SlideShare a Scribd company logo
1 of 21
SOCIAL MEDIA AND ITS EFFECT
ON SECURITY
PRESENTED BY: RAJKIRAN R. NADAR
WHAT IS SOCIAL MEDIA:
• Websites and applications that enable users to create and share
content or to participate in social networking.
• Common Feature Of Social Media:
1) interactive Web 2.0 Internet-based applications.
2) User-generated content
3) facilitate the development of online social networks
4) Provide specific service
SOME PROMINENT EXAMPLES OF SOCIAL
MEDIA
• Facebook : is a popular free social networking website that
allows registered users to create profiles, upload photos and
video, send messages and keep in touch with friends, family
and colleagues
• Twitter : is a free microblogging service that allows registered
members to broadcast short posts called tweets. Twitter
members can broadcast tweets and follow other users' tweets
by using multiple platforms and devices
• Wikipedia : is a free, open content online encyclopedia created
through the collaborative effort of a community of users known
as Wikipedians.
• LinkedIn : is a social networking site designed specifically for
• Google+: is Google's social networking project, designed to
replicate the way people interact offline more closely than is
the case in other social networking services.
• YouTube : is video-sharing website which allows users to
upload, view, rate, share, add to favorites, report, comment on
videos, and subscribe to other users.
• Pinterest is a social curation website for sharing and
categorizing images found online. Pinterest requires brief
descriptions but the main focus of the site is visual
Question :
Social Media’s are free website like Facebook or
Google
Then are we customer of free website?
5 THREATS TO YOUR SECURITY WHEN
USING SOCIAL MEDIA:
• 1. Having Your Identity Stolen
• Precautions: 1)Have a strong password:
Check Password Strength: https://howsecureismypassword.net
2. GETTING YOUR COMPUTER OR SOCIAL PROFILE
HACKED
2)Be careful with your status updates
3) Don’t reveal your location.
Precautions:
1) Hover over the link.
2) Try a link scanner: Try URLVoid
3) Check shortened links:
Some shortened link sites include bit.ly, Ow.ly, and
TinyURL.
e.g.: http://bit.ly/KestalCares
3. INADVERTENTLY LETTING STALKERS FIND YOU:
• When you are online, cookies track your activity as you move
from site to site.
Precautions:
1) click on the “Do Not Track” feature
2) clear the cache and cookies on your browser
regularly
4. LETTING BURGLARS KNOW YOUR WHEREABOUTS
Precautions:
1) Use highest privacy control.
2) Be selective with the status updates.
5. BECOMING OVERCONFIDENT
3)Avoid posting specific travel plans. Never post
when, where, or how long you’ll be gone.
4)Wait until you are home to post pictures to a
vacation album
• Many users believe as long as they have a firewall and an
antivirus installed, there is no threat to security.
• Many people also believe that they don’t have anything worth
hacking so there’s no need to worry about security.
• Avoid posting information including:
1. Travel plans
2. Your full address and birthdate
3. Your children’s’ names, school, and birthdates
4. Location information, such as the name of your work place
5. Your daily schedule
CYBER STALKER ARRESTED
• Hyderabad: A MBA student from Karimnagar was arrested by
Rachakonda cyber cell for harassing a girl by creating a fake
Facebook profile on her name and posting abusive messages to
her friends. He also posted her photo and phone number on
various websites.
KEYLOGGER:
• A keylogger is a hardware device or a software program that
records the real time activity of a computer user including the
keyboard keys they press.
WHAT INFORMATION A KEYLOGGER CAN
COLLECT ?
• The capabilities of keyloggers vary, but when installed on a device they can
generally do the following:
1. capture any passwords entered by users on the device
2. take screen captures of the device at periodic intervals
3. record the URLs that were visited via Web browsers, and possibly also take
screen captures of the Web pages viewed
4. record a list of the applications run by users on the device
5. capture logs of all instant messaging (IM) sessions
6. capture copies of sent emails
7. automatically send the reports containing stored logs and emails to a
remote location (by email, FTP or HTTP).
HOW DOES A KEYLOGGER GET ON YOUR
COMPUTER ?
• A keylogger can be installed on your computer any number of
ways
• Anyone with access to your computer could install it
• Keyloggers could come as a component part of a virus or from
any application installation, despite how deceptively innocent it
may look
• This is part of the reason why you should always be sure you’re
downloading files from a trusted resource.
COUNTERMEASURES
• Network monitors
• Anti-spyware / Anti-virus programs
• Anti keyloggers
• Keystroke interference software

More Related Content

What's hot

Cit 335 hootsuite-final project presentation
Cit 335 hootsuite-final project presentationCit 335 hootsuite-final project presentation
Cit 335 hootsuite-final project presentation
italianstallone
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

What's hot (20)

5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
 
What is Browser Sandbox Protection?
What is Browser Sandbox Protection?What is Browser Sandbox Protection?
What is Browser Sandbox Protection?
 
Cit 335 hootsuite-final project presentation
Cit 335 hootsuite-final project presentationCit 335 hootsuite-final project presentation
Cit 335 hootsuite-final project presentation
 
Cybersecurity of students
Cybersecurity of studentsCybersecurity of students
Cybersecurity of students
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Browzine
BrowzineBrowzine
Browzine
 
Safe Internet Banking Cyber Security
Safe  Internet Banking Cyber SecuritySafe  Internet Banking Cyber Security
Safe Internet Banking Cyber Security
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Web 2.0 basic training
Web 2.0 basic trainingWeb 2.0 basic training
Web 2.0 basic training
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 

Similar to Social Media And It's Effect on Security

Similar to Social Media And It's Effect on Security (20)

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Chapter 6_The Internet and Web Applications.pdf
Chapter 6_The Internet and Web Applications.pdfChapter 6_The Internet and Web Applications.pdf
Chapter 6_The Internet and Web Applications.pdf
 
Social Media Application Development
Social Media Application DevelopmentSocial Media Application Development
Social Media Application Development
 
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)
LESSON-1-EMPOWERMENT TECHNOLOGY (INTRODUCTION TO ICT)
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
 
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxEMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
 
Presentation social networking service
Presentation social networking servicePresentation social networking service
Presentation social networking service
 
Emptech Lesson 1.pptx
Emptech Lesson 1.pptxEmptech Lesson 1.pptx
Emptech Lesson 1.pptx
 
Empowerment Module 1.pptx
Empowerment Module 1.pptxEmpowerment Module 1.pptx
Empowerment Module 1.pptx
 
Social networking
Social networkingSocial networking
Social networking
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Information and Communications Technology.pptx
Information and Communications Technology.pptxInformation and Communications Technology.pptx
Information and Communications Technology.pptx
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 

Recently uploaded

+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 

Recently uploaded (20)

The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot ModelInternational Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
International Airport Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 

Social Media And It's Effect on Security

  • 1. SOCIAL MEDIA AND ITS EFFECT ON SECURITY PRESENTED BY: RAJKIRAN R. NADAR
  • 2. WHAT IS SOCIAL MEDIA: • Websites and applications that enable users to create and share content or to participate in social networking. • Common Feature Of Social Media: 1) interactive Web 2.0 Internet-based applications. 2) User-generated content 3) facilitate the development of online social networks 4) Provide specific service
  • 3. SOME PROMINENT EXAMPLES OF SOCIAL MEDIA • Facebook : is a popular free social networking website that allows registered users to create profiles, upload photos and video, send messages and keep in touch with friends, family and colleagues • Twitter : is a free microblogging service that allows registered members to broadcast short posts called tweets. Twitter members can broadcast tweets and follow other users' tweets by using multiple platforms and devices • Wikipedia : is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians. • LinkedIn : is a social networking site designed specifically for
  • 4. • Google+: is Google's social networking project, designed to replicate the way people interact offline more closely than is the case in other social networking services. • YouTube : is video-sharing website which allows users to upload, view, rate, share, add to favorites, report, comment on videos, and subscribe to other users. • Pinterest is a social curation website for sharing and categorizing images found online. Pinterest requires brief descriptions but the main focus of the site is visual
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Question : Social Media’s are free website like Facebook or Google Then are we customer of free website?
  • 10.
  • 11. 5 THREATS TO YOUR SECURITY WHEN USING SOCIAL MEDIA: • 1. Having Your Identity Stolen • Precautions: 1)Have a strong password: Check Password Strength: https://howsecureismypassword.net
  • 12. 2. GETTING YOUR COMPUTER OR SOCIAL PROFILE HACKED 2)Be careful with your status updates 3) Don’t reveal your location. Precautions: 1) Hover over the link. 2) Try a link scanner: Try URLVoid 3) Check shortened links: Some shortened link sites include bit.ly, Ow.ly, and TinyURL. e.g.: http://bit.ly/KestalCares
  • 13.
  • 14. 3. INADVERTENTLY LETTING STALKERS FIND YOU: • When you are online, cookies track your activity as you move from site to site. Precautions: 1) click on the “Do Not Track” feature 2) clear the cache and cookies on your browser regularly 4. LETTING BURGLARS KNOW YOUR WHEREABOUTS Precautions: 1) Use highest privacy control. 2) Be selective with the status updates.
  • 15. 5. BECOMING OVERCONFIDENT 3)Avoid posting specific travel plans. Never post when, where, or how long you’ll be gone. 4)Wait until you are home to post pictures to a vacation album • Many users believe as long as they have a firewall and an antivirus installed, there is no threat to security. • Many people also believe that they don’t have anything worth hacking so there’s no need to worry about security.
  • 16. • Avoid posting information including: 1. Travel plans 2. Your full address and birthdate 3. Your children’s’ names, school, and birthdates 4. Location information, such as the name of your work place 5. Your daily schedule
  • 17. CYBER STALKER ARRESTED • Hyderabad: A MBA student from Karimnagar was arrested by Rachakonda cyber cell for harassing a girl by creating a fake Facebook profile on her name and posting abusive messages to her friends. He also posted her photo and phone number on various websites.
  • 18. KEYLOGGER: • A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.
  • 19. WHAT INFORMATION A KEYLOGGER CAN COLLECT ? • The capabilities of keyloggers vary, but when installed on a device they can generally do the following: 1. capture any passwords entered by users on the device 2. take screen captures of the device at periodic intervals 3. record the URLs that were visited via Web browsers, and possibly also take screen captures of the Web pages viewed 4. record a list of the applications run by users on the device 5. capture logs of all instant messaging (IM) sessions 6. capture copies of sent emails 7. automatically send the reports containing stored logs and emails to a remote location (by email, FTP or HTTP).
  • 20. HOW DOES A KEYLOGGER GET ON YOUR COMPUTER ? • A keylogger can be installed on your computer any number of ways • Anyone with access to your computer could install it • Keyloggers could come as a component part of a virus or from any application installation, despite how deceptively innocent it may look • This is part of the reason why you should always be sure you’re downloading files from a trusted resource.
  • 21. COUNTERMEASURES • Network monitors • Anti-spyware / Anti-virus programs • Anti keyloggers • Keystroke interference software