preview

social media

analytical Essay
1039 words
1039 words
bookmark

Like every other program, this app is also prone to many privacy violations.
1. Identity theft can be a significant risk.
Personal details like your full name, names of your family members, your phone number, birthday, address, and place of employment can all be used by identity thieves. To minimize the risk of identity theft, carefully monitor the information made publicly available using privacy settings (High privacy settings are required). Using different passwords for different accounts also make it more difficult for identity thieves to acquire information about a particular person.
2. Internet Fraud.
Internet fraud, also known as cyber fraud, refers to using Internet access to scam or take advantage of people.
3. Inference Attacks
Inference attacks in online social networks are used to predict a user's personal, sensitive information that the user has not chosen to disclose, such as religious affiliation and sexual orientation. These types of attacks can be implemented using data mining techniques combined with publicly available OSN data, such as network topology and users' friends' data.
4. Socware.
Socware entails fake and possibly damaging posts and messages from friends in online social networks
5. Online Predators.
The greatest concern for the personal information safety of children is reflected in the growing apprehension about Internet pedophiles, also referred to as online predators.
6. Might lead to hacking the user accounts
7. Personal information can be leaked easily once hacked.
8. If the settings are not customized properly, anyone who has a registered account in the program can view the personal information of a person.
9. If the data is fake, the companies providing the jobs might be cheated.

10 Securit...

... middle of paper ...

...xt that encrypts *any desired function* of that data under pk. fully homomorphic encryption scheme, solving a central open problem in cryptography. Such a scheme allows one to compute arbitrary functions over encrypted data without the decryption key.
Fully homomorphic encryption has numerous applications. For example, it enables private queries to a search engine { the user submits an encrypted query and the search engine computes a succinct encrypted answer without ever looking at the query in the clear. It also enables searching on encrypted data { a user stores encrypted files on a remote file server and can later have the server retrieve only files that (when decrypted) satisfy some boolean constraint, even though the server cannot decrypt the les on its own. More broadly, fully homomorphic encryption improves the efficiency of secure multiparty computation.

In this essay, the author

  • Explains that personal details like your full name, names of family members, phone number, birthday, address, and place of employment can be used by identity thieves.
  • Explains that internet fraud refers to using internet access to scam or take advantage of people.
  • Explains that inference attacks in online social networks are used to predict a user's personal, sensitive information that the user has not chosen to disclose, such as religious affiliation and sexual orientation.
  • Explains that socware entails fake and potentially damaging posts and messages from friends in online social networks.
  • Explains the growing apprehension about internet pedophiles, also referred to as online predators.
  • Explains that if the settings aren't customized properly, anyone who has a registered account in the program can view the personal information.
  • Argues that developing effective privacy protection technologies is a critical challenge for security and privacy research as the amount and variety of data collected about individuals increase exponentially.
Get Access