Most of the people, nowadays, are users of social media such as Facebook, Instagram, Twitter, etc. Social media it become very important in people’s live because they can talk with others, show themselves by posting pictures, videos, etc. Therefore, social media’s users are posting online their private information. Moreover, there are many other things people … Continue reading “users of social media such as Facebook, Instagram | My Assignment Tutor”
Most of the people, nowadays, are users of social media such as Facebook, Instagram, Twitter, etc. Social media it become very important in people’s live because they can talk with others, show themselves by posting pictures, videos, etc. Therefore, social media’s users are posting online their private information. Moreover, there are many other things people can do with their social media account: having conversations with other people, and even using their account to log in and sign in different website. Therefore, social networking accounts became a way that user can authenticate. However, the security and privacy of the user data it became the concern that should be looked at. In the dissertation project I will talk about the risks that users take when using their account on authenticating different websites with and the security and privacy of the user data when using social networking. There are many threats that users are exposed at when using social network. But as well as issues, there are solutions as well. In order to discover the way that a user can use their accounts safer, we should know the risks first. The aims and objectives of this project are: 1. One aim is the research of social media. To analyse what social media is. To review how users are using it. To calculate how much information is the user sharing. 2. Secondly, research on the risks and threats the user is exposed to. To develop the possible threats. To predict how users might be affected. To justify why users are in risk when they use their social media account for signing in with different websites. 3. The least, but not the last will be the method of making user keep his data safe and far from risks. We will do this in few steps: To apply all the security measures gained. To review how secure is user data after the security measures has been in place. To analyse how important the security is for a user. Many people are victims of threats since social media it has been used by most of them. There are many sources that I will research so they will help me evaluate how people are exposed to risks and what are the measures to prevent the users fall into traps. To be able to have a social media account, users are asked to give personal information, such us: full name, address, phone number, date of birth, etc. Therefore, they make themselves available to the other users. Moreover, many other websites have the possibility of signing in with the social media account because the information needed are already there and they can contact the users through the social media account provided. Because it is a very fast way to sign in, users are using it more and more often. There are two reason to mention why user choose social login with the other websites: fast authentication and less passwords to remember. Here is where the problems might come, and the security and privacy of the user data is concerning. The users can become victims of different kind of attacks such us: spams, identity thief, malwares, etc. Therefore, the risks are multiple: hackers might steal users personal information, especially card details, and even the location and the identity from the multimedia they posted. However, there are security solutions as well such as authentication mechanism and privacy settings. Fortunately, there are many research and studies that shows how users become victims of attacks, how many types of attacks they are and also solutions so users can take against identity thief or any other attacks. Therefore, my scope is to bring together the information need it to understand the risks the users are expose to and how to improve security and privacy of user data. References Age, T. D., 2018. Cloud-Based Social Media: Use Cases And Security Concerns. [Online]Available at: https://blogs.unsw.edu.au/thedigitalage/blog/2018/07/cloud-based-social-media-use-cases-and-security-concerns/[Accessed 11 February 2021]. Ashford, W., 2019. Social Media And Enterprise Apps Pose Big Security Risks. [Online]Available at: https://www.computerweekly.com/news/252469873/Social-media-and-enterprise-apps-pose-big-security-risks[Accessed 11 February 2021]. Colburn, J., 2020. Social Media Best Practices To Keep Your Company And Customer Data Safe. [Online]Available at: https://sproutsocial.com/insights/social-media-security/[Accessed 11 February 2021]. Kumar, S. & Kandasamy, S., 2016. On Privacy And Security In Social Media. [Online]Available at: https://www.researchgate.net/publication/301234158_On_Privacy_and_Security_in_Social_Media_-_A_Comprehensive_Study[Accessed 11 February 2021]. Lewis, K., 2020. How Social Media Networks Facilitate Identity Theft And Fraud. [Online]Available at: https://www.eonetwork.org/octane-magazine/special-features/social-media-networks-facilitate-identity-theft-fraud[Accessed 11 February 2021]. Newberry, C., 2020. Social Media Security Tips And Tools To Mitigate Risk. [Online]Available at: https://blog.hootsuite.com/social-media-security-for-business/[Accessed 11 02 2021]. Praveena, A. & Smys, S., 2017. Ensuring Data Security In Cloud Based Social Networks. [Online]Available at: https://ieeexplore.ieee.org/document/8212819[Accessed 11 February 2021]. Rathore, S. et al., 2017. Social Network Security: Issues, Challenges, Threats And Solutions. Information Sciences, Issue 421, pp. 43-69. Romansky, R., 2014. Social Media And Personal Data Protection. [Online]Available at: https://www.researchgate.net/publication/307570419_SOCIAL_MEDIA_AND_PERSONAL_DATA_PROTECTION[Accessed 11 February 2021].