Social Media and Network Security

 

GMU Honor Code statement:

“By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code-2/ and as stated, I as a student member of the George Mason University community pledge not to cheat, plagiarize, steal, or lie in matters related to academic work. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 website.”

Abstract

Social media security is a big concern nowadays and network security itself is another concern. Network security has changed a lot in the recent years. This paper aims to investigate and talk about the public associations on social media networks, the rationale of social practices, the dynamic way of character and protection, the creation and dispersal of social media and network security, the social media network security and the overall network security of the present time. This paper begins with today’s social media character and network security for social media. It discusses the nature of network security, system protection, the social networking progression of security. Furthermore, it also describes network security threats, their definition and types, and how we will be benefitted from this, and what’s the new network security infrastructure might be in the near future. Also, this paper provides the background, uses, ethical and social issues, advantages and disadvantages of the network security based on social media sites and network security individually in details.

Keywords:

Social networking sites; network security; social media and network security

Introduction

Social media has not only changed the way people interact in the world, but also it is advancing more to make it easier to access. Social networking sites allow people to communicate and remain in contact with friends as well as meet new people. Social media alludes to online communication that takes into consideration client created content as content sound, video, pictures and so on to be distributed in a very versatile way for overall public utilization regularly. It also includes the intuitive exchange with others. Social media is a vital source for sharing social activities. There are various kinds of social media such as Wikis, Blogs, Microblogs, Photo Sharing, Videos, News Feed and so on. Social networking sites are viral; at times, mysterious in nature, prompting social sites being seen as targets for hackers and cyber-criminals recently. Reasons being that online networking itself permits the clients to customize their online identity and share personal information. Along with all these things, network security is also a concern nowadays and has a relation with them. Famous social networking sites, for example, Facebook and Twitter have been able to be focused for security attacks. Without network security, we cannot protect our privacy and our stuff on the internet and in the social networking sites. In this paper, I will analyze the current practices of network security for social media services what is network security and the benefit of network security, social networking threats, future of network security, and emphasis on the ethical/legal and social aspects as well as a glimpse at the future security issues facing this area.

Read also  Online Course for Phishing

Background, types and current security threats

Network security refers to any kind of activities intended to secure system. In particular, these activities secure the ease of use, integrity, trustworthiness, and safety of the network and information. Compelling network security focuses a variety of threats and prevents them from entering into the network. Network security is refined through software and hardware. The software must be continually updated and figured out how to shield the network from developing threats. A network security system normally comprises of numerous parts. All parts work together, which minimizes maintenance and enhances security. These parts include – Anti-virus and anti-spyware, firewall for blocking unauthorized access to the computer, Virtual Private networks (VPN) for providing secure remote access. On the other hand, Social media security is an issue nowadays. Online social networks were especially one of the hackers’ most loved targets. According to Dong and L.N., network security has turned into the present spotlight on the improvement of information technology. From all parts of network information security issues, we should first make sense of the variables that trigger network security (Dong, L. N., 2014). According to another research study (2009) accumulated by the US National Cyber Security Alliance (NCSA), more than 74% of clients unveil individual data, including email addresses and birthdays on their profiles (Express Computer, 2009). Cyber-criminals can take data about anyone from their social networking profile and posts and afterward tailor their assaults taking into account anyone’s interests and likes. This is known as “social engineering” and it makes security threats a great deal more hard to perceive. According to Wu, “Social Engineering, which relies on exploiting the human element of trust, obtain or compromise information about an organization or its computer systems” (Wu, 2012, p.173). With such a large

A number of users, Facebook is a target for scams; it can likewise uncover anybody’s personal information to their group of friends. Scams on Facebook incorporate cross-site scripting, clickjacking, survey scams and theft of identity. One of the scammers most loved strategies for assault existing apart from everything else is known as cross-site scripting or “Self-XSS”. Clickjacking is likewise frequently fixing to “survey scams” which trap users into introducing an application from a spammed link. New Facebook security highlights give assurance against scams and spam. However, tragically they’re primarily incapable. Self-XSS, clickjacking and review tricks basically did not exist only a couple of years back, but rather they now show up on Facebook and other social networks every day. Another study showed that Facebook, for instance, was sued commonly in 2011 which made the firm pay about $20 million to compensate its clients for utilizing their information without explicit permission (Velmurugan & Mathiyalagan, 2015). Security threats on social networking sites keep on growing. Another example of social networking site is twitter. It is a micro-blogging site. Even though most shortened URLs are real, if a link redirects anyone to another page that requests a twitter password everybody should leave it immediately for security purpose.

Ethical issues related to social networking sites and Network security

Social networking permits anybody to share essentially anything on the web. Any business without a social media policy networking approach risks expanding outside security attacks. Here are a few ethical rules a business ought to take after when conveying online:

  1. Sharing information which will give anyone’s brand a positive picture.
  2. People need believable information, so they should give them that. This will fabricate trust for business, which can expand leads and clients.
  3. When sharing, know about others’ viewpoints. Be interested in what others need to say.
  4. When to react, be reasonable in what we say to make a social prosperity for our business and client connections.
  5. Be mindful of who can see our information, what is being shared, and what is being said and partook in regards to our business.
  6. If something negative is being shared, investigate it for believability. On the off chance that it is dependable, react to it in a positive style to demonstrate that we think about what is said concerning our business, and that some kind of move is being made to progress.
Read also  Skills And Knowledge For Successful System Development Information Technology Essay

Overall, a business ought to make a positive, trustworthy online nearness for both their own particular advantage and for the advantage of their clients.

On the other hand, a security policy is the accumulation of standards that help the clients to carry on in a certain approach to recognizing what is lawful and unlawful to access to ensure computer system in their network. Also, it helps the administrator to ensure that everything in the network system is secure and no one can pulverize or harm the system. So, the security policies are important to big business network. Likewise, without security policies the clients will open websites and these websites may have a virus or worms which will impact to our network function. Moreover, an unapproved individual can access to the network and do the illicit activity which will destroy the system. There is numerous approach to apply security policy. For instance, strong password, use a firewall and so on. However, one of the greatest ethical issues that identified with system is security policy. In some organizations the security policies are apply feebly or in awful way. Secondly, the hackers are enormous issue to the network and it is spread quickly in the word for quite a while. For instance, stolen medical insurance record from any organization and they will offer this data to another organization with no authorization. Third, the weak network design security system is gotten to be one of the greatest ethical issue that identified with network. Some administrator in the organizations do not apply enough security to the network, which cause a great deal of unauthorized clients access to network and look over the secret information. It happens because of the weak network security. According to Jayson, Some of Facebook’s research on client conduct found that 71% of individuals drafted at least one post that they never posted (Jayson, 2014).

Social Implications

Social media is potentially the most indispensable segment of the Internet. At the same time, being open and social networking sites makes true worries about protection and security. Social networking sites urge individuals to be more open about their own lives. Besides, things they post stay accessible uncertainly. While most sites permit their clients to control who sees the things they’ve posted. Social networking sites are possessed by private organizations, and that they profit by gathering information about people and offering that information on, especially to third party advertisers. Security settings are just intended to shield one from different individuals from the social network, yet they don’t shield ones’ information from the proprietors of the service. Basically, one person is giving every one of his/her information over to the proprietors and believing them with it. There are other reasons also that can expose ones’ privacy. One study showed that boasting more than 500 million active users around the world, the social networking site is presently being focused by cyber-criminals (Sanchez, 2010). On the other hand, Viruses and malware frequently discover their direction into computers through enticing advertisements. It’s better not to click those ads. Secondly, we have to be cautious of whom we acknowledge invitations from while making online network. Sharing our information to individuals we don’t know can be hazardous. In case, if we get friend requests from an unknown person, we should not accept the request in the social networking sites. Third, Part of the online networking websites are all the different games and applications. These are also called third party apps. Most of them are unsafe, before giving the application a specific level of consent concerning our information we have to be careful. We have to ensure what the application is viewing and sharing before consenting to the terms. Exposing too much information falls us into trouble. Fourth, we have to utilize our security settings properly. Social media sites give us the capacity to limit who has the access to our information. For instance, Facebook gives us a chance to choose who our friends are and what content they can see.  One Consumer Reports says that issues are on the rise – 11% of households utilizing Facebook had inconvenience a year ago, which ranges from a more unusual utilizing their login information to online harassment (Fitzpatrick, 2012).

Read also  Where To Use Multimedia Information Technology Essay

Future of social networking and network security

The future of security controls on social networks is by all accounts on a promising direction. for example, biometrics system will be installed with two-step verification and enhanced endeavors are being made for securing clients privacy. With thoughts, for example, online ID labels, eye recognition system etc.

Conclusion

Social network holds colossal control over the lives of people and this force brings a duty of making social network a more secure spot. This must be done when security frameworks are solidly set up without bargaining the wellbeing of clients.

References

Dong, L. N. (2014). Design of computer information network security system.

Applied Mechanics and Materials, 539, 305-309. doi:

http://dx.doi.org.mutex.gmu.edu/10.4028/www.scientific.net/AMM.539.305

This is research and reviews that describes the network security systems.

Fitzpatrick, A. (2012). Study Says Facebook Privacy Concerns Are on the

Rise – Is It Accurate? Retrieved October 04, 2016, from http://mashable.com/2012/05/04/facebook-privacy-concerns-study/#vnDzBrKMnqqf

This is a website that says about the Facebook privacy and security.

Jayson, S. (2014). Social media research raises privacy and ethics issues.

Retrieved October 04, 2016, from http://www.usatoday.com/story/news/nation/2014/03/08/data-online-behavior-research/5781447/

This is a newspaper publication that discussed privacy and ethics issue for social media.

Social networks: Boon or bane? (2009).

Express Computer, Retrieved from http://search.proquest.com.mutex.gmu.edu/docview/217384554?accountid=14541

This is a research and reviews that describes the network security threats.

Sanchez, M. (2010, November 10). Know the Security Implications

of Social Media. Retrieved October 04, 2016, from http://blogs.cisco.com/smallbusiness/know_the_security_implications_of_social_media

This blog was created for knowing the security implications of social media.

Velmurugan, J. S., & Mathiyalagan, P. (2015). SOCIAL NETWORKING THREATS AND

SECURITY ISSUES: AN ENQUIRY. International Journal of Management

Research and Reviews, 5(4), 270-274. Retrieved from http://search.proquest.com.mutex.gmu.edu/docview/1683315551?accountid=14541

This is a research and reviews on Social networking threats and security issues.

Wu, H. (2012). A review of social media security risks and mitigation

techniques.Journal of Systems and Information Technology, 14(2), 171-180.doi:

http://dx.doi.org.mutex.gmu.edu/10.1108/13287261211232180

This website is a review of social media security risks and mitigation techniques Journal of Systems and Information Technology.

Order Now

Order Now

Type of Paper
Subject
Deadline
Number of Pages
(275 words)