuse this data.
  • 6. ATTACKING SCENARIOS Conventional Attacking Scenarios 1. CBIR( Content based Image Retrieval) The attacker can understand a user's place in this situation by matching the image patterns connected with the user's profile. Attack type is performed to understand the user's present place. 2. Click jacking This is another form of situation of assault where the attacker posts some videos or posts to the victim and some malicious activities are done when the victim clicks on the page. This is prevalent in Facebook with the name of jacking, which is when a user wants a page, a photo, or a video that the attackers trap the user.
  • 7. PREVENTION STRATEGIES - Beware of strangers The internet makes it easy for individuals to misrepresent their private identities and intentions. Limiting the individuals who are permitted to contact you on these locations is always suggested. - Be sceptical Don't think in everything you're reading online. People create a lot of errors and post fake or misleading data on various subjects, including data about their own identity. - Evaluate your settings Make sure you keep the privacy settings of the site updated. The default settings may allow anyone to view your "profile," but you may have an option to customize your settings to limit access only to certain individuals.
  • 8. CONCLUSION Ultimately, the only solution to social network privacy and security issues is to get some knowledge of how to get fooled. Don't post anything you'd like to hide from a stranger. Be cautious who you add as a "buddy" as there is simply no way online to verify the real identity of a user. We suggested a secure communication architecture between users and a safe request-response architecture for user-to-user exchange of data. Keep your system up to date and tidy. Keep your senses open while you are using the internet and never jump to conclusions. Analyze the content thoroughly before doing anything. And remember, there are no free lunches in this world.