Computer Security: Social Networking

1293 Words6 Pages
Computer Security: Social Networking
Social networks like Facebook, Twitter, and LinkedIn memberships are growing daily. Facebook being the largest with over five hundred million active users, from which fifty percent logon daily (Bamnote,Patil,Shejole, 2010, p.151). With the raise in these social networking websites the potential for an attack also raise. With the overwhelming amount of data stored on the internet the amount of effort needed to effectively “hack” someone’s account or information is increased exponentially. These attacks can lead to loss of money, damaged computer software, and even identity theft. Attackers tend to attack in one of three different ways: phishing and malware attacks, as well as utilizing Facebook’s facial recognition software. There are preventative measures to keep personal data safe on the internet having a strong password and the diligent maintenance of this password. Another preventative measure is the being aware of internet and how permanent the internet really is.
Social media grows in membership daily. This growth has many positive attributes including the reconnection of friends and family. There are also inherent risks which have varying degrees on consequence. These risks range from identity theft to have a user’s account sending out harmful spam that could infect the user’s computer as well as others on their friends list. Most of these attacks are phishing attacks which can have varying degrees of severity. Attackers also use malware to attack users of social media websites. Users should be aware of the types of attacks so they can know the signs associated with them.
Phishing is one of the most common forms of attacks that attackers utilize on social networking webs...

... middle of paper ...

...eal regulations or laws presiding over most social networks, there is no way to be completely protected.

Bamnote, G., Patil, G., & Shejole, A. (2010). Social Networking-Another Breach in the Wall. International Conference on Methods and Models inm Science and Technology, 151-153.
Cudi, M. (2011). Privacy Protection Problems In Social Networks. Journal of Yasar University, 3693-3698.
Jagatic, T., Johnson, N., Jakobsson, M., & Menczer, F. (2007). Social Phishing. Association for Computing Machinery, 94-100.
McCarthy, L., Watson, K., & Weldon-Sivey, D. (n.d.). Own Your Space, A Guide to Facebook Security for Young Adults, Parents, and Educators. 1-13.
Shaw , J. (2012). Facebook Confindential: The Privacy of Facebook's Surreptitous and Explotive Utiliztion of Facial Recognition Software. Temple Journal of Science, Technology & Enviormental Law, 149-175.
Get Access